Blog Posts Tagged with "Facebook"
April 05, 2011 Added by:Headlines
"An estimated 600,000 people have clicked onto the link, which falsely promises to show them a funny Photoshopped image of themselves. In reality users install a rogue application which sends messages to their contacts via the social network's IM feature, continuing the infection cycle..."
April 04, 2011 Added by:David Navetta
Shortly after the FTC Privacy Framework's release and its “Do Not Track” proposal, the response was robust to say the least. Several major web browsers announced support for a browser-based means of defeating persistent online tracking...
March 30, 2011 Added by:Headlines
Facebook users were lured to the infected websites with specially designed spam messages, and the messages posted to their profile walls that contained links to infected sites, which caused the worm to spread rapidly across the network...
March 26, 2011 Added by:Theresa Payton
On Guard Online states that 22% of 16-24 year olds using social networking do not know who they are sharing their information with. It is that exact age range that is most at risk for invasion of privacy. This age group needs more education about the dangers of sharing too much information...
March 25, 2011 Added by:Headlines
"Typically AT&T customers’ data would have routed over the AT&T network directly to Facebook’s network provider but due to a routing mistake their private data went first to Chinanet then via Chinanet to SK Broadband in South Korea, then to Facebook..."
March 17, 2011 Added by:Headlines
The new feature allows users the option to "Always Use HTTPS". Among other security benefits, the HTTPS feature will prevent users from having their login credentials stolen by Firesheep attackers when logging in to their accounts over unencrypted Wi-Fi connections...
March 11, 2011 Added by:Headlines
Facebook has finally offered a resolution for a major privacy vulnerability that allows accounts to be hijacked by an application called Firesheep. Firesheep is a FireFox extension that can harvest login credentials when users access their accounts over unencrypted Wi-Fi networks...
March 09, 2011 Added by:Headlines
Users are asked to allow the service's application to interface with their LinkedIn, Facebook, and Twitter accounts. According to Cluley's research, potentially thousands of people have already done so. The problem is, no one is entirely sure what Connect.me is...
February 24, 2011 Added by:Tom Eston
One common misconception is that applications “look and feel” like they are part of Facebook so the applications can be trusted. This is not true. The Facebook API (Application Programming Interface) is designed to allow seamless integration so it provides users with a more integrated Facebook experience...
February 09, 2011 Added by:Rafal Los
Recently, I had the opportunity to exchange thoughts with Rebecca Herold, and talk about the erosion of privacy on the Internet, and specifically in social media. The topic is fascinating, as there appears to be an artificial adversarial relationship between anonymity and privacy...
February 05, 2011 Added by:Theresa Payton
Judge rules photos posted online are not privacy protected. If this ruling becomes precedent, you may have problems with bringing forward complaints or lawsuits on ANY future photos of you or loved ones, that are posted without your permission...
February 04, 2011 Added by:Headlines
Facebook has reconciled a major privacy vulnerability that left members susceptible to social engineering exploits and data theft. The flaw may have allowed users to unwittingly spread malware to their contacts and provided malicious websites access to private account information...
February 03, 2011 Added by:Headlines
Facebook has made steady progress in their efforts to offer better security, but it remains the responsibility of account holders to make sure they are utilizing all of the security features. One allows members to monitor their profile for any unauthorized access to their Facebook account...
February 02, 2011 Added by:Headlines
The exploits are a Trojan called Asprox.N and a malicious link attack called Lolbot.Q. Both play on the probability that targets will go to unusual lengths to regain access to their coveted Facebook accounts without stopping to question the nature of the instructions they have received...
February 01, 2011 Added by:David Navetta
Companies that handle personal information, especially those that provide online behavioral advertising services, and those that purchase or participate in such services, should consider a risk assessment of their policies, processes and activities in order to reduce legal risks...
January 26, 2011 Added by:Headlines
"Let the hacking begin: If facebook needs money, instead of going to the banks, why doesn’t Facebook let its users invest in Facebook in a social way? Why not transform Facebook into a ‘social business’ the way Nobel Price winner Muhammad Yunus described it? http://bit.ly/fs6rT3 What do you think?"
SecurityWeek NCAA Bracket Challenge: Registe... aman mathur on 03-25-2015
Update 3: Hackers May Leak Norton Antivirus ... jhunax Astillero on 03-25-2015
Bridging the Cybersecurity Divide, Why Secur... suresh dwivedi on 03-25-2015