Some users criticize a mobile update making a time-sort feature harder to access
Two-speed inernet fears spark new lobbying drive
05 September 2014, 09:26. Topics: Social Media
Facebook is seeking important rulings on the collection of bulk user data under gag orders
09 August 2014, 06:43. Topics: Apps
Skype can no longer be used on Windows Phone 7 devices
08 August 2014, 19:19. Topics: Apps
The commercial court referred referred the case to the regional court
08 August 2014, 12:08. Topics: Apps
The developers are joining YouTube's video ads team
06 August 2014, 22:47. Topics: Mobile
- As Facebook privacy suit reaches 25,000 participant target, court is still unsure if it will allow it
- Windows Phone communicates better via upgraded Facebook, Viber apps
- LinkedIn pays almost $6M for wage law violations
- Over 11,000 jump on European 'class action' privacy suit against Facebook
Manchester, Edinburgh, Cambridge, Newcastle and Bristol are on the rise
30 July 2014, 10:25. Topics: Start-Ups
09 August 2013, 14:02. Topics: Apps
Training methods tailored to the latest generation of IT workers help ease the transition
05 June 2013, 18:54. Topics: Apps
Two-step identity verification and analysis of user trends could prevent future attacks, experts say
24 April 2013, 10:45. Topics: Security
KeepVid lets users watch YouTube videos later
MSN may be gone, but these tips can turn Skype into an even more powerful tool for saving money, streamlining meetings, and improving your overall business
Not sure where that tiny URL will lead? This handy service/browser extension will tell you if it's safe
Now you need to manually change your settings in order to show brands' Pages
A new class of software tells fibs on your behalf. Are these apps unethical?
As more and more business processes go mobile, IT faces an ever-increasing number of security challenges. Users now have access to a multitude of personal communication channels, such as social networking sites, untrusted personal applications, webmail, web browsing, and instant messaging. Without the proper structures in place, data-transfer mechanisms such as P2P file sharing, USB connectivity, media card swapping, Bluetooth™ and NFC data transfer can all pose a threat to the enterprise.
LinkedIn is the world’s fast-growing professional networking site that allows members to create business contacts, search for jobs and find potential clients. LinkedIn forms a vital link for more than 200 million professionals in more than 200 countries and territories who count on the LinkedIn network and consider it vital to their day-to-day professional life. They use it to stay connected with business contacts, expand their professional networks, develop closer relationships and build personal brand equity. LinkedIn has a diversified business model with revenues from member subscriptions, advertising sales and talent solutions.
Long before there was a World Wide Web the Internet was largely a playground for academics and the military, and most people still thought spam was just a canned meat. Yet there were already hoaxes and scams. Just as early Internet worms evolved into the mass-mailers of the last decade and then into Facebook clickjacking apps , and the pre-WWW world of Usenet and email morphed into social networks and Twitter, so social engineering adapted to the new environment.
Download this white paper to discover the evolution of misinformation and uncover how your organisation could be compromised.