Remove Information Security Remove Media Remove Programming Remove Social
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat.

Media 52
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat.

Media 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Twitter Fined $150 Million for Misuse of 2FA User Data

SecureWorld News

Twitter, like many other social media websites, asks users to provide their phone number and email address to better protect their account. But instead of using this information for the sole purpose of improving security, Twitter profited by allowing advertisers to use this data to target individuals.

Data 88
article thumbnail

Spotlight on Cybersecurity Leaders: Bill Bowman

SecureWorld News

Bill Bowman, CISSP, CIPM, is the Chief Information Security Officer & Data Privacy Officer at financial software company Emburse. He is the father of five children and gives talks on helping families work through social media and technology challenges. He has been a first-hired CISO at five different companies.

article thumbnail

E-Government: A Graduate Class

CIO Musings

The class title is INFO 691 Topics in Information Systems – Digital Government This class is about using information and communication technologies to provide government services. Open data, social media, websites, APIs, collaboration & sharing networks. This will be a very hands-on course.

article thumbnail

Spotlight on Cybersecurity Leaders: Diego Maldonado

SecureWorld News

A : Regulatory action restricting the need for an individual to provide so much PII or sensitive information in order to operate within the social media or in some cases business realm. Even though some of the fields are optional, via some other form of social engineering your PII becomes available.

article thumbnail

3 ways to deter phishing attacks in 2023

CIO Business Intelligence

In fact, CIO has reported that it takes only a few minutes for experienced hackers to set up a social engineering attack against enterprises (and their managed service providers) that consider themselves to be secure and protected. Cyberattacks, Data and Information Security, Phishing Let’s dig deeper.

Training 140