Over 1 million tech questions and answers.

Social media security: Avoiding the phishing threats

Q: Social media security: Avoiding the phishing threats

Social media security:
Avoiding the phishing threats from Facebook, Twitter and LinkedIn

Social media may not be everyone?s cup of tea, but it is getting harder and harder to ignore for organisations ? especially from a cyber security perspective.

A range of recent research has highlighted the increasing dangers that organisations face from employees? social media usage.

One thing that stands out in the research is how little ?due diligence?, in the words of Raj Samani, CTO EMEA at Intel Security, is done when connecting with other accounts.

Intel Security?s research found that 24 percent of the 2000 UK-based respondents had connected with someone they did not know on LinkedIn.

69 percent of respondents had never wondered if someone was not whom they said they were on LinkedIn.

Research conducted by OnePulse for RiskIQ found that only 53 percent of people check for the verified badge when engaging with a retail brand.

Only 42 percent of people checked the brand?s other social media posts, 40 percent checked the brand?s replied to other people?s Tweets or posts. 31 percent checked the Twitter handle or Facebook URL while 24 percent checked the brand?s number of followers or likes.

These are concerning figures as it is easier than ever to set up a fake social media account.

A ProofPoint report revealed a huge number of fraudulent social media accounts and apps associated with the Olympics. 15 percent of Olympics-related social media accounts were fraudulent and 6 percent used the popularity of the Olympics to steal follower credentials through phishing attacks. 82 percent were impostor accounts, with misleading use of Olympic or sponsor brand elements to attract followers and interaction.

But these figures came alongside evidence of a lack of corporate leadership. 87 percent of respondents in the Intel Security survey said that their employer had never made them aware of any specific corporate policies around LinkedIn use.

Samani at Intel Security says that the main danger from social media historically would be a phishing approach.

?It doesn?t take a lot to do a targeted attack from the information that is available online through Twitter and LinkedIn.?

He says that ?promiscuous? activity on social media has made it much easier to carry out these attacks.

Phishing essentially aims to trick a user into giving up personal information.

Information harvested from social media could be used in a spear phishing email is more targeted still, appearing to be from an individual or business that seems to be known to the victim.

A common email scam, for example, sends an email to all of a victim?s contacts, claiming to have been stranded at a foreign airport and asking for the money to fly home.

The social media-driven attack could take key information from the profile, such as their job and their interests. This is then fed into the phishing email to convince the victim that this comes from someone who knows them.

There are other risks. Fraudulent social media accounts can send malicious links or adware.

A LogMeIn spokeswoman said that credentials are another risk. ?From a company social media standpoint, password security best practices are no different from those of an individual. You security is as strong as your weakest link, and often times for businesses that can be a single employee.?

There have been major cases in the news recently of account details such as usernames and passwords appearing on the Dark Web, with big companies involved such as O2 and Yahoo. Details stolen from social media accounts could also be valid credentials for accessing more sensitive corporate accounts, for example, or for consumer email accounts that have been used for work purposes.

A good starting point in preventing these threats is creating a social media policy for employees...

Continue reading this article at the link at the top of the page

RELEVANCY SCORE 200
Preferred Solution: Social media security: Avoiding the phishing threats

I recommend downloading and running Reimage. It's a computer repair tool that has been proven to identify and fix many Windows problems with a high level of success.

I've used it in the past to identify and fix everything from blue screens (BSOD's), ActiveX errors, corrupt files and processes, dll/exe/sys errors, recover lost memory, Windows update problems, defragging, malware removal etc.

You can download it direct from this link http://downloadreimage.com/download.php. (This link will automatically start a download of Reimage that you can save to your computer.)

A: Social media security: Avoiding the phishing threats

Great read, thanks Logethica




Logethica said:





Intel Security?s research found that 24 percent of the 2000 UK-based respondents had connected with someone they did not know on LinkedIn.

69 percent of respondents had never wondered if someone was not whom they said they were on LinkedIn.

Research conducted by OnePulse for RiskIQ found that only 53 percent of people check for the verified badge when engaging with a retail brand.

Only 42 percent of people checked the brand?s other social media posts, 40 percent checked the brand?s replied to other people?s Tweets or posts. 31 percent checked the Twitter handle or Facebook URL while 24 percent checked the brand?s number of followers or likes.Click to expand...

Most social Media is bad enough with security, you add user habits like this and your asking for trouble.
Thanks again buddy.
PeAcE

Read other 5 answers
RELEVANCY SCORE 84.4

http://nakedsecurity.sophos.com/2011/01/19/sophos-security-threat-report-2011-social-networking/This isn't just a problem for home users. Many people check their social networking accounts from the workplace, making the sites a potential vector for attacks against businesses. There's no doubt that cybercriminals are showing a much higher level of interest in the social networks than ever before, with Facebook being the site they are targeting the most. Facebook's recently clumsy introduction of a feature which would allow rogue application developers to access users' mobile phone numbers and home addresses (and its subsequent temporary withdrawal while it rethinks its approach) makes me question whether privacy and security are part of the company's DNA. I see two possibilities. Either Facebook simply doesn't "get" security and privacy. Or it just doesn't care.

A:Sophos report reveals increase in social networking security threats

This is funny because facebooks own CEO's fan page was Apparently hacked today as well as a hacker, hacked facebook altogether posting a status that showed on everyone's walls.
See here: http://www.computerworld.com/s/article/9206501/Mark_Zuckerberg_s_Facebook_page_apparently_hacked

Read other 4 answers
RELEVANCY SCORE 73.2

Easy Tips on Cyber Security and Use of Social Media This Summer:

Summer is in swing.

This is the time of the year when the majority of employees take time off work, due to child-care (with schools being closed) and wanting to spending time recharging their batteries.

Social media and cyber security play a big role in the summer. On a daily basis, and particularly when we travel, we are all guilty of sharing personal photographs, pictures of our families and kids on our social media accounts. With publicly showing our meals out or just picnics in the park, everybody can see where we go, how long for and when we are back home.

Cyber security is an issue that is becoming predominant both in our business and home life. That?s why we all need to educate ourselves in looking after our own online privacy, in order to reduce potential risks, such as burglaries for example.

Our public Twitter accounts can be merciless if a savvy criminal is planning to act.

Advertising your vacation plans on social media seems like a sharing-fun thing to do; however, digital footprints are all clues available to anyone who is trying to find out about us. We?re all guilty of Googling our names, so yes, potential criminals can track down your address this way.

They can track you down by checking your other social media accounts for clues. They can easily identify where you live. Did you know that insurance claims may not be granted if you have a public display of your whereabouts on social me... Read more

A:Tips on Cyber Security & Using Social Media This Summer

Always browse using incognito then keep eye on your accounts for possible compromise activities.

Until now, I saw few people fall on classy traps which automatically spam the posts.
 

Read other 1 answers
RELEVANCY SCORE 70.4

Hello everyone.

Days ago, on my mail, I received this message, apparently from "servizio.clienti(@)telecomitalia.it (ISP)" which invites me to access the service in order to obtain a refund of 110 ?. The message is a trap of course.

Spoiler: Fake mail




It's a classic attempt at theft of credit card numbers: I share It because it's wrote fine (no errors, credible logos, sender apparent very believable) and because it exceeded my phishing filters, (today WSA blocked It).

The Access button brings to this screen, which is actually hosted at "hxxp://it-10.com/tim.it/03ea4bc7e4d041256e398d2959adb74e/" and not at: Tim.it (Telecom Italy Mobile)

Spoiler: Fake page




Obviously the goal is to convince the user to enter password for Tim.it and subsequently the data of the credit card, that will end up in the hands of criminals.
I submitted the link to Firefox/Google (Report a Suspected Web Forgery).

This a classic social engineering and phishing attack: the promise of money confuses the users who enters their personal data.
This fraud is bound to the Italians users but others, very similar, happen worldwide.

Attention from who promises you something delicious: don't trust the sender's address (as you see above, It can fake), always check the correct name of the site in the addess bar and the closed lock icon that authenticates the site (HTTPS). If you receive mail like this, delete it: If you have not entered data, ... Read more

A:Phishing and Social Engineering attack Report

The login page is tricky one; have to look for the https://. There is none; it is http:// only.
 

Read other 2 answers
RELEVANCY SCORE 58

Hi forum, i would like to know if there is or are any social media sites that allow loading music on a page or anywhere else like myspace used to be.

I have no idea what happened to myspace but i used to use it years ago and it was something like facebook. A couple of years ago i checked myspace again and it became something like hi5, really crappy. I had an account there and some pictures there too but i don't know if i can get them back? i don't even remember my account name. Havn't used myspace for more than a decade

Read other answers
RELEVANCY SCORE 57.6

Hi everyone. My name is Mike.
Please do not laugh at my question. I am trying to learn everything I can about using social media.
If anyone here could help by directing me to some free online courses and or articles etc,I would greatly appreciate it. I am new to this so anything would be of help. I would like to know how to use facebook,instagram twitter etc. I would also like to know about creating fanpages. Thank you. I know I must sound silly but I have to start somewhere.
 

A:Want to Learn How to Use Social Media

Have you tried Googling "How to use Facebook"?
You will find several hits, same with the others.
 

Read other 2 answers
RELEVANCY SCORE 57.6

The risks of Social Media
Do you cyber-blab? Are you a compulsive Tweeter or Facebooker? Think carefully about what you post. A simple post about your daily visit to the local coffee shop could be enough to tell a burglar when it is safe to rob your house. Remember EVERYTHING on a Social Media site is public.

Facebook and Twitter
Don?t get carried away with what you post on these sites and remember that almost everything you post will be completely public and it is rather like walking down the local High Street and shouting at the top of your voice to everyone in earshot, everything that happened last night, what colour underwear you have on, your name & address and phone number and where you hide the spare keys to your front door.
Be very careful what you post on Facebook or tweet about. It can be used against you in court or by an insurance company, even something as mild and innocent as: ?I?m jogging every day to get fit for my holiday?. Not good if you?re claiming for whiplash after a car accident or you are off sick from work.
Lawyers, Insurance companies, your current or prospective employer will take the time to scroll your Facebook timeline and your tweet history for evidence that can go against you.
Scammers and Fraudsters will scan Facebook, Twitter and other social media sites for useful information that will help them scam you.
Read the rest on http://myonlinesecurity.co.uk/the-risks-of-social-media/
 

A:The risks of Social media

Read other 9 answers
RELEVANCY SCORE 57.6

Not really to do with a PC.
I am not a fan of social media and do not use any of them. Facebook in
my opinion can be dangerous considering the world situtation.
My question is this: Facebook is into everything so why do I have to use
Facebook to sign onto so many web sites?
 

A:Social Media/Facebook

I am not a fan of social media and do not use any of them. Facebook in my opinion can be dangerous considering the world situation.Click to expand...

I also do not use social media(Facebook, Twitter, etc.).

Facebook is into everything so why do I have to use Facebook to sign onto so many web sites?Click to expand...

If a site only offers that option to sign it, avoid it.

---------------------------------------------------------
 

Read other 1 answers
RELEVANCY SCORE 56.8

I have a logo which i want to place on social media sites. I am having difficulty placing the logo onto these sites. I try to open the logo files on my tablet, but it cannot do so.
Can anyone help me please?
 

Read other answers
RELEVANCY SCORE 56.8

If you want to get rid on those social media pop ups on the left hand side of your web page, this is how you do it.

1. Download Addblock Plus on Firefox

2. https://adblockplus.org/tutorials

3. Now find and click read more herebelow

Adblock Plus automatically installs a default filter list, based on the language of your browser. If you wish to learn how to add other filter lists, you can read more here. For more advanced options, like disabling tracking, click here.

4.Now find and click here below

Please click on "Add filter subscription", and open the drop-down menu for the filter list subscriptions to add new/more filters. Select the list you want to subscribe to, Adblock Plus automatically enable these lists by default. This menu only shows the most popular and recommended filters. Please go here for more filter lists.

5.Now find and click Fanboy's Annoyances and Fanboy's Social Blocking List

If you have any queries on this subject, please Google them as the above is really all I know.

A:How to disable Social Media Buttons and Pop Ups.

Just wanted to add, I've used AdBlock Plus on Firefox for years. It certainly gets rid of all the annoying pop-ups, etc. You'll like it.

Read other 3 answers
RELEVANCY SCORE 56.8

With the upcoming Holiday and Party Seasons, together with the increase of online and real world shopping at this time of year, it is time to remind our user bases that the Risks and Dangers associated with Social Media usage increases dramatically.
https://myonlinesecurity.co.uk/the-risks-of-social-media/
 

Read other answers
RELEVANCY SCORE 56.8

If you want to get rid on those social media pop ups on the left hand side of your web page, this is how you do it.

1. Download Addblock Plus on Firefox

2. https://adblockplus.org/tutorials

3. Now find and click read more herebelow

Adblock Plus automatically installs a default filter list, based on the language of your browser. If you wish to learn how to add other filter lists, you can read more here. For more advanced options, like disabling tracking, click here.

4.Now find and click here below

Please click on "Add filter subscription", and open the drop-down menu for the filter list subscriptions to add new/more filters. Select the list you want to subscribe to, Adblock Plus automatically enable these lists by default. This menu only shows the most popular and recommended filters. Please go here for more filter lists.

5.Now find and click Fanboy's Annoyances and Fanboy's Social Blocking List

If you have any queries on this subject, please Google them as the above is really all I know.

A:How to disable Social Media Buttons and Pop Ups.

Just wanted to add, I've used AdBlock Plus on Firefox for years. It certainly gets rid of all the annoying pop-ups, etc. You'll like it.

Read other 3 answers
RELEVANCY SCORE 56.8

Finding and addressing Twitter and Facebook threats requires a thorough understanding of how they're accomplished.

Social media threats are at an all-time high, ranging from account hijacking to impersonation attacks, scams, and new ways of distributing malware and executing phishing attacks. Sophisticated attacks target organizations of all sizes. For example, Microsoft was the victim of a series of social media hacks by nation-state threat actors. The attack campaign was extensive, affecting multiple Twitter accounts (principally Skype?s) and exposing corporate passwords and emails for dozens of Microsoft employees.

Because social media exists outside of the network perimeter, social media threats can manifest long before network perimeter and endpoint security detect malicious behavior. Detecting and mitigating these threats requires a thorough understanding of this new threat landscape. If we compare these tactics, techniques, and procedures to traditional network attack methods, we can draw some important contrasts.

Adversaries traditionally target a corporate network using two phases: reconnaissance and exploitation. Reconnaissance involves footprinting (for example, gathering information about an organization?s IP address and domains), scanning (identifying what systems are using what IPs), and enumeration (identifying the services and ports available on these target systems). When attackers use social media, their strategy is similar, but the methods of at... Read more

Read other answers
RELEVANCY SCORE 56.8

About three months ago, this program was making headlines all over the national news. I thought it was at the very least amusing and thought I would give it a try. When I installed the program, I didn't do all the setting up required. I tried to get rid of it today and upon attempting to uninstall it I got this message:

"The installation source for this product is not available. Verify that the source exists and you can access it."

It appears I need a file that would be in my temp files. I went to the website, www.socialmediasobrietytest.com to reinstall the software, and eventually got this message:

"Another version of this product is already installed. Installation of this version cannot continue. To configure or remove the existing version of this product, use Add/Remove Programs on the Control Panel."

So, now I'm stuck in a never-ending cycle. When a program does this, it usually gives me cause for concern, but everywhere I look I'm seeing that WebRoot designed the program and WebRoot makes anti-virus and anti-spyware software. There's no program with that title on www.webroot.com, however.

I've googled everything I can think of and I'm finding almost all of the media's coverage in Novemer and NOTHING about install/uninstall issues. Is this program malware/adware/spyware? How do I remove it? Is it ok to reinstall it and try it out? Thanks.

Windows 7. I may have installed it for IE or FireFox.
 

A:Social Media Sobriety Test

You could try Revo Uninstaller.
 

Read other 1 answers
RELEVANCY SCORE 56.8

Greetings,

My company is interested in setting up a social media presence online using Facebook.

We have a concern over negative feedback from customers or competitors or outside parties and that fact that the comments become a permanent record.

I would welcome comments from anyone with a point of view on this issue.

Many thanks!

A:Beginners guide to social media

Hello.First. . . I'm unsure of what your asking, could you clarify please?Secondly, it is my opinion that there is no such thing as "bad feedback" provided you make proper use of it. Both positive and negative feedback have use in determining your company's future. Positive feedback shows you what you're doing right, and negative feedback shows you how you can improve. Personally, if I see a company with only positive "testimonies" available I get a little bit suspicious; I believe that the ethical company should not take steps to hide flaws, but instead use those resources to find and correct said flaws. Finally, if by "negative feedback" you mean spam or troll attacks on your company, Facebook does provide the capability to remove offending comments from your page.Hope that helps.~Blade

Read other 2 answers
RELEVANCY SCORE 56.8

Hello,
 
I'm looking for software that can manage all my business social media accounts in one place.
It has to be able to manage Facebook (chat and wall), Twitter, Email (Microsoft), an on website chat and if possible also Telegram.
So far I only found brand embassy and live agent.
 
Any other suggestions?
 

Read other answers
RELEVANCY SCORE 56.8

I was running a disk cleanup because apparently my disk space was almost used up (though with what, I can't figure out.) So I decided to run a disk cleanup on my Surface RT, and that seemed to do something. However, I discovered it deleted the programs I
had pinned to my desktop and now for whatever reason I cannot view my messages via DeviantART (it is like Facebook, only for artists). I've restarted, rebooted, refreshed, logged off and then back on three times, retyped in the URL, but nothing I do can seem
to fix this problem. I can still view my messages on Gmail and on YouTube, but not on DeviantART. I know it isn't something with the website because I can view my messages on my laptop, but not my Surface. If anyone has any ideas as how to fix this or what
the problem might be, please help!

Read other answers
RELEVANCY SCORE 56.4

Cyber crime has reached a new battlefield ? social media platforms. Just as companies seek new opportunities to reach their target audience, so do cyber criminals. According to Proofpoint?s recent Social Media Brand Fraud Report, 19% of the 4,840 social media accounts associated with ten top worldwide brands were fraudulent.

Identikit fraudulent social media accounts
Carefully crafted, bogus accounts can be difficult to distinguish from legitimate ones. They replicate the brand account as much as they can, mimicking the logo, look and feel, and even content. The only difference is in what they propose to the audience: customer service at odd times, discounts, free gifts, and deals that are too good to be true. As the report says, ?the only difference might be something as small as one character in the Twitter handle, such as @askmajorbank vs. @ask_majorbank?.

Although social media platforms like Facebook, Twitter and Instagram have implemented an account verification service ? the blue checkmark badge next to the account name ? cyber criminals have become even smarter and can replicate the badge in their background image to fool customers. However effective account verification is, it doesn?t extend to posts or tweets and fraudsters know this all too well.

The 7 different types of fraudulent accounts
The research identified 7 different types of bogus accounts:
Phishing accounts
These bogus accounts are replicas of official brand products and customer suppor... Read more

A:7 types of social media account fraud

SpartacusSystem said:





Pornography
Pornographers exploit brands? popularity (based on number of followers) to distribute adult content and damage brand image and customer retention.Click to expand...

Wait, you mean the Dairy Queen account I follow isn't legit!?
 

Read other 0 answers
RELEVANCY SCORE 56.4

This is something i wonder of curiousity, if your photo is somehow compromised (i know how rare it is but still), if you upload the photo to lets say facebook, if than you download that same photo and open it will you get infected? Does the social media sites (facebook and so on) scan somehow the photos you upload? Is anyone aware? 

Read other answers
RELEVANCY SCORE 56.4

I just changed my phone number. Now all my social media sites wont let me go into my sites. I don't know what to do. Is there away to change my profiles.
 

A:I changed phone numbers, now cant get into my social media .

Phone number shouldn't matter unless you are accessing via your phone. In which case, I didn't know the phone number was tied to the account. You will likely need to contact each site and ask if your profile can be updated (or check their FAQ / support page). Aside from that, create a new account.
 

Read other 1 answers
RELEVANCY SCORE 56.4

Tech Support Guy System Info Utility version 1.0.0.4
OS Version: Microsoft® Windows Vista? Home Premium, Service Pack 2, 32 bit
Processor: Intel(R) Core(TM)2 CPU 4300 @ 1.80GHz, x64 Family 6 Model 15 Stepping 2
Processor Count: 2
RAM: 3069 Mb
Graphics Card: NVIDIA GeForce 8600 GTS, 256 Mb
Hard Drives: C: 222 GB (139 GB Free); D: 9 GB (4 GB Free);
Motherboard: Dell Inc., 0CT017
Antivirus: None

Censoring by FB, Twitter and Google creates the need alternatives. Has anyone any suggestions?

Txs
 

Read other answers
RELEVANCY SCORE 56.4

This is something i wonder of curiousity, if your photo is somehow compromised (i know how rare it is but still), if you upload the photo to lets say facebook, if than you download that same photo and open it will you get infected? Does the social media sites (facebook and so on) scan somehow the photos you upload? Is anyone aware? 

Read other answers
RELEVANCY SCORE 56.4

ESET technology now integrated directly into Facebook... so ESET Social Media Scanner for Facebook has now been discontinued
​ESET said:




Hello,

We just want to let you know about a change to ESET Social Media Scanner.

We?ve partnered with Facebook, which means that ESET?s award-winning technology is now integrated directly into the Facebook platform. Read more about it here »

As a result ? and after securing 73,441,194,563 links ? ESET Social Media Scanner is being discontinued as a stand-alone application for Facebook.

However, you can still enjoy full protection from ESET Social Media Scanner on Twitter, where you can use it to scan your timeline and lists automatically.

For even more scanning capability, why not try ESET Online Scanner to check and remove threats on your local drives? It?s effective, easy to use, and free.

Thanks
Your friends at ESETClick to expand...

For more information, go here: https://socialmediascanner.eset.com/#/profiles/eol

 

Read other answers
RELEVANCY SCORE 56.4

This is a thread I wanted to make for quite some time... namely since 2011 when the whole SOPA / PIPA / ACTA / CISPA madness started, as part of a massive plan to censor the internet. Like many others, I've been interested in a way to create a framework that would allow people to post what they want, without either an ISP being able to censor them nor the government being able to knock at a specific door and arrest someone for what they're hosting.
 
Most attempts to make this dream come true have been at networking level. Mesh networking in routers is an example of it being done through hardware, while TOR is an example of an attempt through software on existing devices. But all of these methods are either slow, unreliable, or unavailable for most people. So before this breakthrough happens, and people can create an internet that doesn't require ISP's and where your traffic can't be spied on, I've been thinking about different kind of platform. I'm a below average programmer, so I can't say I have the knowledge to do it alone... or maybe someone else attempted my idea already. In either case, I wanted to post about it and hear what people think, if this would ever be a viable project:
 
- The idea and functionality:
 
My idea is creating a full media platform, on which you can post text / video / music / pictures / web games, which could be used as either a blog or forum or journal or art site. In appearance it would be like most websites that accept submissio... Read more

Read other answers
RELEVANCY SCORE 56.4

I´m running a number of events this year and I am looking for a solution to project foursquare/twitter/facebook up on a large screen at the event so that users can see themselves on the screen. One of the obvious problems I envisage is that the page would need to refresh itself all the time.

The idea is that it drives a lot of social engagement but from a technical standpoint I have no clue how to do this or even where or what kind of forum I should be asking on.

Would anyone be able to point me in the right direction as to where I´m best to ask this question?
 

A:How can I project live social media onto a screen?

No big mystery, unless I'm missing something. Simply connect the PC to the screen/projector.
 

Read other 1 answers
RELEVANCY SCORE 56

No, You Can't Have My Social Security Number

Why using SSNs for identification is risky and stupid.

-- Tom
 

A:No, You Can't Have My Social Security Number

thanks
 

Read other 1 answers
RELEVANCY SCORE 55.6

Google Chrome has some tricks... Facebook and other social sites may offer alerts through Chrome web-browser, I wonder how to get to the settings page of those.

What should I input into address bar to get to it? ...this method.
 

A:Google Chrome social media sites alerts, getting to it

You want the notifications areas follow the steps below:
Settings > Show advanced settings > Privacy > Content settings?. Find Notifications, and choose from Allow all sites to show notifications, Ask when a site wants to show notifications or Do not allow any site to show notifications,
 

Read other 1 answers
RELEVANCY SCORE 55.6

Sorry if this is the wrong location to be posting this subject. I couldn't decide whether it should have been this or a networking subcategory. 
*please feel free to move if need be*
So, I have a new client. They want me to set up some kind of blocking tool or parental controls that block access to certain sites.
Facebook, twitter, youtube, and instagram basically.
I have done about 10 minutes of research because I'm very busy today but I haven't found really what I am looking for.
All the users log into the Domain on Win 7 Pro.
Please, any advice, as always is greatly appreciated!
-Jerry

A:Blocking social media sites for Office staff?

Hi jerrymck This could be easily done via the hosts file (implying the users don't have Admin Rights to edit it back), but the easiest way would be to obviously block these websites at a router level. Do they have a firewall, proxy, etc.?

Read other 8 answers
RELEVANCY SCORE 55.6

Microsoft Security Teams
US concerns?
There is much in the news relative to Cybersecurity. Discerning this data is becoming more and more arduous a task for even the Tech savvy professionals. What are your recommendations on how we can combat the treats and API's , URLS which are exposed to
the public on devices? 
What strategies and practices are you suggesting while we ramp up our Cybersecurity efforts? 

What accelerated, well-funded grants and campaigns are in motion to get our infrastructure rapidly up to speed?
What accelerated, well-funded educational and training programs are you supporting to accomplish the tasks?
Also, same for any contributions you are making toward similar efforts with securing our mobile devices,  ISP routers and devices?
Long Term Global Options?:
How could we potentially initiate a central respository for the general public to refer to for reporting potential threats, vulnerabilities, fake source sites,  while perhaps simultaneously acting as a central validation repository of Global Trust.
These are serious and potential conversations we need to be considering.

Regards

Read other answers
RELEVANCY SCORE 55.2

Hi everyone.

More and more these days we see a vertical bar at the left side of web pages with social media links. I believe they are called CSS Social Media Sidebars. They usually cover up what your trying to read. They really annoy me and I was wondering if there is a way to automatically stop them loading with webpages.

I know that you can use Ad Block Plus to remove some but that doesn't always work and it's not automatic.

Any ideas?

Many thanks in advance.

[/IMG]
 

Read other answers
RELEVANCY SCORE 54.8

Personal information belonging to more than 650,000 US customers of J.C. Penney and other retailers is at risk after the company hired to safeguard the data lost a backup tape.The information, which was entrusted to a company called GE Money, included social security information for about 150,000 people.... GE Money has offered to pay for 12 months of credit monitoring for anyone whose social security number was lost.Click here to read the full story.

A:Social Security Info For Customers At Risk

They should be required by a Federal Court to provide coverage for the life of each of the affected people.

Compromised data comes back to life over many years span.

Read other 1 answers
RELEVANCY SCORE 54.4

I added in yahoo mail signature 3 social media icons, one NEXT to each other, as shown here https://goo.gl/fFBtn5. But the icons come one BELOW each other: https://goo.gl/GzhQpZ


Any suggestions on how I can fix this bug or who should I contact at yahoo to fix it?

Thank you,

Hopper

Read other answers
RELEVANCY SCORE 54.4

I added in yahoo mail signature 3 social media icons, one NEXT to each other, as shown here https://goo.gl/fFBtn5. But the icons come one BELOW each other: https://goo.gl/GzhQpZ


Any suggestions on how I can fix this bug or who should I contact at yahoo to fix it?

Thank you,

Hopper

Read other answers
RELEVANCY SCORE 54.4

Does anyone know if Search Engines can crawl and index social media profile pages that are set to private (set to where only "friends" of that person are able to access the page)? The best analogy I can give is back in the Myspace era when users had the option to set their pages to private, and anyone who wasn't a 'friend' of that person and tried to access their profile would just get a blank screen that just said "This profile is set to private. You are not authorized to view this page," or something to that effect. I was just wondering if Search Engine crawler bots get this same sort of page when they try to access private profiles, or if somehow they are able to get past these blocks and thus crawl & index social media pages that are supposedly private. I have been searching all over the net trying to find an answer to this question but haven't been able to find anything.  

A:Can search engines crawl & index social media profiles set to private?

Probably not but I bet there are products that will do that for a price. 

Read other 1 answers
RELEVANCY SCORE 54.4

The United States Department of State wants to make it mandatory for all foreigners to provide social media details when applying for a visa to enter the US.

US authorities want to modify three visa application forms. The changes made to the three forms would make it mandatory for all visa applicants ?immigrant and non-immigrant? to provide all social media handles used in the last five years.

Diplomatic visas will be exempt from this new rule and some applicants might be asked to provide a list of emails and phone numbers used in the past five years, for additional vetting purposes.

The Department of State has not detailed the list of social media platforms for which it intends to collect account names but said the forms would include an optional section where applicants can enter usernames for online platforms not included in the main list.

Nearly 15 million visa applicants affected
The State Department is seeking Office of Management and Budget (OMB) approval to modify three US visa forms ?DS-156, DS-160, and DS-260.

These are visa forms that immigrant and non-immigrant visa applicants must fill in and submit before being allowed to enter the US. US officials estimate 710,000 immigrant seekers and 14 million non-immigrant visa applicants will be affected.
......
......
......Click to expand...
 

A:US Wants to Make Social Media Data Collection Mandatory for All Visa Applicants

They could just ask Facebook for all info.
 

Read other 3 answers
RELEVANCY SCORE 54.4

Stealing Social Security Numbers is not identity theft?.

This is a must read!

-- Tom
 

A:Stealing Social Security Numbers is not identity theft?

Read other 12 answers
RELEVANCY SCORE 52.4

Enter your informationWe have noticed an increasing fraudulent activity recently. In order to provide your security and protect you from fraudsters we have introduced a new system of identification that will help us to avoid any kind of fraud or unauthorised access.Please enter as more information as possible to provide your complete identification and to activate all the features of the new system.User Information:First Name: Last Name: Date of Birth (mm/dd/yyyy):/ / Social Security Number:- - Mother's Maiden Name:Card Information (ie, ATM, debit, credit card): Card Number: Card Expiration Date (mm/yyyy):/ Card CVV2: ATM PIN: thats what showed up when i tryied to log into ebay every time. i tried everything malewarebytes, ccleaner , spybot search & destroy, SuperAntiSpyware 4.35.1000 free edition, hitman pro 3.5, Microsoft security essentials, AVG 9.0 free edition, i even tried your combofix and followed the intructions from this site on what to do. turned off all virus protection programs and let it run. It did find a rootkit and IT removed it by rebooting once or twice in normal mode, just to make sure i even did it in safe mode too and found nothing there. (just let you know i also did the other programs in safe mode too still found nothing) i am still not able to log into ebay through IE or firefox 3.5.8 . so here is my dds log & my GMER log below . THANK... Read more

A:ebay possible malware / virus asking for My Name, social security# mother's maiden name, credit card#, ATM pin

Hello and and Welcome to BleepingcomputerPlease note we are very busy, so if I don't hear from you within 5 days the topic will be closed, If you have sinceresolved your issues I would appreciate if you would let me no so I can close this topic.I do not recommend that you have more than one anti virus product installed and running on your computer at a time. The reason for this is that if both products have their automatic (Real-Time) protection switched on, then those products which do not encrypt the virus strings within them can cause other anti virus products to cause "false alarms". It can also lead to a clash as both products fight for access to files which are opened again this is the resident/automatic protection. In general terms, the two programs may conflict and cause:1) False Alarms: When the anti virus software tells you that your PC has a virus when it actually doesn't.2) System Performance Problems: Your system may lock up due to both products attempting to access the same file at the same time.Therefore please go to add/remove in the control panel and remove either Microsoft Security Essentials or AVG.Download random's system information tool (RSIT) by random/random from here and save it to your desktop.Double click on RSIT.exe to run RSIT.Click Continue at the disclaimer screen.Once it has finished, two logs will open. Please post the contents of both log.txt (<Read more

Read other 51 answers
RELEVANCY SCORE 51.6

this computer is old but it should be running fater then it is. Plus my brther who is not very bright with computers has probably downloaded a few things he shouldnt heres a HJT log please help me clean this!! thanks!!!!

Logfile of HijackThis v1.99.1
Scan saved at 4:25:34 PM, on 10/2/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\COMODO\Firewall\cmdagent.exe
C:\Program Files\Comodo\common\CAVASpy\cavasm.exe
C:\WINDOWS\system32\pctspk.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\COMODO\Firewall\cfp.exe
C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.ca/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go... Read more

A:possible security threats

You say your PC is old. What CPU do you have, and how much RAM?
 

Read other 1 answers
RELEVANCY SCORE 51.6

With the huge variety of Security Threats ready to attack our computers today - those new to security may find this guide to the types of threat useful in understanding the various types of malware out there.

It's in the form of a downloadable and printable .PDF file and is written by the Security company Sophos

Read other answers
RELEVANCY SCORE 51.6

This is my experience & common mistake we'll make atleast once in a while & me & my friend almost paid a good price for our stupidity but got away with it luckily, so, wanted to share this experience so others may avoid these common mistakes.





Quote:

Social Media Scourges:
As we all use social media & with increasing integration on our hand-held devices, services such as geo-tagging & geo-location are on rise.
Geo-Location:
never use geo-location services from your home this is as good as putting posters around the city declaring your address, follow same practice @ your office.
Pattern Recognition:
if you happen to go to the same coffee shop/restaurant/Starbuck on every weekend, it's not difficult to decipher it. Don't update this information each time you visit the place on Twitter or Facebook.
"This was the mistake my roommate made by updating this(our fav coffee shop info on his Twitter page".
Phishing:
one of the common term we all know & heard of or about. Watch out for suspicious page invites on Facebook even from trusted sources such as your friends. (this just the same like Phishing mails we all recieve in our mailbox everyday/hour)
Facebook Engineering:
it's a well known fact that Facebook privacy setting are loose. Don't reveal too much personal information, avoid posting pictures that compromise your security, avoid posting your address & mobile number.
"even today you can find the Facebook database ... Read more

A:Security Threats You Should Know About

Is this the source of your post?

Security threats you should know about - Business of Life - livemint.com

Be sure to quote the source of your information.

Regards,
Golden

Read other 3 answers
RELEVANCY SCORE 51.6

I have tried various ways to remove these threats from my computer to no avail, Norton Anti-virus won't do it, I delete them from the control panel, I delete the file folders and delete them from the registry to the best of my ability, I delete them from wherever I can, and they just keep coming back, I have used Hijackthis too, I would greatly appreciate it if you could assist me in ridding my computer of these nuisances: [I]C:\WINDOWS\isrvs\ffisearch.exe
C:\WINDOWS\isrvs\desktop.exe
exdl.exe C:\WINDOWS\system32\netut80ex.vxd
exul.exe C:\WINDOWS\system32\netut80ex.vxd
javexulm.vxd C:\WINDOWS\system32\netut80ex.vxd
mqexdlm.srg C:\WINDOWS\system32\netut80ex.vxd
msexreg.exe C:\WINDOWS\system32\netut80ex.vxd
C:\Documents and Settings\Owner\Local Settings\Temp\mmbun2.exe
C:\Documents and Settings\Owner\Application Data\Phoenix\Profiles\Default\mesoyijy.slt\Cache\3579B73Bd01
C:\WINDOWS\inst\3p.exe

MUGATU

A:Security Threats

Please download HijackThis - this program will help us determine if there are any spyware/malware on your computer. Create a folder at C:\HJT and move HijackThis.exe there. Double click on the program to run it.

1. If it gives you an intro screen, just choose 'Do a system scan and save a logfile'.
2. If you don't get the intro screen, just hit Scan and then click on Save log.
3. Get HijackThis Analyzer and save it to the same folder as the hijackthis.log file. Run HijackThis Analyzer and type in y if you agree. The result.txt file will open up in Notepad. Copy the whole result.txt log and post it in the forum. We do not need the original hijackthis.log (unless we ask for it). Do not fix anything in HijackThis since they may be harmless.

Read other 7 answers
RELEVANCY SCORE 51.6

Having problem with the e2give removal. At least that how it seems to me. This is a problem because this computer is on a network at our business and any security risks are a threat to us. I have tried looking up help on the internet and all fixes or patches that i find remove my problems, but when I restart, they come back. If anyone can help me, please look over my log and see what you think.

Thank You SOOOOO much,
Amy


Logfile of HijackThis v1.99.1
Scan saved at 1:17:07 PM, on 5/5/2006
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\spoolsv.exe
C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe
C:\Program Files\Common Files\AOL\TopSpeed\2.0\aoltsmon.exe
C:\WINNT\System32\svchost.exe
C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\system32\stisvc.exe
C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\system32\svchost.exe
C:\Program Files\Trend Micro\OfficeScan Client\ofcdog.exe
C:\WINNT\Explorer.EXE
C:\WINNT\system32\hkcmd.exe
C:\PROGRA~1\Maxtor\OneTouch\Utils\OneTouch.exe
C:\WINNT\MXOALDR.EXE
C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe
C:\Program Files\Common Fi... Read more

A:Security threats?

Hi Amy, Welcome to TSF.

Please subscribe to this thread to be notified of fixes as soon as they are posted by our Team. To do this, please click the "Thread Tools" button located in the original thread line and selecting "Subscribe to this Thread".

Before you begin, take a read through these instructions and download the programs that I've advised. Save the below instructions in notepad or wordpad, because you also have to work in safe mode without networking support, so this page wouldn't be available then. You should not have any browsers open during the cleaning process unless otherwise prompted.

If there's anything that you don't understand, ask your question(s) before proceeding with the fixes. You should not have any open browsers when you are carrying out the procedures below.

Please allow yourself a few spare hours. Below are instructions for a virus scan(s) that can take longer then 2 hours.

It is also important you don't miss a step and perform everything in the right order!! .

********************************DOWNLOADS********************************

Please download these additional files/programs. Do not run them unless instructed to do so.
Unless otherwise stated, they should be stored in the same directory as the HiJackThis program.

Download and install CleanUp!. Do NOT run it yet.

Download Ewido Security Suite - Install & Update it's database but do not run it yet.

Unplug your computer from the Internet when you have fini... Read more

Read other 16 answers
RELEVANCY SCORE 51.2

I have a Dell Dimension 4700 with Windows XP. It's been running incredibly slow lately, and I run several spyware programs regularly along with Norton (including SpywareBlaster, SpyBot S&D, MS Windows Defender, and AdAware) which all find threats and remove them, but the problem continues. In the past couple of days, I was getting major security threats when doing searches on the internet, and suddenly this software called Privacy Center completely took over my PC - told me I had all these threats and my license had expired, so I needed to renew immediately and then would not let me close the program unless I paid for a license update. I never ordered this product in the first place, so not sure where it came from, but I couldn't close it, or do anything. So, I rebooted in Safe Mode and deleted that program thru Add/Remove Programs. I was then able to get in, but as soon as I did another internet search, the same threats started popping up again, that say I have a Trojan and it tries to download some program to remove it. I ran Hijackthis and the log is below. Can you help me please?

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 8:52:40 AM, on 11/29/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16915)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\syste... Read more

Read other answers
RELEVANCY SCORE 51.2

About a month ago TSG guided me to fixing a mess my FORMER repair person had created and all has been good since. Today I went to "LocalDisk(C)" to clean the temp files and the screen that came up did NOT look like what I rembered seeing before the local bozo did his thing. There are 19 "names" listed; 12 file folders, a couple of text documents, a "MS-DOS appli" and 4 system files (one called "pagefilesys" which contains 1,560,576KB! ) One of the file folders is "Documents and Settings" which takes me to "Tim" which is the one I want to clean. I click that and get to a screen that lists "local settings" (among 27 other items and I don't recall ALL THAT being there), I click on "local settings" and takes me to the screen which should hae the temp files I want to delete. I see them and delete them BUT there are also strange names I've never seen, like CR_4F5.tmp, AUCHECK_CORE.txt and [email protected]. WHUT??!! So I google those names and the websites that come up contain alarming words like trojan, malware, virus. Makes me very nervous.
Is my computer in danger? Is some action required on my part? Advice appreciated.
Thanks,
Judy
 

A:Solved: Possible security threats?

Read other 16 answers
RELEVANCY SCORE 51.2

Hi everyone!!

Welcome to the thread of my new project, my own Anti-Phishing software, that I'm writing during these days.
This project is intended to be useful for all, it is a portable application; and it is written in Java language.
JM Anti-Phishing is a work-in-progress software, and when the stable version will be finished, I'll obviously share it with you!
Here are some screenshots of JM Anti-Phishing (New UI):












JM Anti-Phishing - the future without malicious links.

Comments are always welcomed. Thank you all!

Key Features:
Block most recent phishing/malicious links (Percentage of detection limited)
Databases used: PhishTank, CLEAN-MX and M1 Anti-Phishing (Thanks to @Malware1 ).
Fast scan (1 or 2 minutes)
"Clear" button, which can clean link input box
"Scan with VirusTotal" button
Software avalaible in portable version
NOTE: Java is required to execute it, I hope in the future will not as now.

UPCOMING:

Submitting malicious links system with users' dedicated database online
Different languages
Higher percentage of detection
Download 0.9.8 BETA Version (Extract the .rar archive, then run the .bat file contained in the extracted folder; NOTE: run the .bat file into the folder!).

Download 0.9.8 BETA Version (Java not required, launch the .exe file contained in the downloaded folder) --->> Made by @TheSuperGeek

To paste the URL in the box, just press Ctrl+V buttons

TRANSLATIONS:

Well, the langu... Read more

A:JM Anti-Phishing, the Jo Man made security software!

Hello, I'll try it now !
Where is the link
 

Read other answers
RELEVANCY SCORE 51.2

Security Features Check » AMTSO




The AMTSO web site now hosts a number of easy to use tools to ensure that endpoint security products are configured to protect you from viruses, drive-by-downloads, potentially unwanted applications (PUA), archived malware and phishing and cloud attacks.

Because the usage growth of tablets and smartphones, endpoint security nowadays embodies more than just a desktop solution. Besides the Security Features Check for Desktop Solutions, AMTSO hosts similar checks for Android based devices. In the future, the AMTSO Security Features Checks will be extended to cover more features and expanded to cover more Operating Systems.Click to expand...

Android: Feature Settings Check for Android based Solutions » AMTSO

Manual Malware Downloads
Drive By Downloads
PUA
Phishing

Desktop: Feature Settings Check for Desktop Solutions » AMTSO

Manual Malware Downloads
Drive By Downloads
Compressed Malware
PUA
Phishing
Cloud Protection

 

A:Test your Security Features (amtso.org) - PUA and Phishing

Emsisoft AM blocks all except the phishing test but that's because they don't take part in the program. So Emsisoft AM 100% protection from the test.
 

Read other 2 answers