Latest stories

  • Report: Passwords Are, Like, So Not Cool - top government contractors - best government contracting event
    in

    Report: Passwords Are, Like, So Not Cool

    Gone are the days of teens keeping their diaries under lock and key: Now, their deepest, darkest thoughts are for the world to see, according to new findings indicating that less than half of 18-25-year-olds across the United States, UK and Australia use passwords to protect their laptops and mobile devices when accessing social-networking sites. […] More

  • Report: Cyber-Crime Victims Often Blame Themselves - top government contractors - best government contracting event
    in

    Report: Cyber-Crime Victims Often Blame Themselves

    A Symantec report has found that a majority of cyber-crime victims blame themselves for the web attack, experiencing a sense of powerlessness and lack of justice. More than 7,000 adults from 14 countries took part in research for the Norton Cybercrime Report: The Human Impact, which revealed that nearly 65 percent of adults globally have […] More

  • Cellphone Designers Should Seek Inspiration from Social Networking - top government contractors - best government contracting event
    in

    Cellphone Designers Should Seek Inspiration from Social Networking

    Cellphone-handset designers should look to social networking for inspiration to improve the management of communications on phones, according to a South Africa-based wireless application service provider. Many aspects of the cellphone user interface have not changed in a decade, especially contact management and texting capability, said Dr. Pieter Streicher, managing director of SMSBulk.com. American University’s […] More

  • Lockheed Martin Releases Source Code to Social-Networking Platform - top government contractors - best government contracting event
    in

    Lockheed Martin Releases Source Code to Social-Networking Platform

    Lockheed Martin last week released the source code to its enterprise social-networking platform Eureka Streams, which facilitates the information-sharing process between workers and aids them in making informed decisions by following relevant information from colleagues, groups and Internet sources. For the past four years, the defense contractor has created and used proprietary social media solutions […] More

  • FBI Warns of Online Scams, Predators, Social-Networking Ploys - top government contractors - best government contracting event
    in

    FBI Warns of Online Scams, Predators, Social-Networking Ploys

    In testimony before the House Judiciary Subcommittee on Crime, Terrorism, and Homeland Security on Wednesday, FBI“™s Assistant Director Gordon M. Snow highlighted how yesterday’s con men have transformed into modern-day charlatans conducting their scams in virtual worlds to steal identities and other critical information. Social-networking sites, especially, are breeding grounds for cyber criminals who trick […] More

  • Cyber Criminals Utilize Social Networks to Control Bots - top government contractors - best government contracting event
    in

    Cyber Criminals Utilize Social Networks to Control Bots

    Researchers at RSA FraudAction Research Lab have recently discovered a banking Trojan being hosted by a public social networking site. Any site which allows users to upload any type of content is vulnerable to the Trojan’s configurations, RSA says. “The Lab recently traced a social network profile that contained encrypted instructions for a variant of […] More

  • Facebook Message Saying Robbed and Stranded? Don't Fall For It, Says FBI - top government contractors - best government contracting event
    in

    Facebook Message Saying Robbed and Stranded? Don't Fall For It, Says FBI

    FBI’s cyber-crime complaint center IC3 continues to receive reports of email or social-networking accounts being compromised and used in a social-engineering scam to swindle consumers out of thousands of dollars. Pretending to be the victim, the hacker uses victims’ account to send a message to their contacts. The notice claims the victim is in immediate […] More

  • DoD Releases Policy on Internet Use, Social Media - top government contractors - best government contracting event
    in

    DoD Releases Policy on Internet Use, Social Media

    The Department of Defense has released its new policy on the safe and effective use of Internet technologies, including social networking and other Web 2.0 technology. The outline of the policy is in recognition of the integral role that “Internet-based capabilities” play in modern operations. The new policy applies to users on NIPRNET (non-classified networks) […] More

  • Who Develops Malware and Where Does it Come From? - top government contractors - best government contracting event
    in

    Who Develops Malware and Where Does it Come From?

    Malware, short for malicious software, seems to be more and more prevalent, assaulting users via social networking sites, email and infected web pages.  However, we rarely touch on where it comes from and who develops it from a business perspective. The ‘Annual Global Threat Report 2009’ written by ScanSafe provides some insight into these questions. […] More

  • Researchers Find Massive Botnet - top government contractors - best government contracting event
    in

    Researchers Find Massive Botnet

    Security researchers with NetWitness Corp. have discovered a massive botnet which includes at least 75,000 infected computers at 2,500 companies and government agencies throughout the world. The Kneber botnet has been used by cyber criminals to acquire login credentials for email systems, financial and social networking sites. The Kneber botnet is named after the username […] More

ExecutiveBiz Logo

Receive Daily News Briefing And Event Updates Straight to Your Inbox