On the hunt for Twitter bots
How security researchers were able to track down cryptocurrency bots on Twitter.
40 articles
How security researchers were able to track down cryptocurrency bots on Twitter.
In this edition, Jeff and Dave discuss how a McDonald’s drive-thru was hacked, USB drama, and more.
How Twitter’s “not-a-leak” made me realize that remembering passwords no longer works.
Jeff and Dave discuss a Facebook dating app, Twitter selling data to Cambridge Analytica, and more.
In this podcast, Jeff and Dave discuss the Facebook and Cambridge Analytica debacle, hackers making bomb threats, and more.
In this week’s edition Kaspersky Lab’s podcast, Dave and Jeff look at hackable heating, using Twitter to predict traffic jams and how to stop the spread of fake news.
Twitter debuts a grand but simple plan to replace passwords where your phone number is your username and an SMS-generated code is your password.
According to research by Kaspersky Lab, 22 percent of phishing scams on the web target Facebook.
A serious cross site scripting vulnerability was discovered in the popular Twitter application TweetDeck today. Users should revoke access to that app on Twitter as soon as possible.
Not long ago, Twitter was a novelty social media site that average users thought was silly. Now the microblogging tool is a vital news source and publishing platform, letting anyone
Twitter has recently caught up with competitors like Facebook and Google by improving user protection with two-factor authentication. This will help us all forget about those much talked about account
The Dow Jones Industrial Average fell precipitously Tuesday after a group of pro-Syrian hackers took control of an Associated Press Twitter account and tweeted that U.S. President Barack Obama had been injured
Twitter is an essential part of anyone’s brand these days, whether you’re a small company, a media mogul or someone who simply likes to share her views with anyone willing
This really shouldn’t need to be said, but here goes: You should never, ever – under any circumstances – post a picture of your debit or credit card anywhere online.
One of the many problems inherent in social networks such as Twitter, Facebook and LinkedIn is the issue of authentication. People want to connect with their friends and colleagues, but
Scareware is the catch-all name used for any of the numerous programs that weasel their way into computers and then pepper users with frightening pop-ups telling them their systems have
If you’ve used the Internet for more than seven minutes, you’ve probably been targeted by several hundred phishing attacks. Phishing, when attackers try to pry bank account numbers, codes and
You can tell your kids to stay off the social networks and you can tell yourself that they’ll listen, but chances are they’ll find a way on, anyway. So we’re
The phrase targeted attack looks to be redundant at first glance. Of course an attack is targeted. What good would it be without a target? But the reality is that