Stolen Twitter accounts are now valued more than stolen credit card numbers in the cybercrime black market, if you would believe a new report from RAND Corporation, commissioned by Juniper Networks.
The rise of mobile browsing means people are using devices with smaller screens with no room for clunky banner ads. Yahoo is ditching banner ads completely by encouraging marketers to buy "Stream ads"--a term the company uses for their native ad placements.
SAN FRANCISCO--Close to half of IT security pros said their firms do not have a cloud app policy, while 17 percent said they are unaware of their firm's cloud app policy, opening up enterprises to security risks from unmonitored cloud apps.
An almost eerie reenactment of what happened to a developer who lost his $50k Twitter account, with the only exception being that disaster was averted in this instance--though only narrowly so.
Companies not in the big data game now need to realize that it's not just their direct competitors they need to worry about--but a shift in total market ownership.
The Syrian Electronic Army has been busy lately. The hacker group, which claims allegiance to Syrian President Bashar al-Assad, compromised Microsoft's Twitter account, Xbox Support site and the Official Microsoft blog, as well as Facebook's Whois domain record data, reports Mashable.
Twitter has rolled out comprehensive analytics for Twitter Card users. Good move on Twitter's part in upping its game, albeit in a limited fashion.
A majority of CEOs do their companies a disservice by having no social media presence, two new studies reveal.
A story has been making the rounds on how developer Naoki Hiroshima had his GoDaddy account hijacked by a hacker who subsequently used it to blackmail him to give up his coveted @N Twitter account.
Major data breaches are happening all the time. Just last week, more than two million passwords from Facebook, Gmail, Twitter and other accounts were stolen by hackers who installed keylogging malware on millions of computers. We all read about the breaches, but what happens after the breaches?