ie8 fix

twitter

Twitter lets users toggle between see 'all' and 'no replies'

What do Steve Martin, Salman Rushdie, and Nascar all have in common? A new special feature on their Twitter accounts that lets followers decide whether to see their tweet conversations.

Twitter announced today that on certain verified accounts of well-known musicians, actors, athletes, and brands, users can decide whether to see back-and-forth exchanges. The way it works is by clicking "all" above the Tweets timeline on the user's profile page to see full conversations or by clicking "no replies" to see only original tweets.

"This simplified profile, which we're rolling out to verified accounts over the coming weeks, more

Face.com plugs Facebook, Twitter hijacking hole

A hole in the Face.com mobile app KLIK has been closed after a researcher discovered that it could be used to hijack Facebook and Twitter accounts.

KLIK lets people tag faces in photos using Facebook, which recently acquired Israel-based Face.com. But Ashkan Soltani, a privacy and security researcher, found that it also allowed anyone to hijack a KLIK user's accounts on Facebook and Twitter to get access to photos that were private.

"The above attack not only allows access to non-public photos, but also lets the attacker potentially manipulate the Face.com app to automatically 'recognize' anyone more

How attacks on social networks work

SAN FRANCISCO--Symantec detailed some of the dirty secrets of Facebook, Twitter, and Google+ threats at its annual reviewers' workshop here today, and revealed a planned project to protect you from social networking manipulators.

The project from Norton Labs, currently called Norton App Advisor, combines Norton's Safe Web data with social network open API data to provide a safety rating for apps. It aims to prevent malicious apps that prey on your social network activity from collecting data on you and your friends, which Symantec representatives said was a major security concern.

"Social networks have a trust model built in, more

Chirpify: Tweet if you want to give money to Obama or Romney

Chirpify, the company that essentially turns tweets into money, is getting into politics.

The company launched its "Tweet a Presidential Candidate" Web site today. The site lets donors give and track donations to the Barack Obama and Mitt Romney presidential campaigns with a tweet.

Chris Teso, Chirpify's CEO, said the 4-month-old company sees Twitter as the perfect platform for fundraising. He said Chirpify recognized social media's influential role during the 2008 presidential election when the Obama's campaign took advantage of social media for a grassroots approach.

"Now it's exponentially magnified this year," Teso said in an more

Paralyzed man sends first tweet with his eyes

Tony Nicklinson is a rugby fan, a husband, and a father. He also has locked-in syndrome, which has left him fully paralyzed. His only method of communicating is through a specially designed computer system triggered by small eye and head movements.

The tweet that started Nicklinson's social-media foray last week reads, "Hello world. I am tony nicklinson, I have locked-in syndrome and this is my first ever tweet. #tony "

more

Fleetwood Macintosh: #FailedTechBand names on Twitter

The top Twitter trend yesterday, #FailedTechBands, is a hilarious play on words that includes some clever imaginary band names.

According to trend-tracking site Topsy, the trend started with a tweet from Mashable features writer Christine Erickson that read "Fleetwood Macintosh #FailedTechBands."

Click through this CBSNews gallery to see more of these creative musical monikers.

Apple harvests MacBooks, iOS 6

Apple's announcements at WWDC were skewed heavily toward its Mac line, while also providing a first glimpse of the latest version of its iOS mobile operating system.

Perhaps the biggest news of the show was a redesigned 15.4-inch MacBook Pro that takes some design cues from the MacBook Air line. It boasts a 2,880x1,800-pixel resolution Retina Display screen, an HDMI port (an Apple first), USB 3.0, discrete Nvidia graphics, and the requisite Intel Ivy Bridge CPU, and Thunderbolt connections. However, starting at a whopping $2,199, this one is strictly for those with deep pockets. more

With FBI snooping on social media, how to protect privacy

The recently established Domestic Communications Assistance Center (DCAC) will develop new ways to eavesdrop on our communications. The FBI has been falling behind when it comes to this particular sector of snooping since the 1980s and early 1990s, when landlines were our primary method of communicating. If you're using a traditional phone, the FBI has very few problems keeping tabs on you. Today however, we use Skype, we tweet, send messages on Facebook, and hangout on Google to communicate with our friends, family, and associates. And the FBI wants to make sure it can detect illegal activity taking place more

Time turns page on iPad subscriptions

Skype's got ads, Vizio's got PCs, and we got issues (a whole Newsstand full of 'em):

Time Inc. has had a change of heart with Apple and will now begin selling magazine subscriptions through iPad's Newsstand app. Previous apps for Time Inc. magazines, like Sports Illustrated, only allowed for one issue to be purchased at a time. It also gave print subscribers free access.

Last year, Time Inc. opposed how Apple handled subscriptions, such as taking a 30 percent cut of sales and not releasing data on subscribers. But since then, Apple has lets readers opt-in to more

Google, Facebook, Twitter take on bad ads

Google, Facebook, Twitter, AOL, and the Interactive Advertising Bureau are joining forces to keep Web surfers safe from ads that serve up malware or scams.

The companies will announce tomorrow the formation of the Ads Integrity Alliance, which will be led by Maxim Weinstein, executive director of StopBadware, a nonprofit focused on protecting consumers from sites that lead to viruses, spyware and other malware.

The charter members will share information about scams and malware in advertising and develop policy recommendations and best practices, Weinstein said. "Having formal channels for sharing information about specific threats, trends and bad actors can be more

  • Recently Viewed Products
  • My Lists
  • My Software Updates
  • Promo
  • Log In | Join CNET