Book chapter: Unified Communications Forensics

Social media security risks and real-time communication security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Unified Communications Forensics: Anatomy of Common UC Attacks

    In this excerpt from Unified Communications Forensics, learn how hackers gain access into UC systems and how to scan the network for vulnerabilities. 

  • Social Media Security

    In this excerpt from Social Media Security, author Michael Cross offers a number of strategies to help ensure social media security. 

  • Book chapter: Social media security policy best practices

    The following is an excerpt from chapter 6 Gary Bahadur from the book Securing the clicks: Network security in the age of social media. 

  • Mitigating Web 2.0 threats

    As companies look to cut costs, Software as a Service has gained ground in the enterprise. Similarly, social networking sites like Facebook and LinkedIn are must-haves in today's workplace. David Sherry reviews how to secure these services and defend... 

  • Quiz: Secure instant messaging

    A five-question multiple choice quiz to test your understanding of the content presented in the Secure instant messaging lesson of SearchSecurity.com's Messaging Security School. 

  • Facebook scam

    A Facebook scam is a post or page on the popular social networking site designed to deceive users and spread rapidly through their personal networks. Scams are sometimes created for identity theft or to spread malware but the usual purpose is financi... 

  • pharma hack

    The pharma hack is an exploit that takes advantage of vulnerabilities in WordPress or Joomla documents, causing search engines, notably the one hosted by Google, to return ads for pharmaceutical products along with legitimate listings. 

  • likebaiting

    Likebaiting is the practice of trying to compel Facebook users to click the Like button associated with a piece of content. The practice is similar to linkbaiting, in which content producers craft content with the intent of getting people to link to ... 

  • likejacking

    Likejacking is a variation on clickjacking in which malicious coding is associated with a Facebook Like button. The most common purposes of likejacking include identity theft and the dissemination of viruses, social spam and hoaxes. 

  • greynet (or graynet)

    Greynet is a term for the use of unauthorized applications on a corporate network. A greynet application is a network-based program that corporate network users download and install without permission from their company's IT department. 

About Social media security risks and real-time communication security

This topic section focuses on social media security and real-time communications security. Here you will receive tips and advice from our experts on social media security best practices, including creation and implementation of social media security polices, employee awareness and risk assessments, and updates and news on current social media security risks and threats and real-time communication security issues.