The internet is a great place to do almost anything: make connections, share stories, shop, or run a business. But there’s a risk associated with using the internet, too. You can be the victim of scams designed to gather your personal information, banking information, or anything else you put on the internet. Even when you think your information is safe, there’s no way to be completely sure who has access to it now—or who will gain access to it later. [Read more…]
Some things are just too juicy not to Tweet or re-Tweet. There is the thrill of thinking that one is the first or at least among the first to tell the world about something that seems monumentally important at the moment. Then there is the chance of becoming somewhat famous on twitter for a couple of hours, days or weeks. And if you’re an online traffic junkie, well, nothing beats the stats of a well crafted post launched at the right time — it’s like lighting up a huge pile of kindling.
It would be great if it turned out that your Tweet or re-Tweet was actually spot on, but what if you end up unknowingly passing off something that is not only false but malicious as well?
With Apple’s new iTunes-based social network Ping skyrocketing past 1 million users in its first two days, it was perhaps inevitable that it come strongly across the radar of hackers, spammers, and scammers. In fact, it took less than 24 hours for the first wave to spam to appear. Now the same problems that have long plagued other popular networks like Facebook and Twitter have taken root in Ping.
The million dollar question is: how effectively, and quickly, can Apple not only eradicate existing spam, but prevent future spam from occurring?
According to eSecurity Planet, Bradley Anstis of M86 Security suggests Apple could begin by effectively disabling links in comments, since comments are the offending medium. “It would be too much to manage comment approvals, but implementing some form of automation to strip out links from comments is a good starting point,” he said. [Read more…]
Personalities on Twitter are being hijacked to spread spam, scams and malware – look out! [Read more…]
One of the best aspects of the Twitter toolset is the fact the team allowed external programmers access to the service so that 3rd party applications and tools could be created. The downside of course is that not everyone has end users best interests at heart, and therefore there are trojan tools out there aiming just to grab your user account details for their own nasty ends … [Read more…]