Categories » Social Media

How ISIS Games Twitter – June 16, 2014

6/16/14 – The Atlantic How ISIS Games Twitter

Iranian hackers ‘friended’ four-star U.S. admiral on Facebook to steal data using social media espionage – May 29, 2014

5/29/2014 – National Post Iranian hackers ‘friended’ four-star U.S. admiral on Facebook to steal data using social media espionage

DHS: Watch out for Introverts, Egotists, Passive Aggressive Colleagues- 12 May 2014

12 May 2014- FedWeek DHS: Watch out for Introverts, Egotists, Passive Aggressive Colleagues

Tor Is Being Used as a Safe Haven for Victims of Cyberstalking- 9 May 2014

9 May 2014- Vice News Tor Is Being Used as a Safe Haven for Victims of Cyberstalking

US State Department adopting social media to counter Al-Qaeda propaganda- 30 April 2014

30 April 2014- Ars Technica US State Department adopting social media to counter Al-Qaeda propaganda

Four of the newest (and lowest) Social Engineering scams- 21 April 2014

21 April 2014 Four of the newest (and lowest) Social Engineering scams

Wickr Spreads Its ‘Leave No Trace’ Messaging- 1 April 2014

1 April 2014- Dark Reading Wickr Spreads Its ‘Leave No Trace’ Messaging

Site lets people search satellite images for lost Malaysian plane- 11 March 2014

11 March 2014- CNet Site lets people search satellite images for lost Malaysian plane

What It’s Like When The FBI Asks You To Backdoor Your Software- 8 January 2014

8 January 2014 What It’s Like When The FBI Asks You To Backdoor Your Software

Snapchat Breach Exposes Weak Security- 2 January 2014

2 January 2014 Snapchat Breach Exposes Weak Security

Self-censorship – Facebook monitors everything users type and not publish- 15 December 2013

15 December 2013 Security Affairs Self-censorship – Facebook monitors everything users type and not publish

Stolen Facebook and Yahoo passwords dumped online- 4 December 2013

4 December 2013- BBC Stolen Facebook and Yahoo passwords dumped online

The Insidiousness of Facebook Messenger’s Mobile App Terms of Service- 1 December 2013

1 December 2013- Huffington Post The Insidiousness of Facebook Messenger’s Mobile App Terms of Service

Facebook vulnerability allows to view hidden Facebook Friend List – November 23, 2013

11/23/2013 – Security Affairs Facebook vulnerability allows to view hidden Facebook Friend List

Social media and digital identity. Prevention and incident response – October 29, 2013

10/29/2013 – Security Affairs Social media and digital identity. Prevention and incident response

In India, an App for Chats and for Keeping Secrets – 25 August 2014

25 August 2014 – by Saritha Rai – “New York Times” In India, an App for Chats and for Keeping Secrets. An app called Hike is being used for “keeping secrets” and is now the most popular Indian-made instant messaging … Continue reading

BuzzFeed Receives $50 Million Investment – 11 August 2014

11 August 2014 by Steve Inskeep – “NPR: Morning Edition” BuzzFeed Receives $50 Million Investment. Listicle giant BuzzFeed has received $50m from a venture capital firm. The company is expected to use that money to add a number of new … Continue reading

As Data Overflows Online, Researchers Grapple With Ethics – 12 August 2014

12 August 2014 by Vindu Goel – “The New York Times” As Data Overflows Online, Researchers Grapple With Ethics. Scholars are grappling with the ethical implications of using big data collected by corporations in order to conduct social science research. … Continue reading

The WIP hosted #LocalVoicesTalk about Women in Islam, a Twitter event.

On Thursday, July 24, The WIP hosted a Twitter chat “Women in Islam: Myth vs. Reality.” Join the conversation from 9:30 am – 10:30 am PDT on Twitter. #LocalVoicesTalk.  You can view a recap of the discussion here. There will also be … Continue reading

Infrastructure Hackers, Script Kiddies and “Watchdogs”: A Round-up of Monsters Under the Bed from CIS/MS-ISAC

A recent report from the MS-ISAC (Multi-State Information Sharing Analysis Center) and written by CIS (Center for Internet Security, a private nonprofit) publicized by security journalist Brian Krebs addresses a series of concerns regarding an infrastructure hacker who calls himself “Sun Hacker” … Continue reading