• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Copycat Criminals mimicking Lockbit gang in northern Europe
  • Sandworm APT targets Ukraine with new SwiftSlicer wiper
  • ISC fixed high-severity flaws in DNS software suite BIND
  • Patch management is crucial to protect Exchange servers, Microsoft warns
  • Hacker accused of having stolen personal data of all Austrians and more
  • CVE-2023-23560 flaw exposes 100 Lexmark printer models to hack
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Social Networks (Page 24)

Social Networks

A new Facebook Worm exploits multiple cloud services

Security Experts at Malwarebytes security firm spotted a new  Facebook worm that spreads itself by leveraging multiple cloud services. Social media are a privileged attack vector, recent reports published by the principal security firms confirm that...

March 13, 2015  By Pierluigi Paganini   Posted In  Breaking News  Malware  Security  Social Networks 

Hacking Facebook by exploiting two reflected file download flaws

A security researcher has discovered two different  reflected file download flaws in Facebook that could be exploited to hit its users. Security researcher David Sopas from WebSegura has discovered a couple of security flaw in Facebook that could be exploited...

March 12, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Social Networks 

Twitter locked down Tor by requiring a phone number for sign-up

Internet users that want to create a new account on Twitter through the Tor network must now provide a phone number to verify their identity. A few days ago, Twitter announced plans to begin tracking users via their mobile phone number, a measure that...

March 4, 2015  By Pierluigi Paganini   Posted In  Breaking News  Laws and regulations  Security  Social Networks 

Facebook Policies and New Terms of Use Have Been under Scrutiny in Europe

A recent report about the privacy policy of Facebook has shed light to potential problems and disagreements with legal concerns in the EU. There is a recent report from Belgium focusing on the revised terms of use that have to do with Facebook. Due to its enormous...

March 2, 2015  By Pierluigi Paganini   Posted In  Breaking News  Digital ID  Laws and regulations  Security  Social Networks 

Twitter is tracking phone numbers to prevent trolls and abuses

Twitter announced that it is starting to track phone numbers of users as a measure to prevent abuses like the creation of new bogus accounts. A few weeks ago, Twitter CEO Dick Costolo explained the difficulties the company is facing to prevent the abuse...

February 28, 2015  By Pierluigi Paganini   Posted In  Breaking News  Security  Social Networks 

Serious flaws allowed the deletion of any comment on Facebook

A young hacker disclosed the details of an attack that by exploiting a couple of flaws in Facebook allowed him to delete any comment on the social network. The 19-year-old hacker Joe Balhis has discovered the way to delete any comment on Facebook by leveraging...

February 19, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Social Networks 

British army creates the 77th battalion to fight through social networks

The British Government has announced the creation of the 77th battalion, a cyber unit composed of soldiers familiar with social media. The documents leaked by Edward Snowden demonstrate that the NSA and its allies are now preparing for future dominance...

February 15, 2015  By Pierluigi Paganini   Posted In  Cyber warfare  Social Networks 

How to hack Facebook photo album of every user

An Indian security expert Laxman Muthiyah exploited a vulnerability in Facebook Graph API mechanism to delete Facebook photo albums of every user. A critical flaw in the popular social network Facebook recently discovered could allow ill-intentioned...

February 12, 2015  By Pierluigi Paganini   Posted In  Hacking  Social Networks 

A singular Facebook Trojan has already infected nearly 110,000 Facebook users

Security researcher is investigating in a new strain of Facebook Trojan that in just two days has already infected 1110,000 Facebook users. Social networks represent a privileged attack vector for malware-based attacks, a recent investigation conducted...

January 30, 2015  By Pierluigi Paganini   Posted In  Malware  Social Networks 

Reddit published its transparency report 2014

The Reddit social news website issued its first transparency report shows it complied with only 32 user info requests in 2014. Reddit, the popular social news website has released its first Reddit transparency report that details data related the requests...

January 30, 2015  By Pierluigi Paganini   Posted In  Social Networks 


« First‹ Previous202122232425262728Next ›Last »
Page 24 of 32



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version