Over 1 million tech questions and answers.

Tips on Cyber Security & Using Social Media This Summer

Q: Tips on Cyber Security & Using Social Media This Summer

Easy Tips on Cyber Security and Use of Social Media This Summer:

Summer is in swing.

This is the time of the year when the majority of employees take time off work, due to child-care (with schools being closed) and wanting to spending time recharging their batteries.

Social media and cyber security play a big role in the summer. On a daily basis, and particularly when we travel, we are all guilty of sharing personal photographs, pictures of our families and kids on our social media accounts. With publicly showing our meals out or just picnics in the park, everybody can see where we go, how long for and when we are back home.

Cyber security is an issue that is becoming predominant both in our business and home life. That?s why we all need to educate ourselves in looking after our own online privacy, in order to reduce potential risks, such as burglaries for example.

Our public Twitter accounts can be merciless if a savvy criminal is planning to act.

Advertising your vacation plans on social media seems like a sharing-fun thing to do; however, digital footprints are all clues available to anyone who is trying to find out about us. We?re all guilty of Googling our names, so yes, potential criminals can track down your address this way.

They can track you down by checking your other social media accounts for clues. They can easily identify where you live. Did you know that insurance claims may not be granted if you have a public display of your whereabouts on social media splashed all over the internet? This may result in a claim that cannot be validated. So, here are just a few easy tips to share for a safer summer:
Be cautious what posts and images you share on social media. Who can see your posts? Do you know your settings?
Spend some time checking how safe your Twitter account is as well as Facebook. Here are some guides: Click here for information on how to secure your Twitter account, and here for tips on how to secure your Facebook account.
The beautiful holiday scenery pictures posted on a daily basis can only contribute to an easy burglary, if any savvy criminal out there is ready to act.
If you still fancy sharing the pictures of your idyllic vacation with friends and family, what about posting a whole album ? together with notes about the holiday ? once you are back home?
by Nada Giuffrida July 30, 2016

RELEVANCY SCORE 200
Preferred Solution: Tips on Cyber Security & Using Social Media This Summer

For anything regarding erasing your history and maintaining privacy, I really recommend downloading History Fixer. It deletes all traces of online and offline computer activity including Internet searches, history and chat sessions. Includes a file shredder feature.

You can download it direct from this link http://goo.gl/7JS9gZ. (This link will automatically start a download of History Fixer that you can save to your computer.)

A: Tips on Cyber Security & Using Social Media This Summer

Always browse using incognito then keep eye on your accounts for possible compromise activities.

Until now, I saw few people fall on classy traps which automatically spam the posts.

Read other 1 answers
RELEVANCY SCORE 73.2

Social media security:
Avoiding the phishing threats from Facebook, Twitter and LinkedIn

Social media may not be everyone?s cup of tea, but it is getting harder and harder to ignore for organisations ? especially from a cyber security perspective.

A range of recent research has highlighted the increasing dangers that organisations face from employees? social media usage.

One thing that stands out in the research is how little ?due diligence?, in the words of Raj Samani, CTO EMEA at Intel Security, is done when connecting with other accounts.

Intel Security?s research found that 24 percent of the 2000 UK-based respondents had connected with someone they did not know on LinkedIn.

69 percent of respondents had never wondered if someone was not whom they said they were on LinkedIn.

Research conducted by OnePulse for RiskIQ found that only 53 percent of people check for the verified badge when engaging with a retail brand.

Only 42 percent of people checked the brand?s other social media posts, 40 percent checked the brand?s replied to other people?s Tweets or posts. 31 percent checked the Twitter handle or Facebook URL while 24 percent checked the brand?s number of followers or likes.

These are concerning figures as it is easier than ever to set up a fake social media account.

A ProofPoint report revealed a huge number of fraudulent social media accounts and apps associated with the Olympics. 15 percent of Olympics-related social media accounts were fr... Read more

A:Social media security: Avoiding the phishing threats

Great read, thanks Logethica




Logethica said:





Intel Security?s research found that 24 percent of the 2000 UK-based respondents had connected with someone they did not know on LinkedIn.

69 percent of respondents had never wondered if someone was not whom they said they were on LinkedIn.

Research conducted by OnePulse for RiskIQ found that only 53 percent of people check for the verified badge when engaging with a retail brand.

Only 42 percent of people checked the brand?s other social media posts, 40 percent checked the brand?s replied to other people?s Tweets or posts. 31 percent checked the Twitter handle or Facebook URL while 24 percent checked the brand?s number of followers or likes.Click to expand...

Most social Media is bad enough with security, you add user habits like this and your asking for trouble.
Thanks again buddy.
PeAcE
 

Read other 5 answers
RELEVANCY SCORE 68.8

Quote:
Social networking Web sites like MySpace, Facebook, Twitter, and Windows Live Spaces are services people can use to connect with others to share information like photos, videos, and personal messages.

As the popularity of these social sites grows, so do the risks of using them. Hackers, spammers, virus writers, identity thieves, and other criminals follow the traffic.


Read the tips at Social Networking Safety - Microsoft Protect to help protect yourself when you use social networks.

A:11 tips for social networking safety

Good post and very good reminder.

Read other 6 answers
RELEVANCY SCORE 66

Internet users spent much time online every day. Young people in particular spend a lot of time in social networks and on messaging services. However, when they do so, they are frequently careless with their personal data and thus endanger their digital identities. Another danger when dealing with the worldwide web is cyberbullying. This year?s Safer Internet Day (SID) is being held under the slogan ?Create, connect and share respect: A better Internet starts with you?, and aims to make users aware of the dangers of the Internet. To mark this European day of action, G DATA is providing security tips and demonstrating how Internet users can keep control of their data.


Ransomware, phishing, cyberbullying ? the list of threats on the Internet is long. Users can quickly become victims of successful attacks and then have to deal with the loss of their personal data or other far-reaching consequences.
?Many Internet users do not take the security of their own digital identity seriously because they are unaware of the risks or do not see themselves as interesting targets of attack for cyber criminals. This then makes successful attacks particularly easy for the perpetrators,? explains Tim Berghoff, G DATA Security Evangelist. ?Users can protect themselves against online attacks, cyberbullying and the like by following a few simple security tips.?

What is Safer Internet Day?
SID is a global day of action initiated by the European Union to improve security on the ... Read more

Read other answers
RELEVANCY SCORE 65.6

Hi,

I have become one of the many with a PC infected by 2 fake security scams (Cyber Protection Center and Cyber Security). I purchased Spyware Doctor recently, thinking that this would get rid of it, since the free scan did identify them, or so I thought, but it has failed. Can someone possibly advise me on how to get rid of them please? My computer has slowed down a lot, and the constant pop-up messages are really annoying.

I have a HJT log file, below.

Many thanks in advance.

G

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 20:03:30, on 20/10/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16915)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\svchost.exe
C:\PROGRA~1\FICHIE~1\AOL\ACS\AOLacsd.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\Spyware Doctor\BDT\BDTUpdateService.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Fichiers communs\Motive\McciCMService.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe
C:\Program Files\Norton 360 Premier Edition\Engine\3.5.2.11\ccSvcHst.exe
C:\Program Files\Spyware Doc... Read more

A:Cyber Security and Cyber Protection Center

Welcome to TSG

Before i get started, i need you to remove all your Anti-Virus program except one. You have numerous programs installed. Running muliple AV programs will cause system slowdown and crashes. Thanks
 

Read other 3 answers
RELEVANCY SCORE 59.6

Avast General settings

Enable reputation services
Enable CyberCapture
Always block suspicious files

Enable Hardened mode
Moderate

Scan for potentially unwanted programs (PUPs)
Avast Sandbox settings

Save trusted downloaded files outside the sandbox
Allow all virtualised applications to access the internet
Virtualised folders
Downloads

Avast (Not Installed) Components

Mail Shield
Secure DNS
Antispam
SafeZone Browser
Security browser extension
SafePrice browser extension
SecureLine VPN
Cleanup

 

A:Spawn's Security until Summer 2018

Nice setup.Use a backup solution like O&O AutoBackup/O&O DiskImage Professional.
 

Read other 1 answers
RELEVANCY SCORE 58

Hi forum, i would like to know if there is or are any social media sites that allow loading music on a page or anywhere else like myspace used to be.

I have no idea what happened to myspace but i used to use it years ago and it was something like facebook. A couple of years ago i checked myspace again and it became something like hi5, really crappy. I had an account there and some pictures there too but i don't know if i can get them back? i don't even remember my account name. Havn't used myspace for more than a decade

Read other answers
RELEVANCY SCORE 57.6

Hi everyone. My name is Mike.
Please do not laugh at my question. I am trying to learn everything I can about using social media.
If anyone here could help by directing me to some free online courses and or articles etc,I would greatly appreciate it. I am new to this so anything would be of help. I would like to know how to use facebook,instagram twitter etc. I would also like to know about creating fanpages. Thank you. I know I must sound silly but I have to start somewhere.
 

A:Want to Learn How to Use Social Media

Have you tried Googling "How to use Facebook"?
You will find several hits, same with the others.
 

Read other 2 answers
RELEVANCY SCORE 57.6

Not really to do with a PC.
I am not a fan of social media and do not use any of them. Facebook in
my opinion can be dangerous considering the world situtation.
My question is this: Facebook is into everything so why do I have to use
Facebook to sign onto so many web sites?
 

A:Social Media/Facebook

I am not a fan of social media and do not use any of them. Facebook in my opinion can be dangerous considering the world situation.Click to expand...

I also do not use social media(Facebook, Twitter, etc.).

Facebook is into everything so why do I have to use Facebook to sign onto so many web sites?Click to expand...

If a site only offers that option to sign it, avoid it.

---------------------------------------------------------
 

Read other 1 answers
RELEVANCY SCORE 57.6

The risks of Social Media
Do you cyber-blab? Are you a compulsive Tweeter or Facebooker? Think carefully about what you post. A simple post about your daily visit to the local coffee shop could be enough to tell a burglar when it is safe to rob your house. Remember EVERYTHING on a Social Media site is public.

Facebook and Twitter
Don?t get carried away with what you post on these sites and remember that almost everything you post will be completely public and it is rather like walking down the local High Street and shouting at the top of your voice to everyone in earshot, everything that happened last night, what colour underwear you have on, your name & address and phone number and where you hide the spare keys to your front door.
Be very careful what you post on Facebook or tweet about. It can be used against you in court or by an insurance company, even something as mild and innocent as: ?I?m jogging every day to get fit for my holiday?. Not good if you?re claiming for whiplash after a car accident or you are off sick from work.
Lawyers, Insurance companies, your current or prospective employer will take the time to scroll your Facebook timeline and your tweet history for evidence that can go against you.
Scammers and Fraudsters will scan Facebook, Twitter and other social media sites for useful information that will help them scam you.
Read the rest on http://myonlinesecurity.co.uk/the-risks-of-social-media/
 

A:The risks of Social media

Read other 9 answers
RELEVANCY SCORE 56.8

I was running a disk cleanup because apparently my disk space was almost used up (though with what, I can't figure out.) So I decided to run a disk cleanup on my Surface RT, and that seemed to do something. However, I discovered it deleted the programs I
had pinned to my desktop and now for whatever reason I cannot view my messages via DeviantART (it is like Facebook, only for artists). I've restarted, rebooted, refreshed, logged off and then back on three times, retyped in the URL, but nothing I do can seem
to fix this problem. I can still view my messages on Gmail and on YouTube, but not on DeviantART. I know it isn't something with the website because I can view my messages on my laptop, but not my Surface. If anyone has any ideas as how to fix this or what
the problem might be, please help!

Read other answers
RELEVANCY SCORE 56.8

Finding and addressing Twitter and Facebook threats requires a thorough understanding of how they're accomplished.

Social media threats are at an all-time high, ranging from account hijacking to impersonation attacks, scams, and new ways of distributing malware and executing phishing attacks. Sophisticated attacks target organizations of all sizes. For example, Microsoft was the victim of a series of social media hacks by nation-state threat actors. The attack campaign was extensive, affecting multiple Twitter accounts (principally Skype?s) and exposing corporate passwords and emails for dozens of Microsoft employees.

Because social media exists outside of the network perimeter, social media threats can manifest long before network perimeter and endpoint security detect malicious behavior. Detecting and mitigating these threats requires a thorough understanding of this new threat landscape. If we compare these tactics, techniques, and procedures to traditional network attack methods, we can draw some important contrasts.

Adversaries traditionally target a corporate network using two phases: reconnaissance and exploitation. Reconnaissance involves footprinting (for example, gathering information about an organization?s IP address and domains), scanning (identifying what systems are using what IPs), and enumeration (identifying the services and ports available on these target systems). When attackers use social media, their strategy is similar, but the methods of at... Read more

Read other answers
RELEVANCY SCORE 56.8

I have a logo which i want to place on social media sites. I am having difficulty placing the logo onto these sites. I try to open the logo files on my tablet, but it cannot do so.
Can anyone help me please?
 

Read other answers
RELEVANCY SCORE 56.8

About three months ago, this program was making headlines all over the national news. I thought it was at the very least amusing and thought I would give it a try. When I installed the program, I didn't do all the setting up required. I tried to get rid of it today and upon attempting to uninstall it I got this message:

"The installation source for this product is not available. Verify that the source exists and you can access it."

It appears I need a file that would be in my temp files. I went to the website, www.socialmediasobrietytest.com to reinstall the software, and eventually got this message:

"Another version of this product is already installed. Installation of this version cannot continue. To configure or remove the existing version of this product, use Add/Remove Programs on the Control Panel."

So, now I'm stuck in a never-ending cycle. When a program does this, it usually gives me cause for concern, but everywhere I look I'm seeing that WebRoot designed the program and WebRoot makes anti-virus and anti-spyware software. There's no program with that title on www.webroot.com, however.

I've googled everything I can think of and I'm finding almost all of the media's coverage in Novemer and NOTHING about install/uninstall issues. Is this program malware/adware/spyware? How do I remove it? Is it ok to reinstall it and try it out? Thanks.

Windows 7. I may have installed it for IE or FireFox.
 

A:Social Media Sobriety Test

You could try Revo Uninstaller.
 

Read other 1 answers
RELEVANCY SCORE 56.8

Hello,
 
I'm looking for software that can manage all my business social media accounts in one place.
It has to be able to manage Facebook (chat and wall), Twitter, Email (Microsoft), an on website chat and if possible also Telegram.
So far I only found brand embassy and live agent.
 
Any other suggestions?
 

Read other answers
RELEVANCY SCORE 56.8

Greetings,

My company is interested in setting up a social media presence online using Facebook.

We have a concern over negative feedback from customers or competitors or outside parties and that fact that the comments become a permanent record.

I would welcome comments from anyone with a point of view on this issue.

Many thanks!

A:Beginners guide to social media

Hello.First. . . I'm unsure of what your asking, could you clarify please?Secondly, it is my opinion that there is no such thing as "bad feedback" provided you make proper use of it. Both positive and negative feedback have use in determining your company's future. Positive feedback shows you what you're doing right, and negative feedback shows you how you can improve. Personally, if I see a company with only positive "testimonies" available I get a little bit suspicious; I believe that the ethical company should not take steps to hide flaws, but instead use those resources to find and correct said flaws. Finally, if by "negative feedback" you mean spam or troll attacks on your company, Facebook does provide the capability to remove offending comments from your page.Hope that helps.~Blade

Read other 2 answers
RELEVANCY SCORE 56.8

If you want to get rid on those social media pop ups on the left hand side of your web page, this is how you do it.

1. Download Addblock Plus on Firefox

2. https://adblockplus.org/tutorials

3. Now find and click read more herebelow

Adblock Plus automatically installs a default filter list, based on the language of your browser. If you wish to learn how to add other filter lists, you can read more here. For more advanced options, like disabling tracking, click here.

4.Now find and click here below

Please click on "Add filter subscription", and open the drop-down menu for the filter list subscriptions to add new/more filters. Select the list you want to subscribe to, Adblock Plus automatically enable these lists by default. This menu only shows the most popular and recommended filters. Please go here for more filter lists.

5.Now find and click Fanboy's Annoyances and Fanboy's Social Blocking List

If you have any queries on this subject, please Google them as the above is really all I know.

A:How to disable Social Media Buttons and Pop Ups.

Just wanted to add, I've used AdBlock Plus on Firefox for years. It certainly gets rid of all the annoying pop-ups, etc. You'll like it.

Read other 3 answers
RELEVANCY SCORE 56.8

If you want to get rid on those social media pop ups on the left hand side of your web page, this is how you do it.

1. Download Addblock Plus on Firefox

2. https://adblockplus.org/tutorials

3. Now find and click read more herebelow

Adblock Plus automatically installs a default filter list, based on the language of your browser. If you wish to learn how to add other filter lists, you can read more here. For more advanced options, like disabling tracking, click here.

4.Now find and click here below

Please click on "Add filter subscription", and open the drop-down menu for the filter list subscriptions to add new/more filters. Select the list you want to subscribe to, Adblock Plus automatically enable these lists by default. This menu only shows the most popular and recommended filters. Please go here for more filter lists.

5.Now find and click Fanboy's Annoyances and Fanboy's Social Blocking List

If you have any queries on this subject, please Google them as the above is really all I know.

A:How to disable Social Media Buttons and Pop Ups.

Just wanted to add, I've used AdBlock Plus on Firefox for years. It certainly gets rid of all the annoying pop-ups, etc. You'll like it.

Read other 3 answers
RELEVANCY SCORE 56.8

With the upcoming Holiday and Party Seasons, together with the increase of online and real world shopping at this time of year, it is time to remind our user bases that the Risks and Dangers associated with Social Media usage increases dramatically.
https://myonlinesecurity.co.uk/the-risks-of-social-media/
 

Read other answers
RELEVANCY SCORE 56.4

Cyber crime has reached a new battlefield ? social media platforms. Just as companies seek new opportunities to reach their target audience, so do cyber criminals. According to Proofpoint?s recent Social Media Brand Fraud Report, 19% of the 4,840 social media accounts associated with ten top worldwide brands were fraudulent.

Identikit fraudulent social media accounts
Carefully crafted, bogus accounts can be difficult to distinguish from legitimate ones. They replicate the brand account as much as they can, mimicking the logo, look and feel, and even content. The only difference is in what they propose to the audience: customer service at odd times, discounts, free gifts, and deals that are too good to be true. As the report says, ?the only difference might be something as small as one character in the Twitter handle, such as @askmajorbank vs. @ask_majorbank?.

Although social media platforms like Facebook, Twitter and Instagram have implemented an account verification service ? the blue checkmark badge next to the account name ? cyber criminals have become even smarter and can replicate the badge in their background image to fool customers. However effective account verification is, it doesn?t extend to posts or tweets and fraudsters know this all too well.

The 7 different types of fraudulent accounts
The research identified 7 different types of bogus accounts:
Phishing accounts
These bogus accounts are replicas of official brand products and customer suppor... Read more

A:7 types of social media account fraud

SpartacusSystem said:





Pornography
Pornographers exploit brands? popularity (based on number of followers) to distribute adult content and damage brand image and customer retention.Click to expand...

Wait, you mean the Dairy Queen account I follow isn't legit!?
 

Read other 0 answers
RELEVANCY SCORE 56.4

ESET technology now integrated directly into Facebook... so ESET Social Media Scanner for Facebook has now been discontinued
​ESET said:




Hello,

We just want to let you know about a change to ESET Social Media Scanner.

We?ve partnered with Facebook, which means that ESET?s award-winning technology is now integrated directly into the Facebook platform. Read more about it here »

As a result ? and after securing 73,441,194,563 links ? ESET Social Media Scanner is being discontinued as a stand-alone application for Facebook.

However, you can still enjoy full protection from ESET Social Media Scanner on Twitter, where you can use it to scan your timeline and lists automatically.

For even more scanning capability, why not try ESET Online Scanner to check and remove threats on your local drives? It?s effective, easy to use, and free.

Thanks
Your friends at ESETClick to expand...

For more information, go here: https://socialmediascanner.eset.com/#/profiles/eol

 

Read other answers
RELEVANCY SCORE 56.4

This is a thread I wanted to make for quite some time... namely since 2011 when the whole SOPA / PIPA / ACTA / CISPA madness started, as part of a massive plan to censor the internet. Like many others, I've been interested in a way to create a framework that would allow people to post what they want, without either an ISP being able to censor them nor the government being able to knock at a specific door and arrest someone for what they're hosting.
 
Most attempts to make this dream come true have been at networking level. Mesh networking in routers is an example of it being done through hardware, while TOR is an example of an attempt through software on existing devices. But all of these methods are either slow, unreliable, or unavailable for most people. So before this breakthrough happens, and people can create an internet that doesn't require ISP's and where your traffic can't be spied on, I've been thinking about different kind of platform. I'm a below average programmer, so I can't say I have the knowledge to do it alone... or maybe someone else attempted my idea already. In either case, I wanted to post about it and hear what people think, if this would ever be a viable project:
 
- The idea and functionality:
 
My idea is creating a full media platform, on which you can post text / video / music / pictures / web games, which could be used as either a blog or forum or journal or art site. In appearance it would be like most websites that accept submissio... Read more

Read other answers
RELEVANCY SCORE 56.4

This is something i wonder of curiousity, if your photo is somehow compromised (i know how rare it is but still), if you upload the photo to lets say facebook, if than you download that same photo and open it will you get infected? Does the social media sites (facebook and so on) scan somehow the photos you upload? Is anyone aware? 

Read other answers
RELEVANCY SCORE 56.4

Tech Support Guy System Info Utility version 1.0.0.4
OS Version: Microsoft® Windows Vista? Home Premium, Service Pack 2, 32 bit
Processor: Intel(R) Core(TM)2 CPU 4300 @ 1.80GHz, x64 Family 6 Model 15 Stepping 2
Processor Count: 2
RAM: 3069 Mb
Graphics Card: NVIDIA GeForce 8600 GTS, 256 Mb
Hard Drives: C: 222 GB (139 GB Free); D: 9 GB (4 GB Free);
Motherboard: Dell Inc., 0CT017
Antivirus: None

Censoring by FB, Twitter and Google creates the need alternatives. Has anyone any suggestions?

Txs
 

Read other answers
RELEVANCY SCORE 56.4

I´m running a number of events this year and I am looking for a solution to project foursquare/twitter/facebook up on a large screen at the event so that users can see themselves on the screen. One of the obvious problems I envisage is that the page would need to refresh itself all the time.

The idea is that it drives a lot of social engagement but from a technical standpoint I have no clue how to do this or even where or what kind of forum I should be asking on.

Would anyone be able to point me in the right direction as to where I´m best to ask this question?
 

A:How can I project live social media onto a screen?

No big mystery, unless I'm missing something. Simply connect the PC to the screen/projector.
 

Read other 1 answers
RELEVANCY SCORE 56.4

This is something i wonder of curiousity, if your photo is somehow compromised (i know how rare it is but still), if you upload the photo to lets say facebook, if than you download that same photo and open it will you get infected? Does the social media sites (facebook and so on) scan somehow the photos you upload? Is anyone aware? 

Read other answers
RELEVANCY SCORE 56.4

I just changed my phone number. Now all my social media sites wont let me go into my sites. I don't know what to do. Is there away to change my profiles.
 

A:I changed phone numbers, now cant get into my social media .

Phone number shouldn't matter unless you are accessing via your phone. In which case, I didn't know the phone number was tied to the account. You will likely need to contact each site and ask if your profile can be updated (or check their FAQ / support page). Aside from that, create a new account.
 

Read other 1 answers
RELEVANCY SCORE 56

No, You Can't Have My Social Security Number

Why using SSNs for identification is risky and stupid.

-- Tom
 

A:No, You Can't Have My Social Security Number

thanks
 

Read other 1 answers
RELEVANCY SCORE 55.6

Sorry if this is the wrong location to be posting this subject. I couldn't decide whether it should have been this or a networking subcategory. 
*please feel free to move if need be*
So, I have a new client. They want me to set up some kind of blocking tool or parental controls that block access to certain sites.
Facebook, twitter, youtube, and instagram basically.
I have done about 10 minutes of research because I'm very busy today but I haven't found really what I am looking for.
All the users log into the Domain on Win 7 Pro.
Please, any advice, as always is greatly appreciated!
-Jerry

A:Blocking social media sites for Office staff?

Hi jerrymck This could be easily done via the hosts file (implying the users don't have Admin Rights to edit it back), but the easiest way would be to obviously block these websites at a router level. Do they have a firewall, proxy, etc.?

Read other 8 answers
RELEVANCY SCORE 55.6

Google Chrome has some tricks... Facebook and other social sites may offer alerts through Chrome web-browser, I wonder how to get to the settings page of those.

What should I input into address bar to get to it? ...this method.
 

A:Google Chrome social media sites alerts, getting to it

You want the notifications areas follow the steps below:
Settings > Show advanced settings > Privacy > Content settings?. Find Notifications, and choose from Allow all sites to show notifications, Ask when a site wants to show notifications or Do not allow any site to show notifications,
 

Read other 1 answers
RELEVANCY SCORE 55.2

Hi everyone.

More and more these days we see a vertical bar at the left side of web pages with social media links. I believe they are called CSS Social Media Sidebars. They usually cover up what your trying to read. They really annoy me and I was wondering if there is a way to automatically stop them loading with webpages.

I know that you can use Ad Block Plus to remove some but that doesn't always work and it's not automatic.

Any ideas?

Many thanks in advance.

[/IMG]
 

Read other answers
RELEVANCY SCORE 54.8

Personal information belonging to more than 650,000 US customers of J.C. Penney and other retailers is at risk after the company hired to safeguard the data lost a backup tape.The information, which was entrusted to a company called GE Money, included social security information for about 150,000 people.... GE Money has offered to pay for 12 months of credit monitoring for anyone whose social security number was lost.Click here to read the full story.

A:Social Security Info For Customers At Risk

They should be required by a Federal Court to provide coverage for the life of each of the affected people.

Compromised data comes back to life over many years span.

Read other 1 answers
RELEVANCY SCORE 54.4

I added in yahoo mail signature 3 social media icons, one NEXT to each other, as shown here https://goo.gl/fFBtn5. But the icons come one BELOW each other: https://goo.gl/GzhQpZ


Any suggestions on how I can fix this bug or who should I contact at yahoo to fix it?

Thank you,

Hopper

Read other answers
RELEVANCY SCORE 54.4

Does anyone know if Search Engines can crawl and index social media profile pages that are set to private (set to where only "friends" of that person are able to access the page)? The best analogy I can give is back in the Myspace era when users had the option to set their pages to private, and anyone who wasn't a 'friend' of that person and tried to access their profile would just get a blank screen that just said "This profile is set to private. You are not authorized to view this page," or something to that effect. I was just wondering if Search Engine crawler bots get this same sort of page when they try to access private profiles, or if somehow they are able to get past these blocks and thus crawl & index social media pages that are supposedly private. I have been searching all over the net trying to find an answer to this question but haven't been able to find anything.  

A:Can search engines crawl & index social media profiles set to private?

Probably not but I bet there are products that will do that for a price. 

Read other 1 answers
RELEVANCY SCORE 54.4

I added in yahoo mail signature 3 social media icons, one NEXT to each other, as shown here https://goo.gl/fFBtn5. But the icons come one BELOW each other: https://goo.gl/GzhQpZ


Any suggestions on how I can fix this bug or who should I contact at yahoo to fix it?

Thank you,

Hopper

Read other answers
RELEVANCY SCORE 54.4

The United States Department of State wants to make it mandatory for all foreigners to provide social media details when applying for a visa to enter the US.

US authorities want to modify three visa application forms. The changes made to the three forms would make it mandatory for all visa applicants ?immigrant and non-immigrant? to provide all social media handles used in the last five years.

Diplomatic visas will be exempt from this new rule and some applicants might be asked to provide a list of emails and phone numbers used in the past five years, for additional vetting purposes.

The Department of State has not detailed the list of social media platforms for which it intends to collect account names but said the forms would include an optional section where applicants can enter usernames for online platforms not included in the main list.

Nearly 15 million visa applicants affected
The State Department is seeking Office of Management and Budget (OMB) approval to modify three US visa forms ?DS-156, DS-160, and DS-260.

These are visa forms that immigrant and non-immigrant visa applicants must fill in and submit before being allowed to enter the US. US officials estimate 710,000 immigrant seekers and 14 million non-immigrant visa applicants will be affected.
......
......
......Click to expand...
 

A:US Wants to Make Social Media Data Collection Mandatory for All Visa Applicants

They could just ask Facebook for all info.
 

Read other 3 answers
RELEVANCY SCORE 54.4

hello,I need to know where I can download Cyber Link Media Suite?  This came on my system as OEM,,,if I need to reinstall where can I download the right version..I have a HP Pavilion 500-210qe CTO Desktop PC.  I lost the app when I did the second Windows 10 update.

A:Cyber Link Media Suite

Hi, Your machine came with Windows 8.1 pre-installed. Please use    http://h20564.www2.hp.com/hpsc/swd/public/detail?swItemId=ob-139639-1 or (better):    http://ftp.hp.com/pub/softpaq/sp64001-64500/sp64077.exe Regards.  

Read other 1 answers
RELEVANCY SCORE 54.4

Stealing Social Security Numbers is not identity theft?.

This is a must read!

-- Tom
 

A:Stealing Social Security Numbers is not identity theft?

Read other 12 answers
RELEVANCY SCORE 54

Hi,

I have a friend's laptop that he asked me to help with and it is beyond my ability...i asked him to do a windows update last week as it was about a year out of date, he said whilst doing this an icon appeared to install this "cyber Securty" software - as a regular (not so competent) laptop user he installed this because it looked like regular windows sw.

It has since then about a week from install began to try and scan his HDD everyday, saying there are lots of Trojans etc...and these need removing. From that point his whole Internet was blocked as this was showing as a "trojan" through Cyber Security.

So far i have removed unceccessary files he did not want, booted into safe mode and proceeded to scan 3 times with Super antispyware. Unfortunately as you will know this has not removed the SW but seemed to have removed 45 trojans.

I have been advised that Combofix is a brilliant spyware removal tool, however after signing upto this forum and reading around, i need some help from the Gods?

Please could someone assist?
N.B.

This is an old laptop running XP Proffesional, SP2 with a 1.4 Pentium ®
As said from earlier i have to use my own PC to use the net etc as the laptop will not work, i am currently using a USB stick to transfer data.
There is at the moment no anti virus or firewalls (other than windows) runing, i have removed all of these and only booted in safe mode.
Thanks again

Matt

A:Cyber Security

As no logs have been posted, I am shifting this topic from the specialized HiJack This forum to the Am I Infected forum.==>PLEASE DO NOT NOW POST LOGS<== unless a log is specifically requested.

Read other 7 answers
RELEVANCY SCORE 54

I have this virous and I cannot get rid of it. I am not sure what to do. Can anyone help me?
 

Read other answers
RELEVANCY SCORE 54

I did as instructed but none of the downloads to get rid of the this mail ware, will open. they also dissapear when I try to download. I really need some help here to get rid of this cyber security. I don't even know how it managed to download in thr first place! Thanks for any help.

A:cyber security

Welcome to BCWe Need to check for Rootkits with RootRepealDownload RootRepeal from the following location and save it to your desktop.Direct Download (Recommended)Primary MirrorSecondary MirrorSecondary MirrorSecondary MirrorZip Mirrors (Recommended if you have a slower connection or if the Direct Download mirror is down)
Primary MirrorSecondary MirrorSecondary MirrorRar Mirrors - Only if you know what a RAR is and can extract it.
Primary MirrorSecondary MirrorSecondary MirrorExtract RootRepeal.exe from the archive (If you did not use the "Direct Download" mirror).Open on your desktop.Click the tab.Click the button.Check all seven boxes: Push OkCheck the box for your main system drive (Usually C:), and press Ok.Allow RootRepeal to run a scan of your system. This may take some time.Once the scan completes, push the button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.----------------------------------Please note: If Rootrepeal fails to run, try this step: Click Settings - Options. Set the Disk Access slider to HighAlso try: right-click on rootrepeal.exe and rename it to tatertot.scr===========================Please download Win32kDiag.exe by AD and save it to your desktop.alternate download 1alternate download 2This tool will create a diagnostic report Double-click on Win32kDiag.exe to run and let it finish. When it states Finished! Press any key to exit..., press any key on... Read more

Read other 1 answers
RELEVANCY SCORE 54

Hi. I am infected with Cyber Security. I have downloaded the Malwarebytes an other tool from this website and removed all the malware that had infected the computer, but can't remove Cyber Security from my "Add or Remove Programs" Everytime I restart my computer cyber security pops back up an starts scanning. I keep having to go into iexplore.exe to kill it, but as soon as I restart my computer it pops back up and starts to scan. I scan with the malwarebytes every time it pops up and scan and it reports no threats or viruses. Please help! Edit: Moved topic from XP to the more appropriate forum. ~ Animal

A:cyber Security

Hello,please post the MBAM log.The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.Next run ATF and SAS: if you have run this also,post this log too.Note.. SAS doesn't open the registry hives for other user accounts on the system, so scans should be done from each user account.Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".From your regular user account..Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..DO NOT run yet.Open SUPER from icon and install and Update itUnder Scanner Options make sure the following are checked (leave all others unchecked):Close browsers before scanning.Scan for tracking cookies.Terminate memory threats before quarantining.Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.Now reboot into Safe Mode: How to enter safe mode(XP)Using the F8 MethodRestart your computer. When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced ... Read more

Read other 1 answers
RELEVANCY SCORE 53.2

Hi -I had this malware and per the suggestion in this topic: http://www.bleepingcomputer.com/forums/t/263016/cyber-security-malware/I ran Malwarebyte's Anti-Malware. The quick scan did not do the job, but the full scan seems to have. Would you mind taking a look at the log pasted below to confirm that all is well? I am running Windows Vista Version 6.0 SP2.ThanksMalwarebytes' Anti-Malware 1.41Database version: 2993Windows 6.0.6002 Service Pack 210/19/2009 11:12:00 PMmbam-log-2009-10-19 (23-12-00).txtScan type: Quick ScanObjects scanned: 86362Time elapsed: 5 minute(s), 46 second(s)Memory Processes Infected: 0Memory Modules Infected: 0Registry Keys Infected: 5Registry Values Infected: 0Registry Data Items Infected: 0Folders Infected: 2Files Infected: 11Memory Processes Infected:(No malicious items detected)Memory Modules Infected:(No malicious items detected)Registry Keys Infected:HKEY_CLASSES_ROOT\CLSID\{35a5b43b-cb8a-49ca-a9f4-d3b308d2e3cc} (Trojan.FakeAlert) -> Quarantined and deleted successfully.HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{35a5b43b-cb8a-49ca-a9f4-d3b308d2e3cc} (Trojan.FakeAlert) -> Quarantined and deleted successfully.HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{35a5b43b-cb8a-49ca-a9f4-d3b308d2e3cc} (Trojan.FakeAlert) -> Quarantined and deleted successfully.HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearc... Read more

A:Cyber Security malware: is it gone?

I think its self explanatory "quarantined & deleted successfully" but its always good to have a second opinion so why not download SuperAntiSpyware and do another scan. Make sure you update it and do the full scan.

You might want to ask someone how to go about deleting the registry values left behind by your spyware but i am not the person to be giving you that kind of advice. Good Luck

Read other 4 answers
RELEVANCY SCORE 53.2

OOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/11/13 21:44
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xEE3AD000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7BB2000 Size: 8192 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: c:\windows\temp\perflib_perfdata_5d4.dat
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\all users\application data\pure networks\log\logfile.nmctxth_exe.txt
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\documents and settings\all users\application data\microsoft\search\data\temp\usgthrsvc\perflib_perfdata_880.dat
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\all users\application data\microsoft\search\data\applications\windows\gatherlogs\systemindex\systemindex.401.crwl
Status: Allocation size mismatch (API: 552, Raw: 280)

SSDT
------------... Read more

A:Infected with Cyber Security

Show a screen with a lot of files infected. I need help

This website has been reported as unsafe : THIS SHOW ALSO IN COLOR RED.



Thank you

IRAQ223

Read other 3 answers
RELEVANCY SCORE 53.2

I NEED HELP WIPING OUT CYBER SECURITYEdit: Moved topic from Introductions to the more appropriate forum. ~ Animal

A:HOW CAN I WIPE OUT CYBER SECURITY

Welcome to BCSome types of malware will disable Malwarebytes Anti-Malware and other security tools. If MBAM will not install, try renaming it first.Right-click on the mbam-setup.exe file file and rename it to mysetup.exe.Double-click on mysetup.exe to start the installation.If that did not work, then try renaming and changing the file extension. click this link if you do not see the file extensionRight-click on the mbam-setup.exe file, rename it to mysetup and change the .exe extension to .scr, .com, .pif, or .bat.Then double-click on mysetup.scr (or whatever extension you renamed it) to begin installation.If after installation, MBAM will not run, open the Malwarebytes' Anti-Malware folder in Program Files.Right-click on mbam.exe, rename it to myscan.exe.Double-click on myscan.exe to launch the program.If that did not work, then try renaming and change the .exe extension in the same way as noted above.Double-click on myscan.scr (or whatever extension you renamed it) to launch the program.If using Windows Vista, refer to How to Change a File Extension in Windows Vista.Be sure to update MBAM through the program's interface (preferable method) or manually download the definition updates and just double-click on mbam-rules.exe to install. Then perform a Quick Scan in normal mode and check all items found for removal. Don't forgot to reboot afterwards. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. When done, click the Logs ta... Read more

Read other 1 answers
RELEVANCY SCORE 53.2

Logfile of Trend Micro HijackThis v2.0.2Scan saved at 10:55:13 PM, on 11/10/2009Platform: Windows Vista SP1 (WinNT 6.00.1905)MSIE: Internet Explorer v7.00 (7.00.6001.18319)Boot mode: NormalRunning processes:C:\Windows\system32\taskeng.exeC:\Windows\system32\Dwm.exeC:\Windows\Explorer.EXEC:\Program Files\CSec\cs.exeC:\Windows\System32\hkcmd.exeC:\Windows\System32\igfxpers.exeC:\Windows\RtHDVCpl.exeC:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exeC:\Program Files\Synaptics\SynTP\SynTPEnh.exeC:\Program Files\Toshiba\Power Saver\TPwrMain.exeC:\Program Files\Toshiba\SmoothView\SmoothView.exeC:\Program Files\Toshiba\FlashCards\TCrdMain.exeC:\Windows\system32\igfxsrvc.exeC:\Program Files\Windows Defender\MSASCui.exeC:\Program Files\Toshiba\ConfigFree\NDSTray.exeC:\Program Files\Toshiba\TOSHIBA Service Station\TSS.exeC:\Program Files\iTunes\iTunesHelper.exeC:\Program Files\Adobe\Reader 8.0\Reader\reader_sl.exeC:\Windows\freddy73.exeC:\Windows\pp12.exeC:\Program Files\Toshiba\TOSCDSPD\TOSCDSPD.exeC:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exeC:\Windows\ehome\ehtray.exeC:&#... Read more

A:Cyber Security Ati-virus and who knows what else!

Hello , And to the Bleeping Computer Malware Removal Forum. My name is Elise and I'll be glad to help you with your computer problems.I will be working on your malware issues, this may or may not solve other issues you may have with your machine.Please note that whatever repairs we make, are for fixing your computer problems only and by no means should be used on another computer.You may want to keep the link to this topic in your favorites. Alternatively, you can click the button at the top bar of this topic and Track this Topic, where you can choose email notifications. The topics you are tracking are shown here.-----------------------------------------------------------If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine. If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.If you have already posted a DDS log, please do so again, as your situation may have changed.Use the 'Add Reply' and add the new log to this thread.We need to see some information about what is happening in your machine. Please perform the following scan:Download DDS by sUBs from one of the following links. Save it to your desktop.DDS.scrDDS.pifDouble click on the DDS icon, allow it to run.A small box will open, with an explanation about the tool. No inp... Read more

Read other 2 answers