Hacker claims credit for alleged Twitter DDoS attack

Social media security risks and real-time communication security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Secure browsing: Free plug-in lessens social networking security risks

    Looking for ways to improve employees' browsing security? Learn about the free SecureBrowsing plug-in from M86 Security that can lessen social networking security risks. 

  • How to implement and enforce a social networking security policy

    For a new generation of employees entering the workforce, social networking isn't a luxury, it's a necessity. Yet not all enterprises understand that failing to consider social networking security can lead to unfortunate consequences. David Sherry ex... 

  • How to lock down instant messaging in the enterprise

    The popularity of instant messaging programs in the enterprise creates a huge problem for companies concerned about data leakage and Web-based malware. In this tip, application security expert Michael Cobb offers several strategies enterprises can us... 

  • Social networking website threats manageable with good enterprise policy

    Social networking sites may worry employers because of privacy concerns or loss of productivity, but some of the sites -- unbeknownst to their owners or creators -- harbor dangerous malware that can take down a network. Michael Cobb reviews the risks... 

  • Unified communications infrastructure threats and defense strategies

    Unified communications systems promise exciting productivity gains for workers and cost savings for businesses, but many often underestimate the security threats facing them. John Burke outlines the threats facing unified communications and how to de... 

  • Latest IM attacks still rely on social engineering

    In the age of email-borne superworms, email recipients would often become victims without any interaction or warning. However, as Michael Cobb explains, many of today's most dangerous instant messaging attacks require user interaction, meaning wary, ... 

  • Secure instant messaging in the enterprise

    Instant messaging can be a conduit through which viruses come in to and sensitive data goes out of the corporate network. Enterprises need a thorough IM policy and the technical measures to back it up, regardless of whether IM is allowed or strictly ... 

  • Websense Enterprise 5.5

    Learn why Information Security magazine believes this product is ideal for organizations who need an robust Internet filtering solution. 

  • How to block IM applications in the enterprise

    In this tip, security guru Mike Chapple discusses how IM threatens the network and provides strategies you can use to keep your network free of IM traffic. 

  • How to reduce spim

    Learn three tips for reducing unsolicited instant messages.