May 25, 2011
If you have every accepted a friends request and you weren’t sure if you actually knew the person you could be setting yourself up to have your account hacked. Facebook security protocols, while ever improving still leave a rather large loophole in the company’s infrastructure that hackers are implementing in their favor.
Here’s how the scam works. A Facebook user accepts friends requests from three people they “may have known as some time” at which point the hacker, who started all three accounts attempts to reset your password.
The hacker accomplishes this goal by telling Facebook that they no longer have access to the email account or mobile phone associated with the account (as shown in the screen grab above), they then incorrectly answer the security question you have entered at which point Facebook will ask them to have three friends help them verify your account by sending them a special code. read more
Tags: Facebook, Facebook Hacking, hacking, Security Vulnerability
May 24, 2011
Did you just swear on your Facebook wall? Perhaps a friend of yours left a profanity laced drunken message for you to read when you woke up? If there is currently foul language on your Facebook wall you’re not alone, nearly 50% of all Facebook users have some type of swear word displayed on their account.
Newly founded firm Reppler which markets online reputation management tools on Monday released a survey of 30,000 users which found that 47% of those users polled had some type of swearing on their wall. Those same responders say that 80% of their accounts have profanity posted from a friend while posts and comments featuring profanity on a users wall come from friends 56% of the time. read more
Tags: Facebook, Facebook Wall
For those of you unfamiliar with the photo social network known as Instagram, it’s basically a cross between Flickr and Twitter (with a dozen plus photo filters to help spice things up).
Despite being only 7 months old and operating underneath Facebook’s and Flickr’s shadow, Instagram has become a blockbuster hit with the site now adding over a million users per month!
Co-Founder Kevin Systrom revealed Instagram’s latest stats upon TechCrunch Disrupt, and announced that the platform now boasts 4.25 million users who are uploading an average of 10 photos per second.
What’s incredible about Instagram’s growth is the fact that users can only access and upload photos via an iOS device (or rather the iPhone as Instagram lacks an iPad app).
Note: Instagram is rumored to be working on an Android app, although they refuse to give an ETA on when it will appear upon Android Market.
Instagram’s biggest rival (aside from Flickr) is probably Path.com, whose iOS only strategy has not yielded similar results.
Have you tried Instagram? If so, what are your favorite filters? Also do you think Instagram could challenge Flickr in the future?
Fisher Investments, a stock market and management services specialized company, offers the sixth installment of its Fisher Investments On series, Fisher Investments On Technology. Fisher Investments On focuses on providing its readers, often individual or aspiring professional investors, the tools needed to understand and analyze opportunities. The sixth book, Fisher Investments On Technology aims at clearly defining the broad term Technology and gaining more insight in the Technology market.
Fisher Investments On Technology consists of three main parts:
- Getting Started in Technology
- Next Steps: Technology Details
- Thinking Like a Portfolio Manager
Tags: Fisher Investments, Investments, review
Twitter on Monday filed official papers to acquire third-party desktop publishing firm TweetDeck for $40 million in cash and stock.
Rumors of the upcoming deal have circulated for weeks as Twitter continues on their path to reign in third-party developers before they can develop an increasing amount of influence over the microblogging site.
Twitter has also become wary of third-party developers over the last several months as their own ad strategy has begun to emerge and many third party desktop and mobile apps have allowed users to avoid those strategies.
The acquisition is not the first from Twitter, they purchased the iPhone App “Tweetie” and they partnered with photo service TwitPic when launching their new interface for their mobile app. read more
Tags: TweetDeck, Twitter, Twitter Acquisitions
May 23, 2011
Mobile social networking company Path on Monday announced a new feature which helps users auto-sort their photos for easier in-depth browsing.
Known as “Stacks” the new program arranges each users uploaded photos by “people, places and things” using the users own tags as the blueprint for that organization.
Once organized the three most popular tagged topics in each of those three categories are then displayed on the users profile then simply tap on a stack and the photos inside of it are revealed in a standard photo album setup.
As an example, if you take a vacation to Las Vegas one of your “Places” stacks might realize three photos from “Las Vegas” making it one of your more popular tags and therefore creating a “Las Vegas” stack.
The program is self-learning which means you can go back to Las Vegas three or four times and your Vegas stack will continue to update with more photos from Las Vegas as long as you tag those photos with that “Las Vegas” term. read more
Tags: Mobile Social Network, Path, social network
Blogging is more powerful than ever now, thanks to the might of social media. When you publish a good blog post, people Like it on Facebook, ReTweet it on Twitter, or comment it from Disqus. Often, you can find your blog post has spread quickly all over the social web. If you handle your online presence well through social media, you can develop an audience, and build your reputation in your chosen niches in a fairly short time.
So, is blogging just a hobby to you? Do you just enjoy sharing your thoughts with others? Or, would you love to turn blogging into a steady revenue stream?
So can only the top bloggers earn money from their blog?
You might feel envious of all those top bloggers. They have speech invitations, product endorsement offers, and even book contracts. It seems that there are numerous opportunities for them to earn money as a blogger. Should we face the fact that it is a privilege exclusively for the bloggers at the top of the pyramid? read more
Tags: affiliate programs blog, blog money, make money blogging
May 20, 2011
One doesn’t attract 600 million plus users without picking up some of the worst scum along the way. Fortunately it seems as if Facebook is teaming up with Microsoft in order to catch child predators using the social giant’s website.
Facebook is joining Microsoft in the National Center for Missing and Exploited Children’s PhotoDNA program to combat child pornography. NCMEC’s program, using image-matching technology created by Microsoft Research in collaboration with Dartmouth College, gives online service providers an effective tool to take more proactive action to stop the distribution of known images of child sexual abuse online. (Official Microsoft Blog)
According to the NY Times (who first broke the story), PhotoDNA basically converts the image into a black and white photo, then chops them into smaller blocks.
Using certain measurement tools (which understandably they decline to elaborate upon), PhotoDNA is able to determine if certain images are indeed exploiting children.
Microsoft is apparently giving away this technology for free, and is trying to convince competitors (i.e. read Google) to adopt their technology (which they have already tested using Bing!).
Creating a safer environment for children seems to be a recurring theme for the social giant, and hopefully more companies (like Flickr, Twitter, etc.) will consider implementing PhotoDNA in order to root out child predators from the social universe.
Image Credit: NY Times
Tags: Facebook, Microsoft
Most people online know what a “troll” is and pretty much everyone, regardless of whether or not they know the term, has encountered at least one in their travels on the Web.
Wikipedia describes a troll as, “Someone who posts inflammatory, extraneous, or off-topic messages in an online community, such as an online discussion forum, chat room, or blog, with the primary intent of provoking readers into an emotional response or of otherwise disrupting normal on-topic discussion.”
However, there is another type of “troll” working on the Web as we speak. Though this kind is much more rare, it is also much more dangerous. Where a traditional troll may disrupt a conversation or say hurtful things, legal trolls (or law trolls) sue/threaten people and, in doing so, attempt to ruin them financially, often over minor perceived violations or no violation at all.
But as few and far-between as these legal trolls are, they are growing and you need to be aware of them and how to avoid them, at least as much as possible. So, with that in mind, here’s your guide to the world of online legal trolls. read more
Tags: copyright, defamation, libel, trademark, troll
May 19, 2011
The next time you log onto a website with a Facebook Like Button you should understand that you’re being tracked, even if you never click on the “Like” option.
In a report released by the Wall Street Journal it has been revealed that users are only required to log into their Facebook account once per month in order to be tracked, while the same thing goes for Twitter tracking via Tweet buttons.
That “once a month” login requirement stands even if a browser is closed or the users computer is turned off and then back on, simply leave your Facebook or Twitter accounts logged in and the tracking will continue.
While both Twitter and Facebook insist they are not attempting to use user data for nefarious purposes they do hold onto tracking information for a short period. According to Twitter their tracking data is removed “quickly” while Facebook keeps your browsing data for 90 days. read more
Tags: Facebook, Facebook Like Butotn, Like Button