Skip to content

Information Security 101

Information security tips and tricks for both home and business users

Tag: twitter

Posted on March 22, 2018

It’s Time to Revoke Social Media App Access (Again)

Posted on January 7, 2016January 7, 2016

22 Sites Where You Should Enable Two Factor Authentication RIGHT NOW

Posted on December 9, 2013May 2, 2015

Bridging the Social Media Implementation/Audit Gap

Posted on October 9, 2013May 2, 2015

How To “Career-Proof” Your Social Media Profiles

Posted on October 1, 2013May 2, 2015

Find and Delete Old Social Media Profiles

Posted on July 18, 2013May 2, 2015

How Many Apps Have Access to Your Social Media Profiles?

Security Sites

  • IT Security Career
  • Slandail

Twitter Feed

  • The latest Infosec Matters! paper.li/slandail/13606… Thanks to @armorblox @c3retc3 @asovesinfo #infosec #cybersecurity 15 hours ago
  • The latest Infosec Matters! paper.li/slandail/13606… Thanks to @SureCloud @CSIRTGOB @marc_ahx #infosec #cybersecurity 1 day ago
  • Wednesday! #infosec lnkd.in/e6-pCx5 2 days ago
  • The latest Infosec Matters! paper.li/slandail/13606… Thanks to @OsLinux10 @softwarnet @NotTruppi #infosec #cybersecurity 2 days ago
  • TWO fantastic #infosec #hiring opportunities in #Columbus! Great team to work with. #informationsecurity #careers lnkd.in/ezcBECD 2 days ago
Follow @slandail

Recent Posts

  • How Mature is Your InfoSec Program?
  • It’s Time to Revoke Social Media App Access (Again)
  • What You Need to Know About GDPR: The Short Version
  • We Could Have Prevented WannaCry
  • Want to Fail at Security? COMPLY!

Top Posts & Pages

  • Step-by-Step Guide To Decompiling Android Apps
  • Find and Delete Old Social Media Profiles
  • 22 Sites Where You Should Enable Two Factor Authentication RIGHT NOW

Archives

  • March 2018
  • May 2017
  • January 2016
  • June 2015
  • January 2014
  • December 2013
  • October 2013
  • July 2013
  • June 2013
  • March 2013
  • February 2013
  • January 2013
  • June 2011
  • May 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
  • December 2010

Categories

  • Business Security (53)
  • Home User Security (35)

Tags

0day adobe android antivirus apple appsec backup breach business continuity byod career chrome civil liberties compliance email encryption ethics exploit facebook firewall foxit gaming google hacking hide my ass hipaa human resources iam incident incognito information security infosec instagram ipad iphone ipod iso iso 27000 it java java flaw linkedin malware management mobile myspace networking nintendo operations owasp passwords patch management pci physical security pinterest playstation policy privacy psn risk search engines security social engineering social media spyware system hardening training tumblr twitter virus vulnerability management wii windows wireless xbox

RSS Security Bloggers Network

  • Downtime Can Cost a Company up to $67 Million Over Two Years, Threatening Brand Reputation
    A cyber-incident inflicts damage beyond just downtime and recovery costs. A breach can spell disaster for a company’s image, leading to devaluation, lost business, high turnover, and even bankruptcy in extreme cases. However, a breach isn’t the only cyber-threat lurking in the business sector. The post Downtime Can Cost a Company up to $67 Million Over Two Y […]
    Filip Truta
  • MFA: How to Eliminate Profile Fraud and Win the Fight for Consumer Trust
    Social media sites are fraught with fake accounts and imposter profiles aimed at scamming money from innocent users or promoting fake products in support of illegal businesses. These fake accounts, on Facebook and various dating sites, have defrauded tens of millions of dollars from consumers around the world. Malicious actors using these methods don’t discr […]
    Jean Shin
  • 139 US bars, restaurants and coffeeshops infected by credit-card stealing malware
    North Country Business Products (NCBP), a provider of point-of-sales systems, has revealed that 139 of their clients have been hit by a malware infection that stole the payment card details of consumers. Retailers at dozens of locations across the United States which used NCBP’s hardware and software to process payments may have been affected by […] The post […]
    Graham Cluley
  • AI Adoption Lags as Hype Trumps Benefits
    If it seems as though companies have been dragging their feet with adopting artificial intelligence (AI) technologies, they have. Despite its perceived benefits, a new global study on the current and future use of AI technologies conducted by Protiviti, a global consulting firm, in collaboration with ESI Thoughtlab found that cybersecurity concerns and uncer […]
    Kacy Zurkus
  • Nest Secure Users Learn of Secret Microphone | Avast
    Earlier this month, Google pushed an update for Nest Secure that enabled it to function as a Google Assistant smart speaker. The announcement surprised users not just because of the new feature, but because the news came with the revelation that a microphone has existed on the hardware all along. The post Nest Secure Users Learn of Secret Microphone | Avast […]
    Avast Blog
Blog at WordPress.com.
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy