A woman accused a federal agent of using her cellphone data to create a fake Facebook page.
Symantec warns of a phishing campaign that fools victims with fake emails from LinkedIn Support.
The hackers appear to be supporters of the Islamic State, and reportedly began tweeting out from the @CENTCOM Twitter account around 12:30 p.m.
The hacktivist collective's new campaign is in response to the recent attack on Charlie Hebdo and aims to target and report terrorist Twitter accounts.
Social media represents the next frontier of threats; 2015 will be the year for social media managers and IT security professionals to unite, one study says.
A phony Starbucks Instagram account is potentially being leveraged by miscreants to steal personal information.
Facebook unveiled its "Privacy Basics," guidelines that help users control and protect their information.
The social media site launched its Tor-friendly version to accommodate users who might want to keep their identities anonymous.
As quickly as social media can build a global brand, it can tear one down at the hands of malicious insiders or hackers.
Facebook accounts are now being protected by a new email standard known as Require-Recipient-Valid-Since.
The recent acquisition will allow Proofpoint customers to further secure their social media accounts.
A new Facebook scam leverages the popularity of the British actress to infect users with a trojan that steals data and signs up victims to a premium SMS scam.
The social media giant believes the limits imposed by the DOJ on data in transparency reports for its users violates its First Amendment rights.
The social media company in a blog post detailed its efforts to stop spammers and 'fake likes' businesses.
The vulnerability comes into play when Instagram users search for Facebook friends to "follow."
The Twitter account of Russian Prime Minister Dmitry Medvedev was hacked on Thursday to state, among other things, that he was resigning.
The use of social media spreads throughout the internet and cares little if the participants are Joe and Jane or the Massive Big Company. They're all swimming in the same pond and they all are susceptible to breaches that involve social media use. And how do most people use social media? Mobile devices.
Shortened URLs on Facebook, leading to a risqué webcam video, are actually being used to spread malware.
Lecpetex attackers may have infected up to 250,000 computers, Facebook revealed.
Researchers with PhishLabs analyzed nearly 9,000 phishing kits and learned that financial groups and social networks are most targeted.
The operation previously targeted victims by exploiting bugs in popular software, FireEye said.
The social networking giant worked with Trend Micro and F-Secure to make the free software available to users.
Facebook implemented a mechanism for detecting SSL man-in-the-middle attacks that a student, his academic advisor and two Facebook security experts helped develop.
Twitter implemented a system that identifies suspicious login behavior, as well as simplified the password reset process.
The Covert Redirect vulnerability could be used to, at the very least, steal credentials from users of big name websites, such as Facebook, Google and LinkedIn.
A post claims that Facebook users can gain extra privileges by inserting code into their browser console window, but all it does is follow and "like" posts by the scammer.
According to the programmer, Facebook responded to his findings, calling the attack scenario "interesting," but one it wouldn't fix.
Facebook debunked a reported claim by Mauritania Attacker, the alleged leader of hacktivist collective AnonGhost, that the social media website is vulnerable to DNS attacks.
Researchers identified a vulnerability in WhatsApp that could enable an attacker to intercept shared locations using a man-in-the-middle attack, or a rogue access point.
On Tuesday, the company unveiled the coming changes.
Sign up to our newsletters
SC Magazine Articles
- 'Sexy Girls' wallpaper app in Google Play store accessed account info
- Zeus variant targeting Canadian banks, U.S. banks may also be a target
- New attack uses ransomware to drop trojans and keyloggers
- 'GHOST' bug in Linux library enables remote takeover of victim's system
- Firm finds link between Regin spy tool and QWERTY keylogger
- Report: From Q3 to Q4, 90 percent increase in global DDoS attacks observed
- Researchers observe databases being encrypted, websites held for ransom
- ZeroAccess botnet reactivates, click fraud activity resumes
- BCBS of Tennessee shares personal data on 80K in marketing campaign
- Tips for organizations in the wake of the biggest corporate hack in history