Is your company using social media to its full potential when it comes to finding new employees? Your competition probably is.
New feature rolled out across iOS and Android, expected to land on desktop soon
11 December 2014, 14:00. Topics: Start Ups
IBM found several problems in how login credentials can be used for other websites
05 December 2014, 09:29. Topics: Social Media
Twitter will ping people's phones to see which other apps they have
27 November 2014, 09:42. Topics: Social Media
- Kovert Designs launches vibrating ring that alerts you to boss' emails
- Huddle claims 'Facebook at Work' won't be suitable for enterprise
- Spotify and Uber team up to allow passengers to stream playlists
- Facebook work collaboration tool makes sense, but could be another distraction, analysts say
- Facebook gives users more ways to filter their feeds
Yik Yak CEO Tyler Droll and Chief Operating Officer Brooks Buffington lay out their vision
13 October 2014, 11:48. Topics: Mobile
The FA struck a six year partnership deal with EE in February
25 September 2014, 12:24. Topics: Networking
Manchester, Edinburgh, Cambridge, Newcastle and Bristol are on the rise
30 July 2014, 10:25. Topics: Start Ups
09 August 2013, 14:02. Topics: Apps
- Tech-savvy college hires bring integration, communication challenges to IT workplaces
- AP Twitter hack prompts fresh look at cybersecurity needs
- Java's security problems 'unlikely to be resolved soon'
- Facebook Graph Search a great tool for phishing attacks
- Twitter unveils the Top Trends and Tweets of 2012
Some users criticize a mobile update making a time-sort feature harder to access
KeepVid lets users watch YouTube videos later
MSN may be gone, but these tips can turn Skype into an even more powerful tool for saving money, streamlining meetings, and improving your overall business
Not sure where that tiny URL will lead? This handy service/browser extension will tell you if it's safe
Now you need to manually change your settings in order to show brands' Pages
Also in slideshows:
As more and more business processes go mobile, IT faces an ever-increasing number of security challenges. Users now have access to a multitude of personal communication channels, such as social networking sites, untrusted personal applications, webmail, web browsing, and instant messaging. Without the proper structures in place, data-transfer mechanisms such as P2P file sharing, USB connectivity, media card swapping, Bluetooth™ and NFC data transfer can all pose a threat to the enterprise.
LinkedIn is the world’s fast-growing professional networking site that allows members to create business contacts, search for jobs and find potential clients. LinkedIn forms a vital link for more than 200 million professionals in more than 200 countries and territories who count on the LinkedIn network and consider it vital to their day-to-day professional life. They use it to stay connected with business contacts, expand their professional networks, develop closer relationships and build personal brand equity. LinkedIn has a diversified business model with revenues from member subscriptions, advertising sales and talent solutions.
Long before there was a World Wide Web the Internet was largely a playground for academics and the military, and most people still thought spam was just a canned meat. Yet there were already hoaxes and scams. Just as early Internet worms evolved into the mass-mailers of the last decade and then into Facebook clickjacking apps , and the pre-WWW world of Usenet and email morphed into social networks and Twitter, so social engineering adapted to the new environment.
Download this white paper to discover the evolution of misinformation and uncover how your organisation could be compromised.