Similar Posts
Local Trends comes to Twitter
The most popular micro blogging network ‘Twitter’ has now added local trends support. This new feature allows users to track Trending topics on twitter related to their region. Though, currently very less number of countries and cities added to it. In twitter words: Local Trends will allow you to learn more about the nuances in…
Everybody uses Web 2.0, but IT might not know it
Communications security firm FaceTime of Belmont, Calif., has released the results of a survey (of 1654 people) that strongly indicates we are all using a lot of Web 2.0 applications at work and a third of our IT staffs aren’t aware of it. It was FaceTime’s fifth annual survey. Social media and Web 2.0 apps…
Denial of availability and UK anti-piracy law
There could be a denial-of-availability risk to the enterprise in the new anti-piracy law passed by the British Parliament yesterday. Employees using company machines to swap pirated files could trigger a suspension of Internet service. The law is aimed at repeat offenders, however, employee misuse of company resources or botnet takeovers of machines for use…
Opfake scam targets iPhone users
Symantec Connect: The Opfake gang has been targeting Android mobile devices, as well as Symbian, but that does not mean they are limiting their targets to these platforms. Where there is money to be made, they are willing to invest time and resources. This includes scams designed for iPhone users. We have come across a…
Loose Tweets Sink Fleets
Information leakage is a real problem. It’s especially bad for high-security organizations, like military agencies. And it’s now harder than ever, thanks to services such as Flickr, Photobucket, Facebook, Twitter and Myspace. So, we worked together with Lewis Communications to submit a Freedom Of Information Act request to Ministry of Defence in UK, asking if…
Security issues on Android
One unique security feature of Android is the permission check when installing 3rd party apps. The system lists all permissions that an app requires and asks the user to check if that’s alright. Such permissions are the ability to receive your location, send or receive text messages, internet access, phone calls and many more. The…
