Posts tagged "Facebook"

User Distrust at Heart of Facebook Troubles

Satisfaction with social-networking powerhouse Facebook has slumped, according to the latest survey from the American Customer Satisfaction Index — hitting a new record-low score in the social media category that placed it in the five lowest-scoring companies out of more than 230 surveyed. There are several immediate factors that undermine user trust:

  • Inconsistency. Facebook’s user interface changes constantly (think Timeline) and this inconsistency leaves users feeling like they don’t know what to expect next from the social media site. Consistency builds trust, but Mark Zuckerberg doesn’t seem to have much vision for consistency.
  • Lack of Transparency. The average user has very little comfort with or knowledge about how Facebook is collecting, analyzing, using and selling their personal data. While Facebook has a range of privacy and security settings, most users still don’t comprehend the enormity of the information that Facebook collects on them. This lack of transparency leaves users with a bad taste in their mouth, like they are being cleverly deceived for the sake of profit.

Posted in Digital Reputation & Trust, Fraud Detection & Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , , , , , ,

7 Security Secrets of Social Networking

image-5562
On the surface, social networking is like a worldwide cocktail party—full of new friends, fascinating places and tasty apps. Resisting the urge to drink from the endless fountain of information is nearly impossible because everyone else is doing it—connecting is often advantageous for professional reasons, it’s trendy and, unchecked, it can be dangerous.

Beneath the surface of the social networking cocktail party lives a painful data-exposure hangover for the average business. Sites like Facebook and Twitter are now the preferred tool for malware delivery, phishing, and “friends-in-distress” scams while more business oriented sites, like LinkedIn, allow for easy corporate espionage and the manipulation of your employees.

To avoid the cocktail party altogether is both impractical and naïve—the benefits of social networking outweigh the dangers—but applying discretion and wisdom to your social strategy makes for smart business. Follow these 7 Security Secrets of Social Networking to begin locking down your sensitive data.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , ,

Google and Facebook Go Deeper Into Your Privacy

image-5325
This post is a summary of an excellent article appearing in USA Today By Byron Acohido, Scott Martin and Jon Swartz.

It’s a heated competition to tap what many experts predict will be the next big Internet gold rush — online advertising — Google and Facebook laid down very big bets, during a week when European regulators are hashing out strict new rules that could prevent much of what the tech giants seek to do.

Google signaled its intent to begin correlating data about its users’ activities across all of its most popular services and across multiple devices. The goal: to deliver those richer behavior profiles to advertisers.

Likewise, Facebook announced it will soon make Timeline the new, more glitzy user interface for its service, mandatory. Timeline is designed to chronologically assemble, automatically display and make globally accessible the preferences, acquaintances and activities for most of Facebook’s 800 million members.

Posted in Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , , , ,

Avoiding Social Spam Hackers on Facebook and Twitter

image-5223
The post appears like it’s coming from a known friend. It’s enticing (“check out what our old high school friend does for a living now!”), feeds on your curiosity and good nature, begs you to click. A quick peek at the video, a chance to win a FREE iPad or to download a coupon, and presto, you’ve just infected your computer with malware (all the bad stuff that sends your private information to criminals and marketers). Sound like the spam email of days gone by? You’re right – spam has officially moved into the world of social media, and it’s like winning the lottery for cyber thugs.

What is Social Spam?

Nothing more than junk posts on your social media sites luring you to click on links that download malicious software onto your computer or mobile device.

Posted in Cyber Data Security, Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , ,

Why Facebook is Losing Face (Trust)

Do you have a nagging sense that Facebook isn’t always straight with you about how they share your personal information, photos, posts, friend lists, networks, likes and surfing habits? That they are selling your data in ways that you have never even imagined?

Your instincts are dead on. Facebook has been saying one thing to our faces and doing another behind our backs. Facebook is in pre-IPO mode and has the propaganda machine running overtime like Big Brother at an Animal Farm.

Enter the Federal Trade Commission (FTC). The FTC just released a formal complaint identifying eight counts against Facebook for violating the Federal Trade Commission Act. The FTC confirmed what we’ve always known: Facebook tells us what they think we want to hear, not necessarily the truth. Here are the details of Facebook’s dishonesty:

  • Under the guise of increasing user privacy, Facebook has consistently provided their advertisers with ever-expanding access to sensitive user information, not less.

Posted in Digital Reputation & Trust, Fraud Detection & Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , ,

Facebook Gets Slapped on Wrist by FTC for Lack of Privacy

Can social media and privacy mix? The short answer is no. Social media is social by nature (meaning others are involved) and is media based (meaning that the materials are designed to be easily communicated and shared). When something is essentially named Share with Others, privacy is an afterthought. But that doesn’t mean it should be completely non-existant, or at least transparent – so that we know what we are sharing with others.

The FTC (Federal Trade Commission) is about to hold Facebook to stronger safeguards regarding user privacy, but in the end, it won’t matter very much because they are leaving Facebook with lots of wiggle room.

Rumor has it that Facebook will soon have to acquire users’ consent before making changes to privacy policies that affect current user data. That is a total contrast to what they’ve done in the past, which is to rewrite their privacy policies to be less protective without so much as giving users a whiff of the changes to their privacy.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , ,

College Identity Theft Speaker

I’ve got a neighbor who’s going back to college this week and reminds me that this is by far the highest risk group for identify theft and it’s for a couple of reasons.  When these kids are going off to college, it’s the first time they are getting true financial independence, which might never have been trained to handle.  They have access to credit cards, to new bank accounts, and they’re managing it themselves.  That’s a huge red flag that there’s going to be trouble.  Number two, they’re going into an environment where their stuff is not particularly protected.  They’re in a dorm room, they’ve got roommates that may need extra cash; they know they can take advantage of them.  So it’s kind of a high risk environment.  The third reason is because they do so much online.  There’s so much social media interaction and that’s where ton of information is stolen. So you need to take some of these steps that are in this blog post.  Help your students take them.  It will help them out not just this year in college but helping them build their financial future going forward.  Your identity is pretty much everything in terms of your net worth. You got to take care of it now.

Posted in Identity Theft Prevention, Online Privacy, Video Tips by Identity Theft Speaker .
Tags: , , , , , , , , , , ,

Facebook Top Tips for Socializing Safely

  1. Only Friend people you know.
  2. Create a good password and use it only for Facebook.
  3. Don’t share your password.
  4. Change your password on a regular basis.
  5. Share your personal information only with people and companies that need it.
  6. Log into Facebook only ONCE each session. If it looks like Facebook is asking you to log in a second time, skip the links and directly type www.facebook.com into your browser address bar.
  7. Use a one-time password when using someone else’s computer.
  8. Log out of Facebook after using someone else’s computer.
  9. Use secure browsing whenever possible.
  10. Only download Apps from sites you trust.
  11. Keep your anti-virus software updated.
  12. Keep your browser and other applications up to date.
  13. Don’t paste script (code) in your browser address bar.
  14. Use browser add-ons like Web of Trust and Firefox’s NoScript to keep your account from being hijacked.

Posted in Cyber Data Security, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , , , ,

Facebook Apps Leaking Your Information

image-4747
A report was recently published claiming that nearly 100,000 Facebook apps have been leaking  access codes belonging to millions of users’ profiles. Symantec released the report and said that an app security flaw may have given apps and other third parties access to users’  profiles. Facebook maintains that they have no evidence of this occurring.

In their report, Symantec wrote:

We estimate that as of April 2011, close to 100,000 applications were enabling this leakage. We estimate that over the years, hundreds of thousands of applications may have inadvertently leaked millions of access tokens to third parties.

These “access tokens” help apps interact with your profile.They are most often used to post updates from the application to your wall. When you add the applications to your profile you, as the Facebook user, is giving the apps access to your information by accepting their conditions.  According to the investigation, these tokens were included in URLs sent to the application host and were then sent to advertisers and analytics platforms. If the recipient recognized the codes (meaning they have to be qualified to read and write HTML code), they could gain access to the user’s wall’s and profile.

Posted in Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , , , ,