Over 1 million tech questions and answers.

Anatomy Of A Social Media Attack

Q: Anatomy Of A Social Media Attack

Finding and addressing Twitter and Facebook threats requires a thorough understanding of how they're accomplished.

Social media threats are at an all-time high, ranging from account hijacking to impersonation attacks, scams, and new ways of distributing malware and executing phishing attacks. Sophisticated attacks target organizations of all sizes. For example, Microsoft was the victim of a series of social media hacks by nation-state threat actors. The attack campaign was extensive, affecting multiple Twitter accounts (principally Skype?s) and exposing corporate passwords and emails for dozens of Microsoft employees.

Because social media exists outside of the network perimeter, social media threats can manifest long before network perimeter and endpoint security detect malicious behavior. Detecting and mitigating these threats requires a thorough understanding of this new threat landscape. If we compare these tactics, techniques, and procedures to traditional network attack methods, we can draw some important contrasts.

Adversaries traditionally target a corporate network using two phases: reconnaissance and exploitation. Reconnaissance involves footprinting (for example, gathering information about an organization?s IP address and domains), scanning (identifying what systems are using what IPs), and enumeration (identifying the services and ports available on these target systems). When attackers use social media, their strategy is similar, but the methods of attack are quite different. In social media, targeting an organization and corporate network involves footprinting, monitoring and profiling, impersonating or hijacking, and, finally, attacking.

In a social media context, footprinting involves gathering information to identify employees, typically executives, as well as brand accounts owned by the target company. Names, email addresses, and phone numbers can be acquired from the company?s website and publications, the news media, and other sources to identify target social media accounts.

Next, the adversary seeks to establish a social media fake trust network to monitor and profile activities, behaviors, and interests across the social media accounts mapped to the organization. Keywords, hashtags, and @ mentions are also analyzed and used to establish trust when communicating with an impersonator account. Using relevant lingo establishes credibility and makes other employees less aware of an impersonator, making them more vulnerable to engaging in conversations.

Now that the organization has been footprinted, monitored, and profiled across the social networks, the adversary can set up one or more impersonating accounts. Impersonation is one of the most common techniques used by attackers on social media, particularly when targeting enterprises. Our sample of approximately 100 customers shows more than 1,000 impersonation accounts are created weekly by perpetrators. By impersonating a key executive, an attacker can quickly establish trust to befriend other employees.

The adversary may use the actual profile image and bio from the legitimate account to build the impersonation account. The figure below shows a Twitter account impersonating Berkshire Hathaway CEO Warren Buffett, complete with @ mentions and relevant keywords. To weaponize an account like this in an attack campaign, the attacker must do a fair amount of social engineering, all made much easier by social media. (Note that attackers made easy-to-miss changes in the spelling of the target?s name.)

Image Source: Twitter


Hijacking an account is more difficult than impersonating it but yields quicker results if successful. The most effective social media attacks on an organization occur when an attacker is successful in finding a method to hijack an account and use that to further infiltrate a network. Numerous social network data dumps have made account hijacking much easier.

Whether trust is established through an impersonation account or hijacked account, the adversary begins an attack by sending a direct message with malware or a phishing link to harvest credentials or infect a machine inside the network. This can be difficult to detect, as many of the social networks use URL shorteners that obfuscate the actual URL and may include multiple redirects. The following diagram depicts the anatomy of the attack. At this point, the internal beachhead has been established, the network has been compromised, and the adversary can expand their infiltration of the network.


Source: ZeroFOX


As social media threats continue to evolve, enterprises can fortify their detection and defenses by using additional countermeasures. The following is a list of some of key actions an organization can take to shore up their social media and network defenses:
Identify your organization?s social media footprint (companies, accounts, and key individuals).
Document responsible individuals for the corporate and brand accounts. These accounts should have strong passwords and two-factor authentication enabled (available from many social networks today).
When available, use verified accounts. Social networking companies such as Twitter and Facebook offer an option for verified accounts or profiles to ensure authenticity.
Monitor for impersonation accounts and, when you find them, arrange for takedown.
Enhance your perimeter security by leveraging a solution that feeds additional context, such as social media malicious URLs, into protection such as firewalls, intrusion detection, malware protection systems, proxies, or security information and event management systems.
Augment your incident response plan and process to encompass social media and include a takedown process.

Read other answers
RELEVANCY SCORE 200
Preferred Solution: Anatomy Of A Social Media Attack

I recommend downloading and running Reimage. It's a computer repair tool that has been proven to identify and fix many Windows problems with a high level of success.

I've used it in the past to identify and fix everything from blue screens (BSOD's), ActiveX errors, corrupt files and processes, dll/exe/sys errors, recover lost memory, Windows update problems, defragging, malware removal etc.

You can download it direct from this link http://downloadreimage.com/download.php. (This link will automatically start a download of Reimage that you can save to your computer.)

RELEVANCY SCORE 74

The Anatomy Of The Twitter Attack.

The Twitter document leak fiasco started with the simple story of personal accounts of Twitter employees being hacked. Here's how the hacker obtained the necessary information.

Very much worth reading.

-- Tom
 

A:The Anatomy Of The Twitter Attack

Interesting....
 

Read other 3 answers
RELEVANCY SCORE 74

Anatomy of a SQL Injection Attack.

"SQL injection has become perhaps the most widely used technique for compromising Web applications, thanks to both its relative simplicity and high success rate. It's not often that outsiders get a look at the way these attacks work, but a well-known researcher is providing just that. Rafal Los showed a skeptical group of executives just how quickly he could compromise one of their sites using SQL injection, and in the process found that the site had already been hacked and was serving the Zeus Trojan to visitors."

Los's original blog post has more and better illustrations.Click to expand...

-- Tom
 

A:Anatomy of a SQL Injection Attack

Yikes, I'd hate to be the guy responsible for coding that site when the CEO left that conference.
 

Read other 1 answers
RELEVANCY SCORE 73.2

Anatomy Of A Targeted, Persistent Attack (2 web pages).

New report provides an inside look at real attacks that infiltrated, camped out, and stole intellectual property and proprietary information -- and their links to China

Take away from article:

1) Routinely, submit the files: svchost.exe, iexplore.exe, iprinp.dll
and winzf32.dll to scans by online scanners which use a multiple set of
detection scans.

2) Never publically post your email address or instant messaging handles.

3) Scan PDF documents prior to opening the documents, and web links prior to visiting a new URL link.

-- Tom
 

Read other answers
RELEVANCY SCORE 64

Hello everyone.

Days ago, on my mail, I received this message, apparently from "servizio.clienti(@)telecomitalia.it (ISP)" which invites me to access the service in order to obtain a refund of 110 ?. The message is a trap of course.

Spoiler: Fake mail




It's a classic attempt at theft of credit card numbers: I share It because it's wrote fine (no errors, credible logos, sender apparent very believable) and because it exceeded my phishing filters, (today WSA blocked It).

The Access button brings to this screen, which is actually hosted at "hxxp://it-10.com/tim.it/03ea4bc7e4d041256e398d2959adb74e/" and not at: Tim.it (Telecom Italy Mobile)

Spoiler: Fake page




Obviously the goal is to convince the user to enter password for Tim.it and subsequently the data of the credit card, that will end up in the hands of criminals.
I submitted the link to Firefox/Google (Report a Suspected Web Forgery).

This a classic social engineering and phishing attack: the promise of money confuses the users who enters their personal data.
This fraud is bound to the Italians users but others, very similar, happen worldwide.

Attention from who promises you something delicious: don't trust the sender's address (as you see above, It can fake), always check the correct name of the site in the addess bar and the closed lock icon that authenticates the site (HTTPS). If you receive mail like this, delete it: If you have not entered data, ... Read more

A:Phishing and Social Engineering attack Report

The login page is tricky one; have to look for the https://. There is none; it is http:// only.
 

Read other 2 answers
RELEVANCY SCORE 58

Hi forum, i would like to know if there is or are any social media sites that allow loading music on a page or anywhere else like myspace used to be.

I have no idea what happened to myspace but i used to use it years ago and it was something like facebook. A couple of years ago i checked myspace again and it became something like hi5, really crappy. I had an account there and some pictures there too but i don't know if i can get them back? i don't even remember my account name. Havn't used myspace for more than a decade

Read other answers
RELEVANCY SCORE 57.6

The risks of Social Media
Do you cyber-blab? Are you a compulsive Tweeter or Facebooker? Think carefully about what you post. A simple post about your daily visit to the local coffee shop could be enough to tell a burglar when it is safe to rob your house. Remember EVERYTHING on a Social Media site is public.

Facebook and Twitter
Don?t get carried away with what you post on these sites and remember that almost everything you post will be completely public and it is rather like walking down the local High Street and shouting at the top of your voice to everyone in earshot, everything that happened last night, what colour underwear you have on, your name & address and phone number and where you hide the spare keys to your front door.
Be very careful what you post on Facebook or tweet about. It can be used against you in court or by an insurance company, even something as mild and innocent as: ?I?m jogging every day to get fit for my holiday?. Not good if you?re claiming for whiplash after a car accident or you are off sick from work.
Lawyers, Insurance companies, your current or prospective employer will take the time to scroll your Facebook timeline and your tweet history for evidence that can go against you.
Scammers and Fraudsters will scan Facebook, Twitter and other social media sites for useful information that will help them scam you.
Read the rest on http://myonlinesecurity.co.uk/the-risks-of-social-media/
 

A:The risks of Social media

Read other 9 answers
RELEVANCY SCORE 57.6

Hi everyone. My name is Mike.
Please do not laugh at my question. I am trying to learn everything I can about using social media.
If anyone here could help by directing me to some free online courses and or articles etc,I would greatly appreciate it. I am new to this so anything would be of help. I would like to know how to use facebook,instagram twitter etc. I would also like to know about creating fanpages. Thank you. I know I must sound silly but I have to start somewhere.
 

A:Want to Learn How to Use Social Media

Have you tried Googling "How to use Facebook"?
You will find several hits, same with the others.
 

Read other 2 answers
RELEVANCY SCORE 57.6

Not really to do with a PC.
I am not a fan of social media and do not use any of them. Facebook in
my opinion can be dangerous considering the world situtation.
My question is this: Facebook is into everything so why do I have to use
Facebook to sign onto so many web sites?
 

A:Social Media/Facebook

I am not a fan of social media and do not use any of them. Facebook in my opinion can be dangerous considering the world situation.Click to expand...

I also do not use social media(Facebook, Twitter, etc.).

Facebook is into everything so why do I have to use Facebook to sign onto so many web sites?Click to expand...

If a site only offers that option to sign it, avoid it.

---------------------------------------------------------
 

Read other 1 answers
RELEVANCY SCORE 56.8

About three months ago, this program was making headlines all over the national news. I thought it was at the very least amusing and thought I would give it a try. When I installed the program, I didn't do all the setting up required. I tried to get rid of it today and upon attempting to uninstall it I got this message:

"The installation source for this product is not available. Verify that the source exists and you can access it."

It appears I need a file that would be in my temp files. I went to the website, www.socialmediasobrietytest.com to reinstall the software, and eventually got this message:

"Another version of this product is already installed. Installation of this version cannot continue. To configure or remove the existing version of this product, use Add/Remove Programs on the Control Panel."

So, now I'm stuck in a never-ending cycle. When a program does this, it usually gives me cause for concern, but everywhere I look I'm seeing that WebRoot designed the program and WebRoot makes anti-virus and anti-spyware software. There's no program with that title on www.webroot.com, however.

I've googled everything I can think of and I'm finding almost all of the media's coverage in Novemer and NOTHING about install/uninstall issues. Is this program malware/adware/spyware? How do I remove it? Is it ok to reinstall it and try it out? Thanks.

Windows 7. I may have installed it for IE or FireFox.
 

A:Social Media Sobriety Test

You could try Revo Uninstaller.
 

Read other 1 answers
RELEVANCY SCORE 56.8

With the upcoming Holiday and Party Seasons, together with the increase of online and real world shopping at this time of year, it is time to remind our user bases that the Risks and Dangers associated with Social Media usage increases dramatically.
https://myonlinesecurity.co.uk/the-risks-of-social-media/
 

Read other answers
RELEVANCY SCORE 56.8

If you want to get rid on those social media pop ups on the left hand side of your web page, this is how you do it.

1. Download Addblock Plus on Firefox

2. https://adblockplus.org/tutorials

3. Now find and click read more herebelow

Adblock Plus automatically installs a default filter list, based on the language of your browser. If you wish to learn how to add other filter lists, you can read more here. For more advanced options, like disabling tracking, click here.

4.Now find and click here below

Please click on "Add filter subscription", and open the drop-down menu for the filter list subscriptions to add new/more filters. Select the list you want to subscribe to, Adblock Plus automatically enable these lists by default. This menu only shows the most popular and recommended filters. Please go here for more filter lists.

5.Now find and click Fanboy's Annoyances and Fanboy's Social Blocking List

If you have any queries on this subject, please Google them as the above is really all I know.

A:How to disable Social Media Buttons and Pop Ups.

Just wanted to add, I've used AdBlock Plus on Firefox for years. It certainly gets rid of all the annoying pop-ups, etc. You'll like it.

Read other 3 answers
RELEVANCY SCORE 56.8

Greetings,

My company is interested in setting up a social media presence online using Facebook.

We have a concern over negative feedback from customers or competitors or outside parties and that fact that the comments become a permanent record.

I would welcome comments from anyone with a point of view on this issue.

Many thanks!

A:Beginners guide to social media

Hello.First. . . I'm unsure of what your asking, could you clarify please?Secondly, it is my opinion that there is no such thing as "bad feedback" provided you make proper use of it. Both positive and negative feedback have use in determining your company's future. Positive feedback shows you what you're doing right, and negative feedback shows you how you can improve. Personally, if I see a company with only positive "testimonies" available I get a little bit suspicious; I believe that the ethical company should not take steps to hide flaws, but instead use those resources to find and correct said flaws. Finally, if by "negative feedback" you mean spam or troll attacks on your company, Facebook does provide the capability to remove offending comments from your page.Hope that helps.~Blade

Read other 2 answers
RELEVANCY SCORE 56.8

Hello,
 
I'm looking for software that can manage all my business social media accounts in one place.
It has to be able to manage Facebook (chat and wall), Twitter, Email (Microsoft), an on website chat and if possible also Telegram.
So far I only found brand embassy and live agent.
 
Any other suggestions?
 

Read other answers
RELEVANCY SCORE 56.8

I have a logo which i want to place on social media sites. I am having difficulty placing the logo onto these sites. I try to open the logo files on my tablet, but it cannot do so.
Can anyone help me please?
 

Read other answers
RELEVANCY SCORE 56.8

If you want to get rid on those social media pop ups on the left hand side of your web page, this is how you do it.

1. Download Addblock Plus on Firefox

2. https://adblockplus.org/tutorials

3. Now find and click read more herebelow

Adblock Plus automatically installs a default filter list, based on the language of your browser. If you wish to learn how to add other filter lists, you can read more here. For more advanced options, like disabling tracking, click here.

4.Now find and click here below

Please click on "Add filter subscription", and open the drop-down menu for the filter list subscriptions to add new/more filters. Select the list you want to subscribe to, Adblock Plus automatically enable these lists by default. This menu only shows the most popular and recommended filters. Please go here for more filter lists.

5.Now find and click Fanboy's Annoyances and Fanboy's Social Blocking List

If you have any queries on this subject, please Google them as the above is really all I know.

A:How to disable Social Media Buttons and Pop Ups.

Just wanted to add, I've used AdBlock Plus on Firefox for years. It certainly gets rid of all the annoying pop-ups, etc. You'll like it.

Read other 3 answers
RELEVANCY SCORE 56.8

I was running a disk cleanup because apparently my disk space was almost used up (though with what, I can't figure out.) So I decided to run a disk cleanup on my Surface RT, and that seemed to do something. However, I discovered it deleted the programs I
had pinned to my desktop and now for whatever reason I cannot view my messages via DeviantART (it is like Facebook, only for artists). I've restarted, rebooted, refreshed, logged off and then back on three times, retyped in the URL, but nothing I do can seem
to fix this problem. I can still view my messages on Gmail and on YouTube, but not on DeviantART. I know it isn't something with the website because I can view my messages on my laptop, but not my Surface. If anyone has any ideas as how to fix this or what
the problem might be, please help!

Read other answers
RELEVANCY SCORE 56.4

I just changed my phone number. Now all my social media sites wont let me go into my sites. I don't know what to do. Is there away to change my profiles.
 

A:I changed phone numbers, now cant get into my social media .

Phone number shouldn't matter unless you are accessing via your phone. In which case, I didn't know the phone number was tied to the account. You will likely need to contact each site and ask if your profile can be updated (or check their FAQ / support page). Aside from that, create a new account.
 

Read other 1 answers
RELEVANCY SCORE 56.4

Cyber crime has reached a new battlefield ? social media platforms. Just as companies seek new opportunities to reach their target audience, so do cyber criminals. According to Proofpoint?s recent Social Media Brand Fraud Report, 19% of the 4,840 social media accounts associated with ten top worldwide brands were fraudulent.

Identikit fraudulent social media accounts
Carefully crafted, bogus accounts can be difficult to distinguish from legitimate ones. They replicate the brand account as much as they can, mimicking the logo, look and feel, and even content. The only difference is in what they propose to the audience: customer service at odd times, discounts, free gifts, and deals that are too good to be true. As the report says, ?the only difference might be something as small as one character in the Twitter handle, such as @askmajorbank vs. @ask_majorbank?.

Although social media platforms like Facebook, Twitter and Instagram have implemented an account verification service ? the blue checkmark badge next to the account name ? cyber criminals have become even smarter and can replicate the badge in their background image to fool customers. However effective account verification is, it doesn?t extend to posts or tweets and fraudsters know this all too well.

The 7 different types of fraudulent accounts
The research identified 7 different types of bogus accounts:
Phishing accounts
These bogus accounts are replicas of official brand products and customer suppor... Read more

A:7 types of social media account fraud

SpartacusSystem said:





Pornography
Pornographers exploit brands? popularity (based on number of followers) to distribute adult content and damage brand image and customer retention.Click to expand...

Wait, you mean the Dairy Queen account I follow isn't legit!?
 

Read other 0 answers
RELEVANCY SCORE 56.4

ESET technology now integrated directly into Facebook... so ESET Social Media Scanner for Facebook has now been discontinued
​ESET said:




Hello,

We just want to let you know about a change to ESET Social Media Scanner.

We?ve partnered with Facebook, which means that ESET?s award-winning technology is now integrated directly into the Facebook platform. Read more about it here »

As a result ? and after securing 73,441,194,563 links ? ESET Social Media Scanner is being discontinued as a stand-alone application for Facebook.

However, you can still enjoy full protection from ESET Social Media Scanner on Twitter, where you can use it to scan your timeline and lists automatically.

For even more scanning capability, why not try ESET Online Scanner to check and remove threats on your local drives? It?s effective, easy to use, and free.

Thanks
Your friends at ESETClick to expand...

For more information, go here: https://socialmediascanner.eset.com/#/profiles/eol

 

Read other answers
RELEVANCY SCORE 56.4

This is something i wonder of curiousity, if your photo is somehow compromised (i know how rare it is but still), if you upload the photo to lets say facebook, if than you download that same photo and open it will you get infected? Does the social media sites (facebook and so on) scan somehow the photos you upload? Is anyone aware? 

Read other answers
RELEVANCY SCORE 56.4

This is a thread I wanted to make for quite some time... namely since 2011 when the whole SOPA / PIPA / ACTA / CISPA madness started, as part of a massive plan to censor the internet. Like many others, I've been interested in a way to create a framework that would allow people to post what they want, without either an ISP being able to censor them nor the government being able to knock at a specific door and arrest someone for what they're hosting.
 
Most attempts to make this dream come true have been at networking level. Mesh networking in routers is an example of it being done through hardware, while TOR is an example of an attempt through software on existing devices. But all of these methods are either slow, unreliable, or unavailable for most people. So before this breakthrough happens, and people can create an internet that doesn't require ISP's and where your traffic can't be spied on, I've been thinking about different kind of platform. I'm a below average programmer, so I can't say I have the knowledge to do it alone... or maybe someone else attempted my idea already. In either case, I wanted to post about it and hear what people think, if this would ever be a viable project:
 
- The idea and functionality:
 
My idea is creating a full media platform, on which you can post text / video / music / pictures / web games, which could be used as either a blog or forum or journal or art site. In appearance it would be like most websites that accept submissio... Read more

Read other answers
RELEVANCY SCORE 56.4

Tech Support Guy System Info Utility version 1.0.0.4
OS Version: Microsoft® Windows Vista? Home Premium, Service Pack 2, 32 bit
Processor: Intel(R) Core(TM)2 CPU 4300 @ 1.80GHz, x64 Family 6 Model 15 Stepping 2
Processor Count: 2
RAM: 3069 Mb
Graphics Card: NVIDIA GeForce 8600 GTS, 256 Mb
Hard Drives: C: 222 GB (139 GB Free); D: 9 GB (4 GB Free);
Motherboard: Dell Inc., 0CT017
Antivirus: None

Censoring by FB, Twitter and Google creates the need alternatives. Has anyone any suggestions?

Txs
 

Read other answers
RELEVANCY SCORE 56.4

I´m running a number of events this year and I am looking for a solution to project foursquare/twitter/facebook up on a large screen at the event so that users can see themselves on the screen. One of the obvious problems I envisage is that the page would need to refresh itself all the time.

The idea is that it drives a lot of social engagement but from a technical standpoint I have no clue how to do this or even where or what kind of forum I should be asking on.

Would anyone be able to point me in the right direction as to where I´m best to ask this question?
 

A:How can I project live social media onto a screen?

No big mystery, unless I'm missing something. Simply connect the PC to the screen/projector.
 

Read other 1 answers
RELEVANCY SCORE 56.4

This is something i wonder of curiousity, if your photo is somehow compromised (i know how rare it is but still), if you upload the photo to lets say facebook, if than you download that same photo and open it will you get infected? Does the social media sites (facebook and so on) scan somehow the photos you upload? Is anyone aware? 

Read other answers
RELEVANCY SCORE 55.6

Social media security:
Avoiding the phishing threats from Facebook, Twitter and LinkedIn

Social media may not be everyone?s cup of tea, but it is getting harder and harder to ignore for organisations ? especially from a cyber security perspective.

A range of recent research has highlighted the increasing dangers that organisations face from employees? social media usage.

One thing that stands out in the research is how little ?due diligence?, in the words of Raj Samani, CTO EMEA at Intel Security, is done when connecting with other accounts.

Intel Security?s research found that 24 percent of the 2000 UK-based respondents had connected with someone they did not know on LinkedIn.

69 percent of respondents had never wondered if someone was not whom they said they were on LinkedIn.

Research conducted by OnePulse for RiskIQ found that only 53 percent of people check for the verified badge when engaging with a retail brand.

Only 42 percent of people checked the brand?s other social media posts, 40 percent checked the brand?s replied to other people?s Tweets or posts. 31 percent checked the Twitter handle or Facebook URL while 24 percent checked the brand?s number of followers or likes.

These are concerning figures as it is easier than ever to set up a fake social media account.

A ProofPoint report revealed a huge number of fraudulent social media accounts and apps associated with the Olympics. 15 percent of Olympics-related social media accounts were fr... Read more

A:Social media security: Avoiding the phishing threats

Great read, thanks Logethica




Logethica said:





Intel Security?s research found that 24 percent of the 2000 UK-based respondents had connected with someone they did not know on LinkedIn.

69 percent of respondents had never wondered if someone was not whom they said they were on LinkedIn.

Research conducted by OnePulse for RiskIQ found that only 53 percent of people check for the verified badge when engaging with a retail brand.

Only 42 percent of people checked the brand?s other social media posts, 40 percent checked the brand?s replied to other people?s Tweets or posts. 31 percent checked the Twitter handle or Facebook URL while 24 percent checked the brand?s number of followers or likes.Click to expand...

Most social Media is bad enough with security, you add user habits like this and your asking for trouble.
Thanks again buddy.
PeAcE
 

Read other 5 answers
RELEVANCY SCORE 55.6

Easy Tips on Cyber Security and Use of Social Media This Summer:

Summer is in swing.

This is the time of the year when the majority of employees take time off work, due to child-care (with schools being closed) and wanting to spending time recharging their batteries.

Social media and cyber security play a big role in the summer. On a daily basis, and particularly when we travel, we are all guilty of sharing personal photographs, pictures of our families and kids on our social media accounts. With publicly showing our meals out or just picnics in the park, everybody can see where we go, how long for and when we are back home.

Cyber security is an issue that is becoming predominant both in our business and home life. That?s why we all need to educate ourselves in looking after our own online privacy, in order to reduce potential risks, such as burglaries for example.

Our public Twitter accounts can be merciless if a savvy criminal is planning to act.

Advertising your vacation plans on social media seems like a sharing-fun thing to do; however, digital footprints are all clues available to anyone who is trying to find out about us. We?re all guilty of Googling our names, so yes, potential criminals can track down your address this way.

They can track you down by checking your other social media accounts for clues. They can easily identify where you live. Did you know that insurance claims may not be granted if you have a public display of your whereabouts on social me... Read more

A:Tips on Cyber Security & Using Social Media This Summer

Always browse using incognito then keep eye on your accounts for possible compromise activities.

Until now, I saw few people fall on classy traps which automatically spam the posts.
 

Read other 1 answers
RELEVANCY SCORE 55.6

Sorry if this is the wrong location to be posting this subject. I couldn't decide whether it should have been this or a networking subcategory. 
*please feel free to move if need be*
So, I have a new client. They want me to set up some kind of blocking tool or parental controls that block access to certain sites.
Facebook, twitter, youtube, and instagram basically.
I have done about 10 minutes of research because I'm very busy today but I haven't found really what I am looking for.
All the users log into the Domain on Win 7 Pro.
Please, any advice, as always is greatly appreciated!
-Jerry

A:Blocking social media sites for Office staff?

Hi jerrymck This could be easily done via the hosts file (implying the users don't have Admin Rights to edit it back), but the easiest way would be to obviously block these websites at a router level. Do they have a firewall, proxy, etc.?

Read other 8 answers
RELEVANCY SCORE 55.6

Google Chrome has some tricks... Facebook and other social sites may offer alerts through Chrome web-browser, I wonder how to get to the settings page of those.

What should I input into address bar to get to it? ...this method.
 

A:Google Chrome social media sites alerts, getting to it

You want the notifications areas follow the steps below:
Settings > Show advanced settings > Privacy > Content settings?. Find Notifications, and choose from Allow all sites to show notifications, Ask when a site wants to show notifications or Do not allow any site to show notifications,
 

Read other 1 answers
RELEVANCY SCORE 55.2

Hi everyone.

More and more these days we see a vertical bar at the left side of web pages with social media links. I believe they are called CSS Social Media Sidebars. They usually cover up what your trying to read. They really annoy me and I was wondering if there is a way to automatically stop them loading with webpages.

I know that you can use Ad Block Plus to remove some but that doesn't always work and it's not automatic.

Any ideas?

Many thanks in advance.

[/IMG]
 

Read other answers
RELEVANCY SCORE 54.4

I added in yahoo mail signature 3 social media icons, one NEXT to each other, as shown here https://goo.gl/fFBtn5. But the icons come one BELOW each other: https://goo.gl/GzhQpZ


Any suggestions on how I can fix this bug or who should I contact at yahoo to fix it?

Thank you,

Hopper

Read other answers
RELEVANCY SCORE 54.4

The United States Department of State wants to make it mandatory for all foreigners to provide social media details when applying for a visa to enter the US.

US authorities want to modify three visa application forms. The changes made to the three forms would make it mandatory for all visa applicants ?immigrant and non-immigrant? to provide all social media handles used in the last five years.

Diplomatic visas will be exempt from this new rule and some applicants might be asked to provide a list of emails and phone numbers used in the past five years, for additional vetting purposes.

The Department of State has not detailed the list of social media platforms for which it intends to collect account names but said the forms would include an optional section where applicants can enter usernames for online platforms not included in the main list.

Nearly 15 million visa applicants affected
The State Department is seeking Office of Management and Budget (OMB) approval to modify three US visa forms ?DS-156, DS-160, and DS-260.

These are visa forms that immigrant and non-immigrant visa applicants must fill in and submit before being allowed to enter the US. US officials estimate 710,000 immigrant seekers and 14 million non-immigrant visa applicants will be affected.
......
......
......Click to expand...
 

A:US Wants to Make Social Media Data Collection Mandatory for All Visa Applicants

They could just ask Facebook for all info.
 

Read other 3 answers
RELEVANCY SCORE 54.4

Does anyone know if Search Engines can crawl and index social media profile pages that are set to private (set to where only "friends" of that person are able to access the page)? The best analogy I can give is back in the Myspace era when users had the option to set their pages to private, and anyone who wasn't a 'friend' of that person and tried to access their profile would just get a blank screen that just said "This profile is set to private. You are not authorized to view this page," or something to that effect. I was just wondering if Search Engine crawler bots get this same sort of page when they try to access private profiles, or if somehow they are able to get past these blocks and thus crawl & index social media pages that are supposedly private. I have been searching all over the net trying to find an answer to this question but haven't been able to find anything.  

A:Can search engines crawl & index social media profiles set to private?

Probably not but I bet there are products that will do that for a price. 

Read other 1 answers
RELEVANCY SCORE 54.4

I added in yahoo mail signature 3 social media icons, one NEXT to each other, as shown here https://goo.gl/fFBtn5. But the icons come one BELOW each other: https://goo.gl/GzhQpZ


Any suggestions on how I can fix this bug or who should I contact at yahoo to fix it?

Thank you,

Hopper

Read other answers
RELEVANCY SCORE 50

After working with TSF experts and trying many things my java runtime environment will not work. Also, links posted to social media do not work that link to my website on avahost.com ( Cloud Hands Virtual Gallery) but same links will work when pasted into a browser. For example this link was not working earlier when posted to TSF: http://jerryrosspittore.com/Verify.png but works ok when pasted into Chrome or IE10.

I have run the programs suggested by Rich and am attaching the attach.zip file in hope they can shed some light on my problem.

Read other answers
RELEVANCY SCORE 48.4

I have been infected by a virus or trojan etc.My access to internet is now partial .Some times it connects and sometimes it does not connect.Also one ad comes on top of other ads in the network asking to join some social media sites.I have formatted all my drives many times but still the virus comes back. Please help.

A:internet virus , social media virus

 
 Install and run MBAM
Information about MBAM: http://www.bleepingcomputer.com/virus-removal/how-to-use-malwarebytes-anti-malware-tutorial
If this scan has been done, please post the the log into your next reply.
 

  Running TDSSKiller to obtain log
 
Note: Don't cure or delete a threat, but choose skip for all instead.
Please download TDSSKiller from here and save it to your Desktop
Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters

In the Additional options: Check Detect TDLFS file system
Click Start Scan and allow the scan process to run

Choose for all threats to Skip for all of them.
Click Continue
Please post the TDSSKiller.[Version]_[Date]_[Time]_log.txt found in your root directory (typically c:\)
===================================================
 
 ESET Online Scanner
==================
Note: If your AV is blocking Eset online scanner, please temporarily disable your AV.
 
I'd like us to scan your machine with ESET OnlineScan This process may may take several hours, that is normal.
Hold down Control and click on this link to open ESET OnlineScan in a new window.
Click the  button.
For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desk... Read more

Read other 14 answers
RELEVANCY SCORE 47.2

Im interested in learning the anatonmy of a motherboard to add to my knowlage of building PCs. Knowing each peice on a 1 on 1 level would greatly help me in troubleshooting problems. Can anyone tell me where I can get a guide/book/ebook on learning what every little peice of a mobo does and how it works on a whole?
 

A:Motherboard anatomy

Here you go, goo luck: http://users.iafrica.com/g/gl/glynhall/hohweb/manuals.htm
 

Read other 3 answers
RELEVANCY SCORE 47.2

Hello

What is a Crypter ?

The Crypter is a software that can encrypt the executable file (.exe).

Usually are used to encrypt, RAT virus, keyloggers, spywares and other types of malware to make them undetectable by antivirus.

The Crypter takes the original binary executable code and applies a variety of encryption. In this way it create a new executable, essentially the same as the original but with a totally "distorted" by crypter. That elude the best antivirus controls, in this case it is said that the virus became FUD (Full Undetectable).

The crypter are also software, for them is the same speech of FUD. Even the crypter, after some time, are detected by antivirus and any encrypted files from them is recognized by antivirus (but we will see at the end of the post).
What does a Crypter ?

A crypter simply encodes the source code of a virus into something that is undetectable by antivirus. There are several methods to accomplish the encryption code, and there are many cryptographic algorithms to do it.

What does it mean FUD ?

FUD is an acronym for Fully UnDetectable, or completely undetectable. With the advent of Crypter and using them to bypass the antivirus, the same softwarehouse began to include in the same antivirus definitions for the crypter, owned as potentially dangerous threats (PUP).

What types of Crypters are there ?

Crypters ScanType: encodes the specified file so that the AV are unable to analyze it, but just before it is executed. While it ... Read more

A:Crypter anatomy

Thanks, great piece of information you provided. Is this the same kind of crypters that these provide?
 

Read other 2 answers
RELEVANCY SCORE 47.2

Hello everyone!!
Here is my botnet anatomy. I hope you like it!

A botnet is a network of computers under the control of a botnet master. Consists of two components, the network of infected computers called zombie or drones, and a control panel (command and control, C&C) where the botnet master can control all the computers at once.

Another advantage of C&C is that the botnet master does not connect directly to the drones. C&C Unit acts as a mediator between the master and the botnet botnets, adding a layer of anonymity between the drones and the botnet master. Botnet master who will connect to C&C via Tor, Proxy or other method of anonymity. As you can understand, the owner of a botnet is daunting.

We see in detail the components of a botnet, C&C methods, purpose and how do Botnets:

Command and control unit (C&C). It's an interface from which the botnet master can run commands and obtain information about drones. From this centralized platform you control the entire botnet. The botnet master becomes the General of an army absolutely obedient and effective.

Zombie (or drones). Computers are infected. Unsuspecting computer users unwittingly deliver their PCs to the botnet master. The PCs so "enrolled" become an army ordered soldiers and obedient, which could lead to logout as attacks (DDoS) or espionage (Keylogging).

The control unit can take several forms, but the typical incarnations are:

IRC, Internet Relay Chat: is the most cl... Read more

A:Botnet Anatomy (by Jo Man)

You can add that bots can be used as remote stockage units for illegal datas.
 

Read other 3 answers
RELEVANCY SCORE 47.2

Here's a detailed anatomy of how XP Antivirus works to fool people:

http://www.theregister.co.uk/2008/08/22/anatomy_of_a_hack/
 

A:Anatomy of XP Antivirus

thanks for pointing to the article, very thorough and interesting learning.
 

Read other 2 answers
RELEVANCY SCORE 46.8

The evil genius of XP Antivirus 2008http://www.theregister.co.uk/2008/08/22/anatomy_of_a_hack/

Read other answers
RELEVANCY SCORE 46.8

Looks like some chinese students working for extra WOW creditshttp://www.computerworld.com/action/articl...source=rss_news

Read other answers
RELEVANCY SCORE 46.8

Okay, well, I recently had a severe bout with a web hijacker. After about four downloaded spyware removers, including Adaware, Spybot, and Spysweeper, I've managed to get it gone.

Except for one little residual problem.

Every time I try to open Windows Media Player, instead of the program, I instead get a little pop-up that says 'Browser Enhancement Installation: Good News! A free browser enhancement is available to be installed on your system immediately free of charge. By installing our software you agree to the terms and conditions stated here.' Then there's a little check-box which appears automatically checked and a button that says 'close this window'. There's nothing else in the box.

All I do is uncheck the box and click 'Close This Window'. But it still comes back every single time I go to open WMP, therby preventing me from accessing it.

Help please?

A:Attack on Windows Media Player (Help me!)

Create a directory on your hardrive to save HijackThis.exe. A directory like c:\hijackthis. If you do not do this, you will not be able to use the backup/restore features.Download HijackThis from:HijackThis Download SiteSave this file into the directory you made previously and then run the program named hijackthis.exe. When the program opens click on the Config button, then click on the Misc Tools button, and click on the Check for update online button. When it completes checking/applying updates press the back button.Now click on the Scan button and when it is finished click on the Save Log button. A Notepad window will open with the contents of this log. Click on Edit then click on Select all. Then click on Edit and then Click on Copy.Create a reply to this post here and right click in message area and select paste to paste the log into the post.Someone will reply to you after reading this post. DO NOT fix any entries unless you understand what you are doing.To see a tutorial with screenshots on using HijackThis you can click on the link below:How to use HijackThis to remove Browser Hijackers, Malware, & Spyware

Read other 3 answers
RELEVANCY SCORE 46

Anatomy of an Attempted Malware Scam.

"Malicious advertisements are getting more and more common as the Bad Guys try to use reputable ad networks to spread malware. Julia Casale-Amorim of Casale Media details the lengths that some fake companies will go to to convince ad networks to take the bait."Click to expand...

Referenced article: Anatomy of an Attempted Malware Scam.

-- Tom
 

Read other answers
RELEVANCY SCORE 46

...Workflow Step By Step...At this point I was sufficiently curious to walk through the work-flow step by step. You may enjoy what I discovered. Starting from the beginning...Therefore, no matter what you do, you will be prompted to download a file...XPantivirus2008_v880421.exe...Figure 11 shows a fake Windows Security Center. It looks very much like the real thing...The real Windows Security Center is the one called just "Security Center" in the Control Panel. The fake one is the one called "Windows Security Center."...theregister.co.uk

Read other answers
RELEVANCY SCORE 45.2

I usually delete files using shift-delete
I've noticed that if it's a big folder, or a entire hard drive it processes some kind of search previously to deletion.

Can anyone confirm this?

I acidentally did it, but i'm unsure if any file was deleted before canceling the supposed search
(i didnt had time to read, i just instintively canceled the operation)

Thank you

A:Anatomy of file deletion (there's a search event previously?)

If you have Restore Points you may use Shadow Explorer to compare folder contents from a restore point to what you have on disk now. It's free.

Read other 3 answers