article thumbnail

Mobile Device Security Policy

Tech Republic Security

In addition, the same social engineering, phishing and application/operating system vulnerabilities which plague desktops. Mobile devices are commonly used to conduct company business, which can render them more susceptible to risk than desktop or even laptop computers.

Mobile 141
article thumbnail

It's Time to Treat Social Media Like the Climate Crisis, Researchers Argue

Gizmodo

In a new paper published in the peer-reviewed journal PNAS (Proceedings of the National Academy of Sciences of the United States of America), a diverse group makes the case that the social media problem rises to the level of urgency that… Read more.

Media 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

PlantLife Is the Purest Social Platform I've Ever Tried

Gizmodo

I’m not a fan of most major social platforms. So when I first heard about PlantLife —a plant-centric social platform that rolled… Read more. Reddit’s always been too militaristic about free speech for my taste; TikTok is full of stomach-churning viral trends, Twitter’s riddled with hate speech , and Facebook is, well, Facebook.

Social 67
article thumbnail

Cops Want More of Our Social Media Data Than Ever Before

Gizmodo

Law enforcement doesn’t have much trouble getting access to data from social media companies. In fact, over the first half of last year, authorities in the US made close to 118,000 requests for user information from tech companies—a number that’s more than twice the number of requests thrown at these companies since… Read more.

Media 79
article thumbnail

Court Tells Bolsonaro He Can't Force Social Media Companies to Leave Up His Posts

Gizmodo

Brazilian president and hiccuping body horror exhibit Jair Bolsonaro’s gamble to force social media companies not to delete his or his supporters’ awful posts has failed. Read more.

Media 85
article thumbnail

The cyber pandemic: AI deepfakes and the future of security and identity verification

CIO Business Intelligence

The cryptographic signatures provided by mobile devices, operating systems, and apps are practically impossible to spoof because they’re backed by the extremely high-security practices of Apple and Android. This way, IT organizations can also shut down human social engineering vectors that circumvent or exploit IDV processes.

Security 111
article thumbnail

‘X,’ rated: Twitter’s new branding is called a rip-off and worse as bird goes bye-bye

GeekWire

Image via X) X now marks the spot where Twitter’s blue birdie used to be, as Elon Musk rebranded the social media company he owns. Musk’s X appears to be the same as that used for the X Window System, “a windowing system for bitmap displays, common on Unix-like operating systems,” as Wikipedia puts it.

Windows 85