Posts Tagged ‘Users’
Consumer Reports: 13 Million Facebook Users Ignore Privacy Settings
Last Updated on Saturday, 14 July 2012 04:46 Written by Celframe Security Team Sunday, 4 November 2012 12:45
A Consumer Reports investigation indicates 13 million U.S. Facebook users are oversharing — and likely don’t know it.
That figure represents 8 percent of Facebook’s 150 million U.S. users, but it is part of an upward trend in users failing to protect themselves while on the social network — putting themselves at risk in the real world. For instance, 4.8 million people potentially tipped off burglars by posting plans that pinpointed where they’d be on certain days. Another 4.7 million “liked” a Facebook page about health conditions or treatments that could be used against them by insurance companies.
“Facebook really is changing the way the world socially communicates and has become a successful service in part by leveraging copious amounts of personal data that can be spread far wider than its users might realize,” Consumer Reports Technology Editor Jeff Fox said in a prepared statement. “Our investigation revealed some fascinating, and some disquieting trends – but ones always worth knowing for consumers who wish to keep their personal data under better control.”
The investigation involved projections from surveying some 2,000 members of Consumer Reports’ interactive consumer online panel, 1,340 of whom were active Facebook users. They were interviewed January 16 to 31, 2012 by the Consumer Reports National Research Center.
It appears one way users protect themselves is to lie. One in four admitted to falsifying information in their profile to mask their true identities. Some do it to hide from employers; others to help prevent identity theft.
But the data points extracted from Consumer Reports’ annual “State of the Net” report show people still provide too much information, whether or not they try to conceal their true identities. For instance, 20.4 million include their birth date, including their year, in public profiles. People also should be mindful that employers, college admissions officials, government investigators and, of course, criminals and personal enemies routintely scan Facebook data.
Many Facebook users don’t expect the information they post to go beyond their own network of friends, but the report devotes an entire section to how they can lose control of that information, particularly through Facebook apps and games.
“Whenever you run one, it gets your public information, such as your name, gender, and profile photo, as well as your list of friends even if you haven’t made that list public. And if you give the app certain permissions, it can peer deeper into your data and even see information that your friends share with you, unless they have specifically forbidden sharing with apps in their own privacy settings,” the report stated.
“The result is that unless you’ve chosen your privacy settings meticulously, a friend who runs an app could grant it access to your information without your knowledge. Given that fact, it’s troubling that our survey found that only 37 percent of Facebook users say they have used the site’s privacy tools to customize how much information apps are allowed to see.”
There are signs that Facebook is responding to privacy critics that maintain the company could do more to ensure its 900 million users have more control over their data. For instance, the Tag Suggest feature that uses facial recognition software to scan photos met with strong criticism and was modified to better alert unsuspecting users so they could untag a photo or disable the feature altogether.
But the report also makes it clear users will need to be more proactive about their online privacy by regularly reviewing their Facebook privacy settings and protecting basic information. They also should be sure to limit all past, present and future wall posts to just friends.
Also, Consumer Reports recommends blocking apps and sites that spy on users or allow friends to share another’s personal information by using controls that limit the information apps can see. Similarly, you can restrict views of wall posts or items in your profile.
If someone is being stalked, harrassed or impersonated, they can deactive their account, which will make it temporarily inaccessible to everyone but the user. Deleting is another recourse, but one that shuts out everyone — including the person behind the account.
Malicious tweets spread rogue AV infecting Android users
Last Updated on Saturday, 14 July 2012 04:05 Written by Celframe Security Team Thursday, 25 October 2012 10:27
Security experts from GFI.com warn about the malicious Tweets that include spammed URLs with the .tk extension. After being clicked, these URLs lead to Russian web page pretending to be an official Anti-Virus page notifying its victims about malware detected on their machines. However, this virus has been found to distribute rogue anti-virus programs similar to the ones that are released by FakeVimes or Winwebsec. It is especially dangerous for Android users but it has also been found to be targeting PC users as well.
According to GFI, random Twitter users have been tweeted with the URLs with .tk extension. After being clicked, these links redirect victim to googleapi17.ru/l(dot)php?l=os&r=5519&a=29# which presents itself as Anti-virus Scanner (typically to scammers, grammar mistakes are included) page and reports something like that:
Anit-Virus ScannerCheck your phone for viruses!Maybe Your phone is infected , and someone has access to your personal information, such as photos, messages, call history, contacts, history of sites visited, passwords to websites and more. Immediately start scanning for viruses!
Depending on which machine, PC or smartphone, victim is on, he is additionally offered to download a file. Computer users are offered to install VirusScanner.jar while smartphone users – VirusScanner.apk. Luckily, .jar file seems to be not working because of some error. However, .apk file can easily be installed on the smartphone and additionally give rogue anti-virus for the victim, reported as Trojan.Android.Generic.a.
It should be expected that scammers will change the destination of the malicious URL in the future, so you should avoid on clicking all suspiciously-looking tweets. In order to prevent such attacks in the future, you should definitely start using mobile anti-virus software.
Source: Gfi.comThis entry was posted on Wednesday, May 16th, 2012 at 11:19 am and is filed under News, Security. You can leave a response, or trackback from your own site.
Movement in Manhattan: Mapping the Speed and Direction of Twitter Users
Last Updated on Thursday, 23 August 2012 10:15 Written by Celframe Web Team Sunday, 26 August 2012 09:48
Inspired by the animated wind map that was posted a little while ago, professional programmer Jeff Clark has explored how people move about in a city. The result, titled Movement in Manhattan [neoformix.com], visualizes the speed and direction of Twitter users in Manhattan, New York.
The visualization is based on a large collection of geo-located tweets that were sent in a 4-hour time-window by the same users. These tweets were used as samples that together construct a vector field representing the average flow of people within a specific area. Particles, representing people, were released at locations where actual tweets were recorded and their subsequent movement was determined by the flow field.
The lines are thus traces of these moving particles, which start out blue and gradually change to red to show the direction of movement.Locations where there is little movement will have blue dots or very short blue traces. Longer traces with more red show a greater speed at that point.
See also Ville Vivante: Tracing the Liveliness of Mobile Phone Usage in Geneva.