14 Results for



The case for enterprise micro-blogging

Contextual understanding of content is key for businesses. Tools like Tweetdeck help make sense of Twitter.

By March 1, 2009


10 Pinterest tips from a user with 1.2 million followers

Journalist Robert Anthony, who has 1.2 million followers after less than a year on Pinterest, offers up some of the latest thinking on the platform.

By January 30, 2013


Report: Targeted attacks aimed at Hotmail, Yahoo, Gmail

Attacks illustrate vulnerabilities with Web-based e-mail services, which can let attackers into the corporate network, reports say.

By June 3, 2011


Politicians who get Twitter...and some who don't

Do you want to find the most interesting Republicans and Democrats on Twitter? We'll tell you what they tweet about and whether they're worth following.

By May 4, 2009


Conficker also installs fake antivirus software

In addition to dropping a mystery payload on infected machines, the Conficker worm installs software that tries to dupe people into paying nearly $50 for fake antivirus software.

By April 10, 2009


15 cool apps from the Google Applications Gallery

Google App Engine enjoyed its first anniversary Tuesday, so we take a look at 15 apps from the company's Application Gallery that are worth trying out.

By April 8, 2009


Webware Radar: Microblog for celebrities

Also: Mashable has acquired micro-reviews service Blippr; Hi5 is making it easy to make mobile payments; and Twofish is doing its part for microtransactions.

By March 10, 2009


Expert: Twitter accounts hijacked in new attack

Don't fall for that tweet promising a Webcam chat with a 23-year-old woman, warns Trend Micro researcher.

By March 6, 2009


Facebook fights new Koobface worm, another rogue app

Yet another rogue app spreads on Facebook, as does new variant of Koobface worm that tricks users by including the name and photo of an intended victim's Facebook friend.

By March 2, 2009


Facebook halts rogue app, MySpace plugs hole

The social networks are tackling new security issues that could make personal information and private communications accessible to strangers.

By February 27, 2009