We see that Google is being sued by this country and that for privacy violations as a seemingly ongoing basis these days. But did you know that this seeming disregard for privacy by Google isn’t just a recent occurrence? I don’t have anything against Google. However, their record…or “privacy rap sheet” seems to speak for itself. Continue reading
Category Archives: Social Networking
“Trend Micro has spotted a malware sample, TSPY_MINOCDO.A, which targets Facebook users. The malware redirects users to a spoofed page of the social network and claims to be part of the site’s security check feature, even showing the tagline “Security checks help keep Facebook trustworthy and free of spam”. Users eager to log into Facebook may fall victim to this ruse, taking the ‘security check‘ for face value. Continue reading →
Cyber criminals have used the Internet and Twitter to influence the U.S. Stock Market, and in the future, who knows what else. Recently, the Associated Press Twitter account was hacked, and a bogus tweet generated “from the AP” stating that the White House was attacked. The result was its belief by many people and organizations in the world, including the Stock Market. As you might expect, the market reacted with a selloff and a large but short-lived plunge in its value. Continue reading →
Many people use Twitter, Facebook, Foursquare, Yelp, or other applications that allow announcements to be published on the Internet about where you are. Perhaps you do too. But did you know that criminals, both cyber and terrestrial, can take advantage of check-ins to do you harm?
Because these apps are used with your mobile device, they generate GPS coordinates; criminals can then pinpoint your location…and take action. Continue reading →
A young woman in Australia had her online identity stolen in one day after giving only her email addresses and social media handles to a white hat hacker. In this case, it was an ethical hack to show how identities can be stolen, but in a real life situation, a black hat hacker could have done the same, and the woman would be trying to recover from the theft right now.
The hacker used “her Skype account and activity on chat forums from more than five years ago that would provide easy access to other computer and Internet accounts such as her main email addresses.” Continue reading →
A new method of signing on to Internet accounts from your computer is called social sign on. It involves using your existing social networking (Facebook or Twitter) account to sign on to retail shopping and government services accounts. The objective is ease of use. Retailers and other service organizations don’t want you to have to do a time-consuming password reset when you forget your password Continue reading →
Have you Googled your name to see what other people see when they Google you? You should, you know. If you’re job hunting or expect to be in the future, you will be Googled by recruiters and hiring managers before offering you an interview, according to an article posted at Mashable.com, “you will be Googled”.
The article urges you to follow five suggested “things you can do to manage your online reputation.” They include the following steps: Continue reading →