security

584 articles

Vulnerabilities in the iPhone

Apple iPhone users are notorious for their slight indulgence towards those who prefer alternative platforms. Android is constantly under attack by malware and Trojans, they say, while iOS is immune

Twitter security tips

The concept is simple: all posts must be limited to 140 characters maximum. Despite it’s simple concept, the site sure has grown. The simple idea of Twitter has allowed it

The Threat Landscape

The threat landscape has never been more extensive. In the past, security threats were limited to minor attacks that would cause a small amount of damage to a business. As

How to stay secure on LinkedIn

Unlike the majority of social media sites, LinkedIn is business oriented and focused on networking. This allows it to stand out and has contributed to its immense popularity. However, as

How to Stay Secure on Tumblr

Even if you don’t use it, it’s likely that you’ve heard of the popular microblogging site Tumblr. With its 275 million blogs, Tumblr has become a very popular social network,