Book chapter: Unified Communications Forensics

Social media security risks and real-time communication security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Can DHCP be used to selectively block instant messaging clients?

    Restricting instant messaging use has been a significant security challenge for organizations, but will DHCP help solidfy an IM policy? In this SearchSecurity.com Q&A, Michael Cobb explains which access control mechanisms are the most effective. 

  • Yahoo fixes messenger flaws

    The latest version of Yahoo Messenger fixes serious flaws attackers could exploit to run malware on targeted machines. The timing is good, since more exploit code is circulating. 

  • Unified communications infrastructure threats and defense strategies

    Unified communications systems promise exciting productivity gains for workers and cost savings for businesses, but many often underestimate the security threats facing them. John Burke outlines the threats facing unified communications and how to de... 

  • Serious flaws put Yahoo Messenger users in peril

    Attackers could exploit two serious flaws in Yahoo Messenger to run malicious code on targeted machines, vulnerability trackers warned Wednesday. 

  • Should a rise in text message spam be expected?

    According to a Ferris Research study, consumers this year are expected to receive a total of about 1 billion cell phone spam messages. Yet, compared to other countries, text message spam hasn't hit the United States very hard. In this SearchSecurity.... 

  • greynet (or graynet)

    Greynet is a term for the use of unauthorized applications on a corporate network. A greynet application is a network-based program that corporate network users download and install without permission from their company's IT department. 

  • Multiple flaws in Trillian chat program

    Attackers could access sensitive information and run malicious code by exploiting multiple flaws in Trillian, a chat program popular in many enterprises. 

  • Mitigating Web 2.0 threats

    As companies look to cut costs, Software as a Service has gained ground in the enterprise. Similarly, social networking sites like Facebook and LinkedIn are must-haves in today's workplace. David Sherry reviews how to secure these services and defend... 

  • Yahoo fixes Messenger flaw

    Attackers could exploit a flaw in Yahoo Messenger to hijack targeted machines, but a fix is available. 

  • What are the risks of social networking sites?

    Social networking sites allow someone to post information that thousands of other users can read. But that's not at all. In this Q&A, information security threats expert Ed Skoudis reveals how sites like Myspace and Youtube let the bad guys post some...