<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>The Social Media Security Podcast</title>
	<atom:link href="https://socialmediasecurity.com/feed/" rel="self" type="application/rss+xml"/>
	<link>https://socialmediasecurity.com</link>
	<description></description>
	<lastBuildDate>Fri, 23 Oct 2015 21:13:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.2.20</generator>
	<copyright>2013 </copyright>
	<managingEditor>feedback@socialmediasecurity.com (Social Media Security)</managingEditor>
	<webMaster>feedback@socialmediasecurity.com (Social Media Security)</webMaster>
	<category>Podcasts</category>
	<ttl>1440</ttl>
	<image>
		<url>http://socialmediasecurity.com/wp-content/uploads/2009/08/skull.jpg</url>
		<title>The Social Media Security Podcast</title>
		<link>https://socialmediasecurity.com</link>
		<width>144</width>
		<height>144</height>
	</image>
	<itunes:new-feed-url>http://sharedsecurity.net/feed/podcast/</itunes:new-feed-url>
	<itunes:subtitle>Social Media Security Podcast</itunes:subtitle>
	<itunes:summary>A podcast about the security and insecurity of social media.  Hosts are Scott Wright from the Street-Wise Security Zone, Tom Eston founder of socialmediasecurity.com and Kevin Johnson SANS instructor and security consultant with InGuardians.</itunes:summary>
	<itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords>
	
	<itunes:author>Social Media Security</itunes:author>
	
	<itunes:block>no</itunes:block>
	<itunes:explicit>no</itunes:explicit>
	<itunes:image href="http://socialmediasecurity.com/wp-content/uploads/2009/08/skull.jpg"/>
	<itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:owner><itunes:email>feedback@socialmediasecurity.com</itunes:email></itunes:owner><item>
		<title>We’ve Moved!</title>
		<link>https://socialmediasecurity.com/2015/08/17/weve-moved/</link>
				<comments>https://socialmediasecurity.com/2015/08/17/weve-moved/#respond</comments>
				<pubDate>Mon, 17 Aug 2015 15:30:54 +0000</pubDate>
		
				<category><![CDATA[Site News]]></category>

		<guid isPermaLink="false">http://socialmediasecurity.com/?p=99227</guid>
				<description><![CDATA[<p>The Social Media Security Podcast has been recently changed to the Shared Security Podcast.  For details on this move please read this blog post.  Your current podcast subscription should automatically update via iTunes or other podcast player.  Want to listen or subscribe to old Social Media Security Podcast episodes? Check out our archive page. Show descriptions [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2015/08/17/weve-moved/">We&#8217;ve Moved!</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>The Social Media Security Podcast has been recently changed to the <a href="http://sharedsecurity.net/">Shared Security Podcast</a>.  For details on this move <a href="http://sharedsecurity.net/2015/08/06/welcome-to-the-shared-security-podcast/">please read this blog post</a>.  Your current podcast subscription should automatically update via iTunes or other podcast player.  Want to listen or subscribe to old Social Media Security Podcast episodes? <a href="http://socialmediasec.libsyn.com/">Check out our archive page</a>. Show descriptions are noted below on this website.</p>
<p>Please follow us on our new <a href="https://twitter.com/sharedsec">Twitter</a> and like us on our updated <a href="https://www.facebook.com/sharedsec">Facebook page</a>.  Our new website is located at <a href="http://sharedsecurity.net/">sharedsecurity.net</a>. Thanks for listening to the podcast over the years and we look forward to many more!</p>
<p>-Shared Security Podcast Hosts, Scott Wright and Tom Eston</p>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2015%2F08%2F17%2Fweve-moved%2F&amp;t=We%E2%80%99ve+Moved%21" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=We%E2%80%99ve+Moved%21%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2015%2F08%2F17%2Fweve-moved%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2015%2F08%2F17%2Fweve-moved%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2015%2F08%2F17%2Fweve-moved%2F&amp;title=We%E2%80%99ve+Moved%21&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=The+Social+Media+Security+Podcast+has+been+recently+changed+to+the+Shared+Security+Podcast.+%C2%A0For+details+on+this+move+please+read+this%C2%A0blog+post.+%C2%A0Your+current+podcast+subscription+should+automatically+update+via+iTunes+or+other+podcast+player.+%C2%A0" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2015%2F08%2F17%2Fweve-moved%2F&amp;title=We%E2%80%99ve+Moved%21" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2015/08/17/weve-moved/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=We%E2%80%99ve+Moved%21&body=The+Social+Media+Security+Podcast+has+been+recently+changed+to+the+Shared+Security+Podcast.+%C2%A0For+details+on+this+move+please+read+this%C2%A0blog+post.+%C2%A0Your+current+podcast+subscription+should+automatically+update+via+iTunes+or+other+podcast+player.+%C2%A0%20-%20https://socialmediasecurity.com/2015/08/17/weve-moved/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2015/08/17/weve-moved/">We&#8217;ve Moved!</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://socialmediasecurity.com/2015/08/17/weve-moved/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							<dc:creator>feedback@socialmediasecurity.com (Tom)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>The Social Media Security Podcast has been recently changed to the Shared Security Podcast.  For details on this move please read this blog post.  Your current podcast subscription should automatically update via iTunes or other podcast player.  Want to listen or subscribe to old Social Media Security Podcast episodes? Check out our archive page. Show descriptions [&amp;#8230;] The post We&amp;#8217;ve Moved! appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>The Social Media Security Podcast has been recently changed to the Shared Security Podcast.  For details on this move please read this blog post.  Your current podcast subscription should automatically update via iTunes or other podcast player.  Want to listen or subscribe to old Social Media Security Podcast episodes? Check out our archive page. Show descriptions [&amp;#8230;] The post We&amp;#8217;ve Moved! appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>The New Facebook Graph Search: How to Protect Your Privacy</title>
		<link>https://socialmediasecurity.com/2013/03/19/the-new-facebook-graph-search-how-to-protect-your-privacy/</link>
				<comments>https://socialmediasecurity.com/2013/03/19/the-new-facebook-graph-search-how-to-protect-your-privacy/#respond</comments>
				<pubDate>Tue, 19 Mar 2013 21:34:46 +0000</pubDate>
		
				<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Open Graph]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[graphapi]]></category>
		<category><![CDATA[privacy settings]]></category>

		<guid isPermaLink="false">http://socialmediasecurity.com/?p=99160</guid>
				<description><![CDATA[<p>Over the last several months, Facebook has been making significant design and UI changes. Besides the newsfeed changes announced several weeks ago, Facebook has recently begun rolling out a large change in the way you search for information through the platform. While this feature is still in “beta” status, you can tell if you have [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2013/03/19/the-new-facebook-graph-search-how-to-protect-your-privacy/">The New Facebook Graph Search: How to Protect Your Privacy</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>Over the last several months, Facebook has been making significant design and UI changes. Besides the <a href="http://www.huffingtonpost.com/2013/03/07/facebook-news-feed-personalized_n_2830009.html">newsfeed changes announced several weeks ago</a>, Facebook has recently begun rolling out a large change in the way you search for information through the platform. While this feature is still in “beta” status, you can tell if you have the new Graph Search by looking at the top left side of your Facebook profile (Figure 1). You will see a search area called “Search for people, places and things”.</p>
<p>&nbsp;</p>
<p style="text-align: center;"><img class="size-full wp-image-99161 alignnone" alt="facebook_privacy_settings_graph_search" src="http://socialmediasecurity.com/wp-content/uploads/2013/03/facebook_privacy_settings_graph_search.png" width="511" height="111" srcset="https://socialmediasecurity.com/wp-content/uploads/2013/03/facebook_privacy_settings_graph_search.png 511w, https://socialmediasecurity.com/wp-content/uploads/2013/03/facebook_privacy_settings_graph_search-300x65.png 300w" sizes="(max-width: 511px) 100vw, 511px" /></p>
<p style="text-align: center;"><b>Figure 1 – Location of the Facebook Graph Search on Your Profile Page</b></p>
<p>&nbsp;</p>
<p>The Facebook Graph Search is a new implementation of search which retrieves information that comes from Facebook’s Graph. This new feature brings powerful capabilities for finding out more about your friends’ “likes” and activities. It also provides attackers with a more efficient way to glean information for social engineering attacks and other intelligence gathering activities.</p>
<p><b>What’s the Facebook Graph?</b></p>
<p>Think of the Facebook Graph as a very large database of personal information from (literally) a billion Facebook users. This information is categorized by what you and your friends like as well as what you’ve posted, what’s in your profile, locations you’ve visited, and tagged pictures. The Facebook Graph has evolved over the years in order to correlate as much information as possible, making it very easy to search.</p>
<p><b>What’s the Privacy Concern?</b></p>
<p>The issue is that anything you’ve ever posted publically, “Liked,” or were ever tagged in can be quickly searched. Additionally, other information that you’ve posted in your profile, such as your hometown, relationship status, and employer now become searchable. For example, those party pictures you were tagged in four years ago doing things you would <i>never </i>do anymore can be searched by your friends and possibly the friends of your friends; or worse, anyone with a Facebook account.</p>
<p>The Graph Search opens up lots of new and interesting search possibilities that we’ve yet to see on a social network. Here’s one example: Suppose you are a single male looking for single females. You can simply search for “photos of friends of my friends who are single and female” and find pictures of all the single females that are friends of your friends. Interesting, huh? How about the intelligence gathering aspects of these types of searches? For example, search for “&lt;Insert Company&gt; employees located in &lt;Insert City&gt; and you will have a list of targets for social engineering or more. For some other eye opening searches, I recommend you <a href="http://actualfacebookgraphsearches.tumblr.com/">read this blog</a> which shows some interesting privacy ramifications of creative searches.</p>
<p><b>How to Protect Your Privacy</b></p>
<p>First, check out Facebook’s “Activity Log” (Figure 2) which can be found under Privacy Settings and Tools in your Privacy Settings.</p>
<p>&nbsp;</p>
<p style="text-align: center;"><img class="size-full wp-image-99162 alignnone" alt="facebook_privacy_settings_activity_log" src="http://socialmediasecurity.com/wp-content/uploads/2013/03/facebook_privacy_settings_activity_log.png" width="776" height="257" srcset="https://socialmediasecurity.com/wp-content/uploads/2013/03/facebook_privacy_settings_activity_log.png 776w, https://socialmediasecurity.com/wp-content/uploads/2013/03/facebook_privacy_settings_activity_log-300x99.png 300w, https://socialmediasecurity.com/wp-content/uploads/2013/03/facebook_privacy_settings_activity_log-560x185.png 560w" sizes="(max-width: 776px) 100vw, 776px" /></p>
<p style="text-align: center;"><b>Figure 2 – Location of Facebook’s Activity Log</b></p>
<p>&nbsp;</p>
<p>Next, if you want to change the privacy settings for all posts you&#8217;ve shared with Friends of Friends or with the Public, you can select “Limit Past Posts,” which will automatically change the privacy settings on all past posts (Figure 3).</p>
<p>&nbsp;</p>
<p style="text-align: center;"><img class="size-full wp-image-99163 alignnone" alt="facebook_privacy_settings_activity_log2" src="http://socialmediasecurity.com/wp-content/uploads/2013/03/facebook_privacy_settings_activity_log2.png" width="778" height="162" srcset="https://socialmediasecurity.com/wp-content/uploads/2013/03/facebook_privacy_settings_activity_log2.png 778w, https://socialmediasecurity.com/wp-content/uploads/2013/03/facebook_privacy_settings_activity_log2-300x62.png 300w, https://socialmediasecurity.com/wp-content/uploads/2013/03/facebook_privacy_settings_activity_log2-560x116.png 560w" sizes="(max-width: 778px) 100vw, 778px" /></p>
<p style="text-align: center;"><b>Figure 3 – Selecting “Limit Past Posts” changes privacy settings for all posts set to Friends of Friends or Public</b></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>You will also want to make sure you review the following items in your Activity Log (Figure 4): Your Posts (especially those set to Public or Friends of Friends), Posts You’re Tagged In, Posts by Others, and Your Photos. It doesn&#8217;t hurt to also review your Likes to make sure there is nothing you liked that you don’t want coming up in a search.</p>
<p>&nbsp;</p>
<p style="text-align: center;"><img class="size-full wp-image-99164 alignnone" alt="facebook_privacy_settings_activity_log_photos_tags" src="http://socialmediasecurity.com/wp-content/uploads/2013/03/facebook_privacy_settings_activity_log_photos_tags.png" width="171" height="323" /></p>
<p style="text-align: center;"><b>Figure 4 &#8211; Items to Review in Your Activity Log</b></p>
<p>&nbsp;</p>
<p>Lastly, carefully review your Facebook Privacy settings especially if you haven’t looked at them in a while. The Facebook Graph Search makes these settings more important than ever. Be sure to download <a href="http://www.securestate.com/Downloads/ResearchAndInnovation/Facebook_PrivacySecurity_Guide.pdf">SecureState’s recently revised Facebook Privacy &amp; Security Guide</a> which walks you through the recommended privacy settings while still allowing you to be social. The updated guide includes details on Facebook Graph Search and other important privacy settings. I encourage you to share this guide with friends and family.</p>
<p><b>Looking For More Information on Social Media Privacy?</b></p>
<p><a href="http://marketing.securestate.com/the-problem-with-privacy/">SecureState has just released a comprehensive whitepaper</a> by Ken Smith of SecureState’s Profiling &amp; Penetration Team entitled “The Problem with Privacy”. I highly recommend you download and read this whitepaper to find out what the latest threats to your privacy are when using Social Media.</p>
<p><em>Cross-Posted from the <a href="http://blog.securestate.com/">SecureState Blog</a></em></p>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2013%2F03%2F19%2Fthe-new-facebook-graph-search-how-to-protect-your-privacy%2F&amp;t=The+New+Facebook+Graph+Search%3A+How+to+Protect+Your+Privacy" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=The+New+Facebook+Graph+Search%3A+How+to+Protect+Your+Privacy%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2013%2F03%2F19%2Fthe-new-facebook-graph-search-how-to-protect-your-privacy%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2013%2F03%2F19%2Fthe-new-facebook-graph-search-how-to-protect-your-privacy%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2013%2F03%2F19%2Fthe-new-facebook-graph-search-how-to-protect-your-privacy%2F&amp;title=The+New+Facebook+Graph+Search%3A+How+to+Protect+Your+Privacy&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=Over+the+last+several+months%2C+Facebook+has+been+making+significant+design+and+UI+changes.+Besides+the+newsfeed+changes+announced+several+weeks+ago%2C+Facebook+has+recently+begun+rolling+out+a+large+change+in+the+way+you+search+for+information+through+t" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2013%2F03%2F19%2Fthe-new-facebook-graph-search-how-to-protect-your-privacy%2F&amp;title=The+New+Facebook+Graph+Search%3A+How+to+Protect+Your+Privacy" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2013/03/19/the-new-facebook-graph-search-how-to-protect-your-privacy/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=The+New+Facebook+Graph+Search%3A+How+to+Protect+Your+Privacy&body=Over+the+last+several+months%2C+Facebook+has+been+making+significant+design+and+UI+changes.+Besides+the+newsfeed+changes+announced+several+weeks+ago%2C+Facebook+has+recently+begun+rolling+out+a+large+change+in+the+way+you+search+for+information+through+t%20-%20https://socialmediasecurity.com/2013/03/19/the-new-facebook-graph-search-how-to-protect-your-privacy/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2013/03/19/the-new-facebook-graph-search-how-to-protect-your-privacy/">The New Facebook Graph Search: How to Protect Your Privacy</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://socialmediasecurity.com/2013/03/19/the-new-facebook-graph-search-how-to-protect-your-privacy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							<dc:creator>feedback@socialmediasecurity.com (Tom)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Over the last several months, Facebook has been making significant design and UI changes. Besides the newsfeed changes announced several weeks ago, Facebook has recently begun rolling out a large change in the way you search for information through the platform. While this feature is still in “beta” status, you can tell if you have [&amp;#8230;] The post The New Facebook Graph Search: How to Protect Your Privacy appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>Over the last several months, Facebook has been making significant design and UI changes. Besides the newsfeed changes announced several weeks ago, Facebook has recently begun rolling out a large change in the way you search for information through the platform. While this feature is still in “beta” status, you can tell if you have [&amp;#8230;] The post The New Facebook Graph Search: How to Protect Your Privacy appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Social Media Security Website and Podcast Reloaded!</title>
		<link>https://socialmediasecurity.com/2012/09/25/social-media-security-website-and-podcast-reloaded/</link>
				<comments>https://socialmediasecurity.com/2012/09/25/social-media-security-website-and-podcast-reloaded/#respond</comments>
				<pubDate>Tue, 25 Sep 2012 19:29:49 +0000</pubDate>
		
				<category><![CDATA[Site News]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[scott]]></category>
		<category><![CDATA[socialmedia]]></category>
		<category><![CDATA[socialnetworking]]></category>
		<category><![CDATA[socnetsec]]></category>
		<category><![CDATA[tom]]></category>

		<guid isPermaLink="false">http://socialmediasecurity.com/?p=98827</guid>
				<description><![CDATA[<p>Since 2009, I&#8217;ve been maintaining the popular Facebook Privacy &#38; Security Guide that has been used by several universities and government agencies as well as regular users of Facebook.  If you’re not familiar with my guide, it’s a simple two page handout that walks you through recommended privacy and security settings for your Facebook profile. The guide [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2012/09/25/social-media-security-website-and-podcast-reloaded/">Social Media Security Website and Podcast Reloaded!</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>Since 2009, I&#8217;ve been maintaining the popular Facebook Privacy &amp; Security Guide that has been used by several universities and government agencies as well as regular users of Facebook.  If you’re not familiar with my guide, it’s a simple two page handout that walks you through recommended privacy and security settings for your Facebook profile.</p>
<p>The guide has been a labor of love but also required frequent updates since Facebook has drastically changed the privacy controls as well as the layout within the Facebook platform over the years.  Needless to say it’s been tough to keep the guide updated and also tough to keep it to a single page so that it can be easily distributed.  Today, I’m happy to announce that my company <a href="http://www.securestate.com/">SecureState</a> is now officially sponsoring the guide so that it can be maintained with frequent updates!  Having said that, I’m announcing today the release of the fourth version of the Facebook Privacy &amp; Security Guide, updated with the latest information on Facebook’s privacy and security settings.  <a href="http://www.securestate.com/Research%20and%20Innovation/Pages/Social-Media-Privacy-Guides.aspx">Please download and distribute to friends and family</a>.</p>
<p>Also around the same time I started the guide, I started the <a href="http://socialmediasecurity.com/">Social Media Security website and podcast</a>.  The podcast is still being recorded monthly and co-hosted by myself and <a href="http://twitter.com/streetsec">Scott Wright</a>.  Today we also released our <a href="http://socialmediasecurity.com/2012/09/25/social-media-security-podcast-30-the-password-episode/">30<sup>th</sup> episode</a> along with a website redesign for socialmediasecurity.com.  I’d like to thank the podcast’s new sponsor SecureState for the new design and support of the podcast.  Special thanks go to <a href="https://twitter.com/xxDigiPxx">DigiP</a> over at <a href="http://www.ticktockcomputers.com/">Tick Tock Computers</a> for putting together a great site redesign and logo.  I look forward to recording more podcasts and getting the word out on how to safely use social media!</p>
<p style="text-align: center;"><img class="aligncenter size-medium wp-image-98828" title="social-media-security-logo-300dpi-twitter" src="http://socialmediasecurity.com/wp-content/uploads/2012/09/social-media-security-logo-300dpi-twitter-300x37.jpg" alt="" width="300" height="37" srcset="https://socialmediasecurity.com/wp-content/uploads/2012/09/social-media-security-logo-300dpi-twitter-300x37.jpg 300w, https://socialmediasecurity.com/wp-content/uploads/2012/09/social-media-security-logo-300dpi-twitter-1024x128.jpg 1024w, https://socialmediasecurity.com/wp-content/uploads/2012/09/social-media-security-logo-300dpi-twitter-560x70.jpg 560w, https://socialmediasecurity.com/wp-content/uploads/2012/09/social-media-security-logo-300dpi-twitter.jpg 1200w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F09%2F25%2Fsocial-media-security-website-and-podcast-reloaded%2F&amp;t=Social+Media+Security+Website+and+Podcast+Reloaded%21" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Social+Media+Security+Website+and+Podcast+Reloaded%21%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F09%2F25%2Fsocial-media-security-website-and-podcast-reloaded%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F09%2F25%2Fsocial-media-security-website-and-podcast-reloaded%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F09%2F25%2Fsocial-media-security-website-and-podcast-reloaded%2F&amp;title=Social+Media+Security+Website+and+Podcast+Reloaded%21&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=Since+2009%2C%C2%A0I%27ve%C2%A0been+maintaining+the+popular+Facebook+Privacy+%26amp%3B+Security+Guide+that+has+been+used+by+several+universities+and+government+agencies+as+well+as+regular+users+of+Facebook.%C2%A0+If+you%E2%80%99re+not+familiar+with+my+guide%2C+it%E2%80%99s+a+simple+t" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F09%2F25%2Fsocial-media-security-website-and-podcast-reloaded%2F&amp;title=Social+Media+Security+Website+and+Podcast+Reloaded%21" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2012/09/25/social-media-security-website-and-podcast-reloaded/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Social+Media+Security+Website+and+Podcast+Reloaded%21&body=Since+2009%2C%C2%A0I%27ve%C2%A0been+maintaining+the+popular+Facebook+Privacy+%26amp%3B+Security+Guide+that+has+been+used+by+several+universities+and+government+agencies+as+well+as+regular+users+of+Facebook.%C2%A0+If+you%E2%80%99re+not+familiar+with+my+guide%2C+it%E2%80%99s+a+simple+t%20-%20https://socialmediasecurity.com/2012/09/25/social-media-security-website-and-podcast-reloaded/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2012/09/25/social-media-security-website-and-podcast-reloaded/">Social Media Security Website and Podcast Reloaded!</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://socialmediasecurity.com/2012/09/25/social-media-security-website-and-podcast-reloaded/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							<dc:creator>feedback@socialmediasecurity.com (Tom)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Since 2009, I&amp;#8217;ve been maintaining the popular Facebook Privacy &amp;#38; Security Guide that has been used by several universities and government agencies as well as regular users of Facebook.  If you’re not familiar with my guide, it’s a simple two page handout that walks you through recommended privacy and security settings for your Facebook profile. The guide [&amp;#8230;] The post Social Media Security Website and Podcast Reloaded! appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>Since 2009, I&amp;#8217;ve been maintaining the popular Facebook Privacy &amp;#38; Security Guide that has been used by several universities and government agencies as well as regular users of Facebook.  If you’re not familiar with my guide, it’s a simple two page handout that walks you through recommended privacy and security settings for your Facebook profile. The guide [&amp;#8230;] The post Social Media Security Website and Podcast Reloaded! appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>The Slow Web</title>
		<link>https://socialmediasecurity.com/2012/06/18/the-slow-web-7/</link>
				<pubDate>Mon, 18 Jun 2012 14:25:16 +0000</pubDate>
		
				<category><![CDATA[Contributors]]></category>
		<category><![CDATA[socnetsec]]></category>

		<guid isPermaLink="false">http://socialmediasecurity.com/?guid=f69f6e7db7c1988c9687739921b67f39</guid>
				<description><![CDATA[<p>The Slow Web</p>
<p>	Jack Cheng maps out a positive vision for a &#8220;slow&#8221; type of web app:</p>
<p>		Timely not real-time. Rhythm not random. Moderation not excess. Knowledge not information. These are a few of the many characteristics of the Slow Web. ...</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2012/06/18/the-slow-web-7/">The Slow Web</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p><a href="http://blog.jackcheng.com/post/25160553986/the-slow-web">The Slow Web</a></p>
<p>Jack Cheng maps out a positive vision for a &#8220;slow&#8221; type of web app:</p>
<blockquote>
<p>Timely not real-time. Rhythm not random. Moderation not excess. Knowledge not information. These are a few of the many characteristics of the Slow Web. It’s not so much a checklist as a feeling, one of being at greater ease for the web-enabled products and services in our lives.</p>
</blockquote>
<div class="feedflare">
<a href="http://feeds.feedburner.com/~ff/theharmonyguy?a=8XcA24JfEjk:o_u0kJYk4Ao:YwkR-u9nhCs"><img src="http://feeds.feedburner.com/~ff/theharmonyguy?d=YwkR-u9nhCs" border="0"></img></a>
</div>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F06%2F18%2Fthe-slow-web-7%2F&amp;t=The+Slow+Web" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=The+Slow+Web%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F06%2F18%2Fthe-slow-web-7%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F06%2F18%2Fthe-slow-web-7%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F06%2F18%2Fthe-slow-web-7%2F&amp;title=The+Slow+Web&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=The+Slow+Web%0A%0A%09Jack+Cheng+maps+out+a+positive+vision+for+a+%26%238220%3Bslow%26%238221%3B+type+of+web+app%3A%0A%0A%09%0A%09%09Timely+not+real-time.+Rhythm+not+random.+Moderation+not+excess.+Knowledge+not+information.+These+are+a+few+of+the+many+characteristics+of+the+Slow+Web.+..." title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F06%2F18%2Fthe-slow-web-7%2F&amp;title=The+Slow+Web" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2012/06/18/the-slow-web-7/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=The+Slow+Web&body=The+Slow+Web%0A%0A%09Jack+Cheng+maps+out+a+positive+vision+for+a+%26%238220%3Bslow%26%238221%3B+type+of+web+app%3A%0A%0A%09%0A%09%09Timely+not+real-time.+Rhythm+not+random.+Moderation+not+excess.+Knowledge+not+information.+These+are+a+few+of+the+many+characteristics+of+the+Slow+Web.+...%20-%20https://socialmediasecurity.com/2012/06/18/the-slow-web-7/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2012/06/18/the-slow-web-7/">The Slow Web</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
										<dc:creator>feedback@socialmediasecurity.com (Joey Tyson)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>The Slow Web Jack Cheng maps out a positive vision for a &amp;#8220;slow&amp;#8221; type of web app: Timely not real-time. Rhythm not random. Moderation not excess. Knowledge not information. These are a few of the many characteristics of the Slow Web. ... The post The Slow Web appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>The Slow Web Jack Cheng maps out a positive vision for a &amp;#8220;slow&amp;#8221; type of web app: Timely not real-time. Rhythm not random. Moderation not excess. Knowledge not information. These are a few of the many characteristics of the Slow Web. ... The post The Slow Web appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Inside Google’s Plan to Build a Catalog of Every Single Thing, Ever</title>
		<link>https://socialmediasecurity.com/2012/06/18/inside-googles-plan-to-build-a-catalog-of-every-single-thing-ever-7/</link>
				<pubDate>Mon, 18 Jun 2012 14:13:01 +0000</pubDate>
		
				<category><![CDATA[Contributors]]></category>
		<category><![CDATA[socnetsec]]></category>

		<guid isPermaLink="false">http://socialmediasecurity.com/?guid=ef9cd2a16a4a01844acd87c76c8a7dac</guid>
				<description><![CDATA[<p>Inside Google&#8217;s Plan to Build a Catalog of Every Single Thing, Ever</p>
<p>	Alexis Madrigal at The Atlantic on Google&#8217;s Knowledge Graph:</p>
<p>		This is one of those human knowledge projects that is ridiculous in scope and possibly in impact. And ye...</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2012/06/18/inside-googles-plan-to-build-a-catalog-of-every-single-thing-ever-7/">Inside Google&#8217;s Plan to Build a Catalog of Every Single Thing, Ever</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p><a href="http://www.theatlantic.com/technology/archive/2012/06/inside-googles-plan-to-build-a-catalog-of-every-single-thing-ever/258579/">Inside Google&#8217;s Plan to Build a Catalog of Every Single Thing, Ever</a></p>
<p>Alexis Madrigal at The Atlantic on Google&#8217;s Knowledge Graph:</p>
<blockquote>
<p>This is one of those human knowledge projects that is ridiculous in scope and possibly in impact. And yet when it gets turned into a consumer product, all we see is a useful module for figuring out Tom Cruise&#8217;s height more quickly. In principle, this is both good and bad. It&#8217;s good because technology should serve human needs and we shouldn&#8217;t worship the technology itself. It&#8217;s bad because it&#8217;s easy to miss out on the importance of the infrastructure and ideology that are going to increasingly inform the way Google responds to search requests. And given that Google is many people&#8217;s default portal to the world of information, even a subtle change in the company&#8217;s toolset is worth considering.</p>
</blockquote>
<blockquote>
<p>And that&#8217;s how I found myself on the phone with John Giannandrea discussing mojitos and semantic graphs.</p>
</blockquote>
<p>Sounds like another stab at the Semantic Web. It&#8217;ll be interesting to see how Facebook&#8217;s Open Graph actions play out in this space as well.</p>
<div class="feedflare">
<a href="http://feeds.feedburner.com/~ff/theharmonyguy?a=QNossNb0vjA:domn0d41kRM:YwkR-u9nhCs"><img src="http://feeds.feedburner.com/~ff/theharmonyguy?d=YwkR-u9nhCs" border="0"></img></a>
</div>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F06%2F18%2Finside-googles-plan-to-build-a-catalog-of-every-single-thing-ever-7%2F&amp;t=Inside+Google%E2%80%99s+Plan+to+Build+a+Catalog+of+Every+Single+Thing%2C+Ever" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Inside+Google%E2%80%99s+Plan+to+Build+a+Catalog+of+Every+Single+Thing%2C+Ever%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F06%2F18%2Finside-googles-plan-to-build-a-catalog-of-every-single-thing-ever-7%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F06%2F18%2Finside-googles-plan-to-build-a-catalog-of-every-single-thing-ever-7%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F06%2F18%2Finside-googles-plan-to-build-a-catalog-of-every-single-thing-ever-7%2F&amp;title=Inside+Google%E2%80%99s+Plan+to+Build+a+Catalog+of+Every+Single+Thing%2C+Ever&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=Inside+Google%26%238217%3Bs+Plan+to+Build+a+Catalog+of+Every+Single+Thing%2C+Ever%0A%0A%09Alexis+Madrigal+at+The+Atlantic+on+Google%26%238217%3Bs+Knowledge+Graph%3A%0A%0A%09%0A%09%09This+is+one+of+those+human+knowledge+projects+that+is+ridiculous+in+scope+and+possibly+in+impact.+And+ye..." title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F06%2F18%2Finside-googles-plan-to-build-a-catalog-of-every-single-thing-ever-7%2F&amp;title=Inside+Google%E2%80%99s+Plan+to+Build+a+Catalog+of+Every+Single+Thing%2C+Ever" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2012/06/18/inside-googles-plan-to-build-a-catalog-of-every-single-thing-ever-7/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Inside+Google%E2%80%99s+Plan+to+Build+a+Catalog+of+Every+Single+Thing%2C+Ever&body=Inside+Google%26%238217%3Bs+Plan+to+Build+a+Catalog+of+Every+Single+Thing%2C+Ever%0A%0A%09Alexis+Madrigal+at+The+Atlantic+on+Google%26%238217%3Bs+Knowledge+Graph%3A%0A%0A%09%0A%09%09This+is+one+of+those+human+knowledge+projects+that+is+ridiculous+in+scope+and+possibly+in+impact.+And+ye...%20-%20https://socialmediasecurity.com/2012/06/18/inside-googles-plan-to-build-a-catalog-of-every-single-thing-ever-7/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2012/06/18/inside-googles-plan-to-build-a-catalog-of-every-single-thing-ever-7/">Inside Google&#8217;s Plan to Build a Catalog of Every Single Thing, Ever</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
										<dc:creator>feedback@socialmediasecurity.com (Joey Tyson)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Inside Google&amp;#8217;s Plan to Build a Catalog of Every Single Thing, Ever Alexis Madrigal at The Atlantic on Google&amp;#8217;s Knowledge Graph: This is one of those human knowledge projects that is ridiculous in scope and possibly in impact. And ye... The post Inside Google&amp;#8217;s Plan to Build a Catalog of Every Single Thing, Ever appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>Inside Google&amp;#8217;s Plan to Build a Catalog of Every Single Thing, Ever Alexis Madrigal at The Atlantic on Google&amp;#8217;s Knowledge Graph: This is one of those human knowledge projects that is ridiculous in scope and possibly in impact. And ye... The post Inside Google&amp;#8217;s Plan to Build a Catalog of Every Single Thing, Ever appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Facebook Privacy and Security Article on ConsumerReports</title>
		<link>https://socialmediasecurity.com/2012/05/03/facebook-privacy-and-security-article-on-consumerreports/</link>
				<comments>https://socialmediasecurity.com/2012/05/03/facebook-privacy-and-security-article-on-consumerreports/#respond</comments>
				<pubDate>Fri, 04 May 2012 02:23:31 +0000</pubDate>
		
				<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://socialmediasecurity.com/?p=31331</guid>
				<description><![CDATA[<p>I wanted to pass along a really good article on Facebook Privacy that was released on ConsumerReports.org.  There are some good quotes from others in the security and privacy community including Kevin Johnson and Ed Skoudis.  Check out the article here: http://www.consumerreports.org/cro/magazine/2012/06/facebook-your-privacy/index.htm &#160;</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2012/05/03/facebook-privacy-and-security-article-on-consumerreports/">Facebook Privacy and Security Article on ConsumerReports</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>I wanted to pass along a really good article on Facebook Privacy that was released on ConsumerReports.org.  There are some good quotes from others in the security and privacy community including <a href="http://twitter.com/#!/secureideas">Kevin Johnson</a> and <a href="http://twitter.com/#!/edskoudis">Ed Skoudis</a>.  Check out the article here:</p>
<p><a href="http://www.consumerreports.org/cro/magazine/2012/06/facebook-your-privacy/index.htm">http://www.consumerreports.org/cro/magazine/2012/06/facebook-your-privacy/index.htm</a></p>
<p>&nbsp;</p>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F05%2F03%2Ffacebook-privacy-and-security-article-on-consumerreports%2F&amp;t=Facebook+Privacy+and+Security+Article+on+ConsumerReports" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Facebook+Privacy+and+Security+Article+on+ConsumerReports%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F05%2F03%2Ffacebook-privacy-and-security-article-on-consumerreports%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F05%2F03%2Ffacebook-privacy-and-security-article-on-consumerreports%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F05%2F03%2Ffacebook-privacy-and-security-article-on-consumerreports%2F&amp;title=Facebook+Privacy+and+Security+Article+on+ConsumerReports&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=I+wanted+to+pass+along+a+really+good+article+on+Facebook+Privacy+that+was+released+on+ConsumerReports.org.+%C2%A0There+are+some+good+quotes+from+others+in+the+security+and+privacy+community+including+Kevin+Johnson+and%C2%A0Ed+Skoudis.+%C2%A0Check+out+the+article" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2012%2F05%2F03%2Ffacebook-privacy-and-security-article-on-consumerreports%2F&amp;title=Facebook+Privacy+and+Security+Article+on+ConsumerReports" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2012/05/03/facebook-privacy-and-security-article-on-consumerreports/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Facebook+Privacy+and+Security+Article+on+ConsumerReports&body=I+wanted+to+pass+along+a+really+good+article+on+Facebook+Privacy+that+was+released+on+ConsumerReports.org.+%C2%A0There+are+some+good+quotes+from+others+in+the+security+and+privacy+community+including+Kevin+Johnson+and%C2%A0Ed+Skoudis.+%C2%A0Check+out+the+article%20-%20https://socialmediasecurity.com/2012/05/03/facebook-privacy-and-security-article-on-consumerreports/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2012/05/03/facebook-privacy-and-security-article-on-consumerreports/">Facebook Privacy and Security Article on ConsumerReports</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://socialmediasecurity.com/2012/05/03/facebook-privacy-and-security-article-on-consumerreports/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							<dc:creator>feedback@socialmediasecurity.com (Tom)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>I wanted to pass along a really good article on Facebook Privacy that was released on ConsumerReports.org.  There are some good quotes from others in the security and privacy community including Kevin Johnson and Ed Skoudis.  Check out the article here: http://www.consumerreports.org/cro/magazine/2012/06/facebook-your-privacy/index.htm &amp;#160; The post Facebook Privacy and Security Article on ConsumerReports appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>I wanted to pass along a really good article on Facebook Privacy that was released on ConsumerReports.org.  There are some good quotes from others in the security and privacy community including Kevin Johnson and Ed Skoudis.  Check out the article here: http://www.consumerreports.org/cro/magazine/2012/06/facebook-your-privacy/index.htm &amp;#160; The post Facebook Privacy and Security Article on ConsumerReports appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Facebook Privacy &amp; Security Guide Updated to v3.0</title>
		<link>https://socialmediasecurity.com/2011/11/24/facebook-privacy-security-guide-updated-to-v3-0/</link>
				<comments>https://socialmediasecurity.com/2011/11/24/facebook-privacy-security-guide-updated-to-v3-0/#comments</comments>
				<pubDate>Fri, 25 Nov 2011 01:45:22 +0000</pubDate>
		
				<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[socialmedia]]></category>
		<category><![CDATA[socialnetworking]]></category>
		<category><![CDATA[socnetsec]]></category>
		<category><![CDATA[tom]]></category>

		<guid isPermaLink="false">http://socialmediasecurity.com/?p=7282</guid>
				<description><![CDATA[<p>I&#8217;ve finally updated the Facebook Privacy &#38; Security Guide to version 3.0.  This is a major revision which includes directions on how to set the latest privacy and security controls in Facebook.  Maintaining this guide has been challenging over the last year as Facebook has made major changes multiple times in regards to the way [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/11/24/facebook-privacy-security-guide-updated-to-v3-0/">Facebook Privacy &#038; Security Guide Updated to v3.0</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>I&#8217;ve finally updated the Facebook Privacy &amp; Security Guide to version 3.0.  This is a major revision which includes directions on how to set the latest privacy and security controls in Facebook.  Maintaining this guide has been challenging over the last year as Facebook has made major changes multiple times in regards to the way privacy settings are enabled.  Having said that, this is a great time to use my guide and review what your privacy settings are.  Things like enabling secure browsing, login approvals and limiting the audience to what you post are more important then ever.</p>
<p>As always, feel free to distribute this guide to friends and family!  Happy Thanksgiving!</p>
<p><a href="http://socialmediasecurity.com/downloads/Facebook_Privacy_and_Security_Guide.pdf">Download v3.0 of the Facebook Privacy &amp; Security Guide here</a></p>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F11%2F24%2Ffacebook-privacy-security-guide-updated-to-v3-0%2F&amp;t=Facebook+Privacy+%26+Security+Guide+Updated+to+v3.0" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Facebook+Privacy+%26+Security+Guide+Updated+to+v3.0%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F11%2F24%2Ffacebook-privacy-security-guide-updated-to-v3-0%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F11%2F24%2Ffacebook-privacy-security-guide-updated-to-v3-0%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F11%2F24%2Ffacebook-privacy-security-guide-updated-to-v3-0%2F&amp;title=Facebook+Privacy+%26+Security+Guide+Updated+to+v3.0&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=I%27ve+finally+updated+the+Facebook+Privacy+%26amp%3B+Security+Guide+to+version+3.0.+%C2%A0This+is+a+major+revision+which+includes+directions+on+how+to+set+the+latest+privacy+and+security+controls+in+Facebook.+%C2%A0Maintaining+this+guide+has+been+challenging+over" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F11%2F24%2Ffacebook-privacy-security-guide-updated-to-v3-0%2F&amp;title=Facebook+Privacy+%26+Security+Guide+Updated+to+v3.0" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2011/11/24/facebook-privacy-security-guide-updated-to-v3-0/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Facebook+Privacy+%26+Security+Guide+Updated+to+v3.0&body=I%27ve+finally+updated+the+Facebook+Privacy+%26amp%3B+Security+Guide+to+version+3.0.+%C2%A0This+is+a+major+revision+which+includes+directions+on+how+to+set+the+latest+privacy+and+security+controls+in+Facebook.+%C2%A0Maintaining+this+guide+has+been+challenging+over%20-%20https://socialmediasecurity.com/2011/11/24/facebook-privacy-security-guide-updated-to-v3-0/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/11/24/facebook-privacy-security-guide-updated-to-v3-0/">Facebook Privacy &#038; Security Guide Updated to v3.0</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://socialmediasecurity.com/2011/11/24/facebook-privacy-security-guide-updated-to-v3-0/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
							<dc:creator>feedback@socialmediasecurity.com (Tom)</dc:creator><enclosure length="92998" type="application/pdf" url="http://socialmediasecurity.com/downloads/Facebook_Privacy_and_Security_Guide.pdf"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>I&amp;#8217;ve finally updated the Facebook Privacy &amp;#38; Security Guide to version 3.0.  This is a major revision which includes directions on how to set the latest privacy and security controls in Facebook.  Maintaining this guide has been challenging over the last year as Facebook has made major changes multiple times in regards to the way [&amp;#8230;] The post Facebook Privacy &amp;#038; Security Guide Updated to v3.0 appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>I&amp;#8217;ve finally updated the Facebook Privacy &amp;#38; Security Guide to version 3.0.  This is a major revision which includes directions on how to set the latest privacy and security controls in Facebook.  Maintaining this guide has been challenging over the last year as Facebook has made major changes multiple times in regards to the way [&amp;#8230;] The post Facebook Privacy &amp;#038; Security Guide Updated to v3.0 appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>The race for the most personal Twitter followers</title>
		<link>https://socialmediasecurity.com/2011/11/13/the-race-for-the-most-personal-twitter-followers/</link>
				<comments>https://socialmediasecurity.com/2011/11/13/the-race-for-the-most-personal-twitter-followers/#comments</comments>
				<pubDate>Mon, 14 Nov 2011 01:49:46 +0000</pubDate>
		
				<category><![CDATA[Contributors]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[james]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[socnetsec]]></category>

		<guid isPermaLink="false">http://socialmediasecurity.com/?p=7079</guid>
				<description><![CDATA[<p>I have had a great reply on this topic while going around the USA talking about social media security.  During my talk I give an example of why it is NOT okay to allow just anyone the right to follow you or vise versa. I choose a volunteer out of the crowd.  Usually a nice looking woman because&#8230;why [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/11/13/the-race-for-the-most-personal-twitter-followers/">The race for the most personal Twitter followers</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>I have had a great reply on this topic while going around the USA talking about social media security.  During my talk I give an example of why it is NOT okay to allow just anyone the right to follow you or vise versa.</p>
<p>I choose a volunteer out of the crowd.  Usually a nice looking woman because&#8230;why not.  I give a hypothetical situation.  We were dating and things are starting to get serious.  So serious that I take her to meet my mom for the first time. While we are at my ma&#8217;s house, I introduce her to my new brother-in-law.  My brother-in-law was in charge of bringing the dinner rolls and once again forgot.  He asks her to go to the Italian (not french) bakery down the road with him to get these rolls.  She says yes.  While they are picking up the rolls he notices that he forgot his wallet and asked her for $4.98 to cover the rolls.  She just happens to have $5.00 in her left pocket.</p>
<p>Would she give him the $5.00 and why?</p>
<p>The answer has always been &#8220;yes&#8221; and because he is associated or was introduced to her by me.  There is an applied level of trust set prior to them going to the bakery.  Well this level of trust in my opinion can be accomplished within twitter.  If I follow you and we start having a friendly conversation(your favorite sports team) I will then go after your friends and family for a small amount to help me with my &#8220;cure/run/walk&#8221;.  All I have to do is introduce myself as your friend as they can see our past conversations in twitter.  I  have had a over 90% success rate of getting their followers to click my cause link.  This success is based on the applied trust between two strangers.  So although it is really #kwel to have 70,000 twitter followers it can also cost your friends and family $4.98</p>
<p>For more information feel free&#8230;info@unixbox.ws</p>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F11%2F13%2Fthe-race-for-the-most-personal-twitter-followers%2F&amp;t=The+race+for+the+most+personal+Twitter+followers" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=The+race+for+the+most+personal+Twitter+followers%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F11%2F13%2Fthe-race-for-the-most-personal-twitter-followers%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F11%2F13%2Fthe-race-for-the-most-personal-twitter-followers%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F11%2F13%2Fthe-race-for-the-most-personal-twitter-followers%2F&amp;title=The+race+for+the+most+personal+Twitter+followers&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=I+have+had+a+great+reply+on+this+topic+while+going+around+the+USA+talking+about+social+media+security.+%C2%A0During+my+talk+I+give+an+example+of+why+it+is+NOT+okay+to+allow+just+anyone+the+right+to+follow+you+or+vise+versa.%0D%0A%0D%0AI+choose+a%C2%A0volunteer%C2%A0out" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F11%2F13%2Fthe-race-for-the-most-personal-twitter-followers%2F&amp;title=The+race+for+the+most+personal+Twitter+followers" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2011/11/13/the-race-for-the-most-personal-twitter-followers/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=The+race+for+the+most+personal+Twitter+followers&body=I+have+had+a+great+reply+on+this+topic+while+going+around+the+USA+talking+about+social+media+security.+%C2%A0During+my+talk+I+give+an+example+of+why+it+is+NOT+okay+to+allow+just+anyone+the+right+to+follow+you+or+vise+versa.%0D%0A%0D%0AI+choose+a%C2%A0volunteer%C2%A0out%20-%20https://socialmediasecurity.com/2011/11/13/the-race-for-the-most-personal-twitter-followers/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/11/13/the-race-for-the-most-personal-twitter-followers/">The race for the most personal Twitter followers</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://socialmediasecurity.com/2011/11/13/the-race-for-the-most-personal-twitter-followers/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
							<dc:creator>feedback@socialmediasecurity.com (jruffer)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>I have had a great reply on this topic while going around the USA talking about social media security.  During my talk I give an example of why it is NOT okay to allow just anyone the right to follow you or vise versa. I choose a volunteer out of the crowd.  Usually a nice looking woman because&amp;#8230;why [&amp;#8230;] The post The race for the most personal Twitter followers appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>I have had a great reply on this topic while going around the USA talking about social media security.  During my talk I give an example of why it is NOT okay to allow just anyone the right to follow you or vise versa. I choose a volunteer out of the crowd.  Usually a nice looking woman because&amp;#8230;why [&amp;#8230;] The post The race for the most personal Twitter followers appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Taking over the Facebook Page “buy now” button (Part 2 of 2)</title>
		<link>https://socialmediasecurity.com/2011/11/13/taking-over-the-facebook-page-buy-now-button-part-2-of-2/</link>
				<comments>https://socialmediasecurity.com/2011/11/13/taking-over-the-facebook-page-buy-now-button-part-2-of-2/#respond</comments>
				<pubDate>Mon, 14 Nov 2011 01:45:39 +0000</pubDate>
		
				<category><![CDATA[Contributors]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[james]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[socialmedia]]></category>
		<category><![CDATA[socialnetworking]]></category>
		<category><![CDATA[socnetsec]]></category>

		<guid isPermaLink="false">http://socialmediasecurity.com/?p=7076</guid>
				<description><![CDATA[<p>As I have been testing the security settings of companies social media strategies, I have consistently noticed two things, marketing is desperately trying to find its ROI and IT/Security doesn&#8217;t even know they have a FB page.  I do agree that after a number of months, it is time to show the CFO that spending that insame amount of time [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/11/13/taking-over-the-facebook-page-buy-now-button-part-2-of-2/">Taking over the Facebook Page &#8220;buy now&#8221; button (Part 2 of 2)</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>As I have been testing the security settings of companies social media strategies, I have consistently noticed two things, marketing is desperately trying to find its ROI and IT/Security doesn&#8217;t even know they have a FB page.  I do agree that after a number of months, it is time to show the CFO that spending that insame amount of time on their social media sites is worth the payroll checks. Unfortunately, analytics alone have been a blurry way of making that compelling argument and can be defeated by saying, if, I had put those payroll checks into google&#8230;I could see our ROI in a nice neat report. This is one of the reasons that marketing is jumping head first into technologies like Shoutlet, payvment or <a title="Article on e-commerce apps." href="http://www.practicalecommerce.com/articles/2095-Six-Facebook-Applications-to-Sell-Your-Products">others</a> (FB E-commerce). Why not sell your items on your FB Page?  Your team has worked extremely hard to get thousands of new users to click follow/like. Ultimately, this is going to be the future of pages but because IT/Security is not involved in the social media process it also opens a HUGE GAPPING HOLE in your security policy and procedures. And of course here is your example:</p>
<p>The policy of company ACME is &#8220;no social networking allowed&#8221; on internal networks.  Sites are being blocked at the firewall with rules and enforced with a content filtering tool. IT/Security has done its job with social media, right? BUT an exception is made for Marketing because they are special people. A FB page was created as well as an E-Commerce app installed without consulting IT/Security. I know this because after taking over the FB page using our friends Cain and Able, I replaced just one of the &#8220;buy now&#8221; buttons to redirect it my site and used analytics to see how many people clicked this button.  Showing this to Director of IT he replied &#8220;I didn&#8217;t even know we had a FB Page.&#8221;</p>
<p>Part 2</p>
<p>After this meeting we agreed to stop and allow IT/ Security to be a part of the implementation of this new e-com solution and lock down this new site.  After a couple of months we were given the green light that all social media was secure and our attacks would now #fail.  Well they were wrong!  Here is what happened;  Technology constantly changes and therefor we should also be constantly training/testing these changes.  Yes, all https was checked.  Yes, they read www.socialmediasecurity.com on a regular basis.  But they forgot to monitor their social media accounts like they would an email server.  There is still a core failure in my opinion of Facebook pages.  Who?!? owns the data and when is it okay to monitor the admins personal accounts? Because these users of the pages still enjoy using Facebook for personal use. They do not apply the corporate rules to their personal accounts nor should they if that is how they live.  So, we are either forced to create fake accounts or all share one admin account.  Well with our testing we are still targeting the admins of these pages.  There are many many ways to gain access to their accounts and once in, we only have to create our own evil twin account to keep access.  Example: if Bob Alice is the admin of the page just create another Bob Alice and copy the information including the  profile imagine and allow this new user admin rights to the page.  Most common users will just think this is a Facebook glitch and it is showing their profile twice. But in reality it is a way for us to keep a constant admin account to this system.  If you maintain a Facebook page you know that admins just lose their rights to the page all the time out of the blue.  So constantly adding the same person is a regular process.  If the company was monitoring its data it would see these changes or see that there were in fact 2 different accounts attached to this page.  But we are not monitoring these accounts, yet. Social media security can be a full time job depending on the risk and frequency of the sites.   For more information feel free as always to email me.  info@unixbox.ws</p>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F11%2F13%2Ftaking-over-the-facebook-page-buy-now-button-part-2-of-2%2F&amp;t=Taking+over+the+Facebook+Page+%E2%80%9Cbuy+now%E2%80%9D+button+%28Part+2+of+2%29" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Taking+over+the+Facebook+Page+%E2%80%9Cbuy+now%E2%80%9D+button+%28Part+2+of+2%29%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F11%2F13%2Ftaking-over-the-facebook-page-buy-now-button-part-2-of-2%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F11%2F13%2Ftaking-over-the-facebook-page-buy-now-button-part-2-of-2%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F11%2F13%2Ftaking-over-the-facebook-page-buy-now-button-part-2-of-2%2F&amp;title=Taking+over+the+Facebook+Page+%E2%80%9Cbuy+now%E2%80%9D+button+%28Part+2+of+2%29&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=As+I+have+been+testing+the+security+settings+of+companies+social+media+strategies%2C+I+have%C2%A0consistently%C2%A0noticed+two+things%2C+marketing+is%C2%A0desperately%C2%A0trying+to+find+its+ROI+and+IT%2FSecurity+doesn%27t%C2%A0even+know+they+have+a+FB+page.+%C2%A0I+do+agree+that+a" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F11%2F13%2Ftaking-over-the-facebook-page-buy-now-button-part-2-of-2%2F&amp;title=Taking+over+the+Facebook+Page+%E2%80%9Cbuy+now%E2%80%9D+button+%28Part+2+of+2%29" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2011/11/13/taking-over-the-facebook-page-buy-now-button-part-2-of-2/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Taking+over+the+Facebook+Page+%E2%80%9Cbuy+now%E2%80%9D+button+%28Part+2+of+2%29&body=As+I+have+been+testing+the+security+settings+of+companies+social+media+strategies%2C+I+have%C2%A0consistently%C2%A0noticed+two+things%2C+marketing+is%C2%A0desperately%C2%A0trying+to+find+its+ROI+and+IT%2FSecurity+doesn%27t%C2%A0even+know+they+have+a+FB+page.+%C2%A0I+do+agree+that+a%20-%20https://socialmediasecurity.com/2011/11/13/taking-over-the-facebook-page-buy-now-button-part-2-of-2/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/11/13/taking-over-the-facebook-page-buy-now-button-part-2-of-2/">Taking over the Facebook Page &#8220;buy now&#8221; button (Part 2 of 2)</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://socialmediasecurity.com/2011/11/13/taking-over-the-facebook-page-buy-now-button-part-2-of-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							<dc:creator>feedback@socialmediasecurity.com (jruffer)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>As I have been testing the security settings of companies social media strategies, I have consistently noticed two things, marketing is desperately trying to find its ROI and IT/Security doesn&amp;#8217;t even know they have a FB page.  I do agree that after a number of months, it is time to show the CFO that spending that insame amount of time [&amp;#8230;] The post Taking over the Facebook Page &amp;#8220;buy now&amp;#8221; button (Part 2 of 2) appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>As I have been testing the security settings of companies social media strategies, I have consistently noticed two things, marketing is desperately trying to find its ROI and IT/Security doesn&amp;#8217;t even know they have a FB page.  I do agree that after a number of months, it is time to show the CFO that spending that insame amount of time [&amp;#8230;] The post Taking over the Facebook Page &amp;#8220;buy now&amp;#8221; button (Part 2 of 2) appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Implementing a robust Intranet that leverages social media technology</title>
		<link>https://socialmediasecurity.com/2011/07/27/implementing-a-robust-intranet-that-leverages-social-media-technology/</link>
				<pubDate>Wed, 27 Jul 2011 12:16:24 +0000</pubDate>
		
				<category><![CDATA[Contributors]]></category>

		<guid isPermaLink="false">http://socialmediasecurity.com/?p=5166</guid>
				<description><![CDATA[<p><img src="http://www.streetwise-security-zone.com/l1/streetwise/appdata/blog/00000194.jpg" border="0" vspace="5" hspace="5" align="left"> </p>
<p style="text-align: justify"><span style="font-size: small">For a while now, I have been keeping an eye out for technologies that might help organizations leverage social media securely, within an Intranet environment for business purposes. Recently, I came across a success story about the Canadian Medical Association&#8217;s recent implementation of a social Intranet using an out-of-the-box product by ThoughtFarmer. That article (posted on the ThoughtFarmer blog) tapped the CMA project leader, Tanis Roadhouse, for tips on some of the key points in her blue-print for the CMA site&#8217;s implementation. So, I decided to check into the story.</span></p>
<p><span style="font-size: small">The article showed that Tanis, while not being a life-long IT project leader, was pretty well organized, and showed some thought leadership. Here&#8217;s a summary of her 7-point blue-print for building a social intranet:</span></p>
<ol>
<li><em><span style="font-size: small">Start with an inspiring vision: the value of a collaborative culture</span></em></li>
<li><em><span style="font-size: small">Secure executive support</span></em></li>
<li><em><span style="font-size: small">Pick a name that matters</span></em></li>
<li><em><span style="font-size: small">Gather requirements to learn the business</span></em></li>
<li><em><span style="font-size: small">Partner with IT early</span></em></li>
<li><em><span style="font-size: small">Treat content owners like royalty</span></em></li>
<li><em><span style="font-size: small">Embrace continuous improvement</span></em></li>
</ol>
<p style="text-align: justify"><span style="font-size: small">Click <a title="ThoughtFarmer Blog: Real Intranet Managers - Tanis Roadhouse's Blueprint for Building a Social Intranet" href="http://www.thoughtfarmer.com/blog/2011/07/12/real-intranet-managers-tanis-roadhouse-blueprint-building-social-intranet/">HERE</a> for the entire article.</span></p>
<p style="text-align: justify"><span style="font-size: small">For each point, the article provides some detailed explanations. I followed up with Tanis via Twitter to see where Risk Management and IT Security fit in, since they weren&#8217;t explicitly listed in the explanations. For the most part, she said they addressed these issues in the IT liaison step.</span></p>
<p style="text-align: justify"><span style="font-size: small">Tanis did mention (over Twitter) that, because the organization is heavily oriented toward finance, a Risk Assessment was performed in order to protect client data. The assessment concluded that there was, &#8220;Limited risk, as it is an Intranet site&#8221;, and that &#8220;Risk to clients was reduced through governance policies.&#8221;</span></p>
<p style="text-align: justify"><span style="font-size: small">I should point out here that you can not infer that an intranet site will be secure simply because you have good governance policies. Any organization that takes on any IT project that will be deployed on their network (internal or external) should do a thorough risk assessment, and use its recommendations to strengthen any identified vulnerabilities. This may result in strengthening policies, technical safeguards, procedures, personnel screening, roles and responsibilities or training. (Disclaimer: I harp on this stuff because it's a big part of what I do for my clients.)<br /></span></p>
<p style="text-align: justify"><span style="font-size: small">I think the lesson here is that organizations are starting to see value in using social media tools that they keep under their own control. In the early years of Facebook and Twitter, I saw some organizations embracing the publicly available tools to initiate internal collaboration, which was (and still is), generally a bad idea. This kind of thing led to hackers employing social engineering tactics to join &#8220;employee groups&#8221; and learn way too much about the vulnerabilities inside the company&#8217;s walls and networks, which of course, leads to data breaches.</span></p>
<p style="text-align: justify"><span style="font-size: small">Now, with some real implementations we can talk about, I&#8217;m hoping to get a closer look at how these tools can be deployed securely in an environment where you&#8217;re not sharing sensitive corporate data with 700 million of your closest friends (e.g. as would happen on Facebook).<br /></span></p>
<p style="text-align: justify"><span style="font-size: small">I should also mention that the ThoughtFarmer blog also seems to be a good source of thought leadership. Not only are they kindly publishing meaningful success stories, but they also demonstrate an understanding of how to use social media to help others think through their problems. One of their subsequent posts has a list of &#8220;81 Intranet Governance Questions to Ask Yourself.&#8221; (Click <a title="ThoughtFarmer Blog: 81 Intranet Governance Questions to Ask Yourself" href="http://www.thoughtfarmer.com/blog/2011/07/25/81-intranet-governance-questions-to-ask-yourself/">HERE</a>)</span></p>
<p style="text-align: justify"><span style="font-size: small">I&#8217;m encouraged by this kind of leadership, both in the vendor community (as demonstrated by ThoughtFarmer) and among the project initiators like Tanis. I hope to follow their progress in the future and share any tips I learn with you.</span></p>
<p><em>Would your organization be interested in obtaining the right to use my security awareness eLearning content or articles in your enterprise security program? Or would you like help with strategy, risk assessment, program development or training? Please call or email me at the coordinates below...</em><em></em></p>
<p><em><strong>Scott Wright</strong></em></p>
<p><span style="font-size: x-small">The  Streetwise Security Coach</span></p>
<p>Join the Streetwise Security Zone at:<a title="Join the Streetwise  Security Zone" href="http://www.streetwise-security-zone.com/join.html"><br />http://www.streetwise-security-zone.com/join.html</a></p>
<p>Phone: 1-613-693-0997<br />Email: scott@streetwise-security-zone.com<br />Twitter  ID: <a href="http://www.twitter.com/streetsec">http://www.twitter.com/streetsec</a></p>
<p><span style="font-size: x-small"><span style="font-family: times new roman,times">To receive weekly security tips and other notices about helpful content available on this site, please make sure you are on my list by clicking <a title="Free Weekly Streetwise Security Tips Newsletter Signup" href="http://www.streetwise-security-zone.com/members/streetwise/adminpages/weeklytips-signup">HERE</a>, and entering your name and email address.</span></span></p>
<p>&#160;</p>
<p>&#160;</p>
<p><!-- Site Meter --> <a href="http://s49.sitemeter.com/stats.asp?site=s49sw4sw" target="_top"> <img src="http://s49.sitemeter.com/meter.asp?site=s49sw4sw" border="0" alt="Site Meter" /></a> <!-- Copyright (c)2006 Site Meter --></p>
<p><a title="Web Analytics" href="http://getclicky.com/205013"><img src="http://static.getclicky.com/media/links/badge.gif" border="0" alt="Web Analytics" /></a> <img src="http://in.getclicky.com/205013ns.gif" alt=" " width="1" height="1" /></p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/07/27/implementing-a-robust-intranet-that-leverages-social-media-technology/">Implementing a robust Intranet that leverages social media technology</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p><img src="http://www.streetwise-security-zone.com/l1/streetwise/appdata/blog/00000194.jpg" alt="" align="left" border="0" hspace="5" vspace="5" /></p>
<p style="text-align: justify;"><span style="font-size: small;">For a while now, I have been keeping an eye out for technologies that might help organizations leverage social media securely, within an Intranet environment for business purposes. Recently, I came across a success story about the Canadian Medical Association’s recent implementation of a social Intranet using an out-of-the-box product by ThoughtFarmer. That article (posted on the ThoughtFarmer blog) tapped the CMA project leader, Tanis Roadhouse, for tips on some of the key points in her blue-print for the CMA site’s implementation. So, I decided to check into the story.</span></p>
<p><span style="font-size: small;">The article showed that Tanis, while not being a life-long IT project leader, was pretty well organized, and showed some thought leadership. Here’s a summary of her 7-point blue-print for building a social intranet:</span></p>
<ol>
<li><em><span style="font-size: small;">Start with an inspiring vision: the value of a collaborative culture</span></em></li>
<li><em><span style="font-size: small;">Secure executive support</span></em></li>
<li><em><span style="font-size: small;">Pick a name that matters</span></em></li>
<li><em><span style="font-size: small;">Gather requirements to learn the business</span></em></li>
<li><em><span style="font-size: small;">Partner with IT early</span></em></li>
<li><em><span style="font-size: small;">Treat content owners like royalty</span></em></li>
<li><em><span style="font-size: small;">Embrace continuous improvement</span></em></li>
</ol>
<p style="text-align: justify;"><span style="font-size: small;">Click <a title="ThoughtFarmer Blog: Real Intranet Managers - Tanis Roadhouse's Blueprint for Building a Social Intranet" href="http://www.thoughtfarmer.com/blog/2011/07/12/real-intranet-managers-tanis-roadhouse-blueprint-building-social-intranet/">HERE</a> for the entire article.</span></p>
<p style="text-align: justify;"><span style="font-size: small;">For each point, the article provides some detailed explanations. I followed up with Tanis via Twitter to see where Risk Management and IT Security fit in, since they weren’t explicitly listed in the explanations. For the most part, she said they addressed these issues in the IT liaison step.</span></p>
<p style="text-align: justify;"><span style="font-size: small;">Tanis did mention (over Twitter) that, because the organization is heavily oriented toward finance, a Risk Assessment was performed in order to protect client data. The assessment concluded that there was, “Limited risk, as it is an Intranet site”, and that “Risk to clients was reduced through governance policies.”</span></p>
<p style="text-align: justify;"><span style="font-size: small;">I should point out here that you can not infer that an intranet site will be secure simply because you have good governance policies. Any organization that takes on any IT project that will be deployed on their network (internal or external) should do a thorough risk assessment, and use its recommendations to strengthen any identified vulnerabilities. This may result in strengthening policies, technical safeguards, procedures, personnel screening, roles and responsibilities or training. (Disclaimer: I harp on this stuff because it&#8217;s a big part of what I do for my clients.)<br />
</span></p>
<p style="text-align: justify;"><span style="font-size: small;">I think the lesson here is that organizations are starting to see value in using social media tools that they keep under their own control. In the early years of Facebook and Twitter, I saw some organizations embracing the publicly available tools to initiate internal collaboration, which was (and still is), generally a bad idea. This kind of thing led to hackers employing social engineering tactics to join “employee groups” and learn way too much about the vulnerabilities inside the company’s walls and networks, which of course, leads to data breaches.</span></p>
<p style="text-align: justify;"><span style="font-size: small;">Now, with some real implementations we can talk about, I’m hoping to get a closer look at how these tools can be deployed securely in an environment where you’re not sharing sensitive corporate data with 700 million of your closest friends (e.g. as would happen on Facebook).<br />
</span></p>
<p style="text-align: justify;"><span style="font-size: small;">I should also mention that the ThoughtFarmer blog also seems to be a good source of thought leadership. Not only are they kindly publishing meaningful success stories, but they also demonstrate an understanding of how to use social media to help others think through their problems. One of their subsequent posts has a list of “81 Intranet Governance Questions to Ask Yourself.” (Click <a title="ThoughtFarmer Blog: 81 Intranet Governance Questions to Ask Yourself" href="http://www.thoughtfarmer.com/blog/2011/07/25/81-intranet-governance-questions-to-ask-yourself/">HERE</a>)</span></p>
<p style="text-align: justify;"><span style="font-size: small;">I’m encouraged by this kind of leadership, both in the vendor community (as demonstrated by ThoughtFarmer) and among the project initiators like Tanis. I hope to follow their progress in the future and share any tips I learn with you.</span></p>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F07%2F27%2Fimplementing-a-robust-intranet-that-leverages-social-media-technology%2F&amp;t=Implementing+a+robust+Intranet+that+leverages+social+media+technology" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Implementing+a+robust+Intranet+that+leverages+social+media+technology%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F07%2F27%2Fimplementing-a-robust-intranet-that-leverages-social-media-technology%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F07%2F27%2Fimplementing-a-robust-intranet-that-leverages-social-media-technology%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F07%2F27%2Fimplementing-a-robust-intranet-that-leverages-social-media-technology%2F&amp;title=Implementing+a+robust+Intranet+that+leverages+social+media+technology&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=For+a+while+now%2C+I+have+been+keeping+an+eye+out+for+technologies+that+might+help+organizations+leverage+social+media+securely%2C+within+an+Intranet+environment+for+business+purposes.+Recently%2C+I+came+across+a+success+story+about+the+Canadian+Medical+Association%26rsquo%3Bs+recent+implementation+of+a+social+Intranet+using+an+out-of-the-box+product+by+ThoughtFarmer.+That+article+%28posted+on+the+ThoughtFarmer+blog%29+tapped+the+CMA+project+leader%2C+Tanis+Roadhouse%2C+for+tips+on+some+of+the+key+points+in+her+blue-print+for+the+CMA+site%26rsquo%3Bs+implementation.+So%2C+I+decided+to+check+into+the+story.The+article+showed+that+Tanis%2C+while+not+being+a+life-long+IT+project+leader%2C+was+pretty+well+organized%2C+and+showed+some+thought+leadership.+Here%26rsquo%3Bs+a+summary+of+her+7-point+blue-print+for+building+a+social+intranet%3A%0D%0A%0D%0AStart+with+an+inspiring+vision%3A+the+value+of+a+collaborative+culture%0D%0ASecure+executive+support%0D%0APick+a+name+that+matters%0D%0AGather+requirements+to+learn+the+business%0D%0APartner+with+IT+early%0D%0ATreat+content+owners+like+royalty%0D%0AEmbrace+continuous+improvement%0D%0A%0D%0AClick+HERE+for+the+entire+article.%0D%0AFor+each+point%2C+the+article+provides+some+detailed+explanations.+I+followed+up+with+Tanis+via+Twitter+to+see+where+Risk+Management+and+IT+Security+fit+in%2C+since+they+weren%26rsquo%3Bt+explicitly+listed+in+the+explanations.+For+the+most+part%2C+she+said+they+addressed+these+issues+in+the+IT+liaison+step.%0D%0ATanis+did+mention+%28over+Twitter%29+that%2C+because+the+organization+is+heavily+oriented+toward+finance%2C+a+Risk+Assessment+was+performed+in+order+to+protect+client+data.+The+assessment+concluded+that+there+was%2C+%26ldquo%3BLimited+risk%2C+as+it+is+an+Intranet+site%26rdquo%3B%2C+and+that+%26ldquo%3BRisk+to+clients+was+reduced+through+governance+policies.%26rdquo%3B%0D%0AI+should+point+out+here+that+you+can+not+infer+that+an+intranet+site+will+be+secure+simply+because+you+have+good+governance+policies.+Any+organization+that+takes+on+any+IT+project+that+will+be+deployed+on+their+network+%28internal+or+external%29+should+do+a+thorough+risk+assessment%2C+and+use+its+recommendations+to+strengthen+any+identified+vulnerabilities.+This+may+result+in+strengthening+policies%2C+technical+safeguards%2C+procedures%2C+personnel+screening%2C+roles+and+responsibilities+or+training.+%28Disclaimer%3A+I+harp+on+this+stuff+because+it%27s+a+big+part+of+what+I+do+for+my+clients.%29%0D%0AI+think+the+lesson+here+is+that+organizations+are+starting+to+see+value+in+using+social+media+tools+that+they+keep+under+their+own+control.+In+the+early+years+of+Facebook+and+Twitter%2C+I+saw+some+organizations+embracing+the+publicly+available+tools+to+initiate+internal+collaboration%2C+which+was+%28and+still+is%29%2C+generally+a+bad+idea.+This+kind+of+thing+led+to+hackers+employing+social+engineering+tactics+to+join+%26ldquo%3Bemployee+groups%26rdquo%3B+and+learn+way+too+much+about+the+vulnerabilities+inside+the+company%26rsquo%3Bs+walls+and+networks%2C+which+of+course%2C+leads+to+data+breaches.%0D%0ANow%2C+with+some+real+implementations+we+can+talk+about%2C+I%26rsquo%3Bm+hoping+to+get+a+closer+look+at+how+these+tools+can+be+deployed+securely+in+an+environment+where+you%26rsquo%3Bre+not+sharing+sensitive+corporate+data+with+700+million+of+your+closest+friends+%28e.g.+as+would+happen+on+Facebook%29.%0D%0AI+should+also+mention+that+the+ThoughtFarmer+blog+also+seems+to+be+a+good+source+of+thought+leadership.+Not+only+are+they+kindly+publishing+meaningful+success+stories%2C+but+they+also+demonstrate+an+understanding+of+how+to+use+social+media+to+help+others+think+through+their+problems.+One+of+their+subsequent+posts+has+a+list+of+%26ldquo%3B81+Intranet+Governance+Questions+to+Ask+Yourself.%26rdquo%3B+%28Click+HERE%29%0D%0AI%26rsquo%3Bm+encouraged+by+this+kind+of+leadership%2C+both+in+the+vendor+community+%28as+demonstrated+by+ThoughtFarmer%29+and+among+the+project+initiators+like+Tanis.+I+hope+to+follow+their+progress+in+the+future+and+share+any+tips+I+learn+with+you.Would+your+organization+be+interested+in+obtaining+the+right+to+use+my+security+awareness+eLearning+content+or+articles+in+your+enterprise+security+program%3F+Or+would+you+like+help+with+strategy%2C+risk+assessment%2C+program+development+or+training%3F+Please+call+or+email+me+at+the+coordinates+below...%0D%0AScott+Wright%0D%0AThe++Streetwise+Security+Coach%0D%0AJoin+the+Streetwise+Security+Zone+at%3Ahttp%3A%2F%2Fwww.streetwise-security-zone.com%2Fjoin.html%0D%0APhone%3A+1-613-693-0997Email%3A+scott%40streetwise-security-zone.comTwitter++ID%3A+http%3A%2F%2Fwww.twitter.com%2Fstreetsec%0D%0ATo+receive+weekly+security+tips+and+other+notices+about+helpful+content+available+on+this+site%2C+please+make+sure+you+are+on+my+list+by+clicking+HERE%2C+and+entering+your+name+and+email+address.%0D%0A%26nbsp%3B%0D%0A%26nbsp%3B" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F07%2F27%2Fimplementing-a-robust-intranet-that-leverages-social-media-technology%2F&amp;title=Implementing+a+robust+Intranet+that+leverages+social+media+technology" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2011/07/27/implementing-a-robust-intranet-that-leverages-social-media-technology/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Implementing+a+robust+Intranet+that+leverages+social+media+technology&body=For+a+while+now%2C+I+have+been+keeping+an+eye+out+for+technologies+that+might+help+organizations+leverage+social+media+securely%2C+within+an+Intranet+environment+for+business+purposes.+Recently%2C+I+came+across+a+success+story+about+the+Canadian+Medical+Association%26rsquo%3Bs+recent+implementation+of+a+social+Intranet+using+an+out-of-the-box+product+by+ThoughtFarmer.+That+article+%28posted+on+the+ThoughtFarmer+blog%29+tapped+the+CMA+project+leader%2C+Tanis+Roadhouse%2C+for+tips+on+some+of+the+key+points+in+her+blue-print+for+the+CMA+site%26rsquo%3Bs+implementation.+So%2C+I+decided+to+check+into+the+story.The+article+showed+that+Tanis%2C+while+not+being+a+life-long+IT+project+leader%2C+was+pretty+well+organized%2C+and+showed+some+thought+leadership.+Here%26rsquo%3Bs+a+summary+of+her+7-point+blue-print+for+building+a+social+intranet%3A%0D%0A%0D%0AStart+with+an+inspiring+vision%3A+the+value+of+a+collaborative+culture%0D%0ASecure+executive+support%0D%0APick+a+name+that+matters%0D%0AGather+requirements+to+learn+the+business%0D%0APartner+with+IT+early%0D%0ATreat+content+owners+like+royalty%0D%0AEmbrace+continuous+improvement%0D%0A%0D%0AClick+HERE+for+the+entire+article.%0D%0AFor+each+point%2C+the+article+provides+some+detailed+explanations.+I+followed+up+with+Tanis+via+Twitter+to+see+where+Risk+Management+and+IT+Security+fit+in%2C+since+they+weren%26rsquo%3Bt+explicitly+listed+in+the+explanations.+For+the+most+part%2C+she+said+they+addressed+these+issues+in+the+IT+liaison+step.%0D%0ATanis+did+mention+%28over+Twitter%29+that%2C+because+the+organization+is+heavily+oriented+toward+finance%2C+a+Risk+Assessment+was+performed+in+order+to+protect+client+data.+The+assessment+concluded+that+there+was%2C+%26ldquo%3BLimited+risk%2C+as+it+is+an+Intranet+site%26rdquo%3B%2C+and+that+%26ldquo%3BRisk+to+clients+was+reduced+through+governance+policies.%26rdquo%3B%0D%0AI+should+point+out+here+that+you+can+not+infer+that+an+intranet+site+will+be+secure+simply+because+you+have+good+governance+policies.+Any+organization+that+takes+on+any+IT+project+that+will+be+deployed+on+their+network+%28internal+or+external%29+should+do+a+thorough+risk+assessment%2C+and+use+its+recommendations+to+strengthen+any+identified+vulnerabilities.+This+may+result+in+strengthening+policies%2C+technical+safeguards%2C+procedures%2C+personnel+screening%2C+roles+and+responsibilities+or+training.+%28Disclaimer%3A+I+harp+on+this+stuff+because+it%27s+a+big+part+of+what+I+do+for+my+clients.%29%0D%0AI+think+the+lesson+here+is+that+organizations+are+starting+to+see+value+in+using+social+media+tools+that+they+keep+under+their+own+control.+In+the+early+years+of+Facebook+and+Twitter%2C+I+saw+some+organizations+embracing+the+publicly+available+tools+to+initiate+internal+collaboration%2C+which+was+%28and+still+is%29%2C+generally+a+bad+idea.+This+kind+of+thing+led+to+hackers+employing+social+engineering+tactics+to+join+%26ldquo%3Bemployee+groups%26rdquo%3B+and+learn+way+too+much+about+the+vulnerabilities+inside+the+company%26rsquo%3Bs+walls+and+networks%2C+which+of+course%2C+leads+to+data+breaches.%0D%0ANow%2C+with+some+real+implementations+we+can+talk+about%2C+I%26rsquo%3Bm+hoping+to+get+a+closer+look+at+how+these+tools+can+be+deployed+securely+in+an+environment+where+you%26rsquo%3Bre+not+sharing+sensitive+corporate+data+with+700+million+of+your+closest+friends+%28e.g.+as+would+happen+on+Facebook%29.%0D%0AI+should+also+mention+that+the+ThoughtFarmer+blog+also+seems+to+be+a+good+source+of+thought+leadership.+Not+only+are+they+kindly+publishing+meaningful+success+stories%2C+but+they+also+demonstrate+an+understanding+of+how+to+use+social+media+to+help+others+think+through+their+problems.+One+of+their+subsequent+posts+has+a+list+of+%26ldquo%3B81+Intranet+Governance+Questions+to+Ask+Yourself.%26rdquo%3B+%28Click+HERE%29%0D%0AI%26rsquo%3Bm+encouraged+by+this+kind+of+leadership%2C+both+in+the+vendor+community+%28as+demonstrated+by+ThoughtFarmer%29+and+among+the+project+initiators+like+Tanis.+I+hope+to+follow+their+progress+in+the+future+and+share+any+tips+I+learn+with+you.Would+your+organization+be+interested+in+obtaining+the+right+to+use+my+security+awareness+eLearning+content+or+articles+in+your+enterprise+security+program%3F+Or+would+you+like+help+with+strategy%2C+risk+assessment%2C+program+development+or+training%3F+Please+call+or+email+me+at+the+coordinates+below...%0D%0AScott+Wright%0D%0AThe++Streetwise+Security+Coach%0D%0AJoin+the+Streetwise+Security+Zone+at%3Ahttp%3A%2F%2Fwww.streetwise-security-zone.com%2Fjoin.html%0D%0APhone%3A+1-613-693-0997Email%3A+scott%40streetwise-security-zone.comTwitter++ID%3A+http%3A%2F%2Fwww.twitter.com%2Fstreetsec%0D%0ATo+receive+weekly+security+tips+and+other+notices+about+helpful+content+available+on+this+site%2C+please+make+sure+you+are+on+my+list+by+clicking+HERE%2C+and+entering+your+name+and+email+address.%0D%0A%26nbsp%3B%0D%0A%26nbsp%3B%20-%20https://socialmediasecurity.com/2011/07/27/implementing-a-robust-intranet-that-leverages-social-media-technology/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/07/27/implementing-a-robust-intranet-that-leverages-social-media-technology/">Implementing a robust Intranet that leverages social media technology</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
										<dc:creator>feedback@socialmediasecurity.com (Scott Wright's Security Views)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>For a while now, I have been keeping an eye out for technologies that might help organizations leverage social media securely, within an Intranet environment for business purposes. Recently, I came across a success story about the Canadian Medical Association&amp;#8217;s recent implementation of a social Intranet using an out-of-the-box product by ThoughtFarmer. That article (posted on the ThoughtFarmer blog) tapped the CMA project leader, Tanis Roadhouse, for tips on some of the key points in her blue-print for the CMA site&amp;#8217;s implementation. So, I decided to check into the story. The article showed that Tanis, while not being a life-long IT project leader, was pretty well organized, and showed some thought leadership. Here&amp;#8217;s a summary of her 7-point blue-print for building a social intranet: Start with an inspiring vision: the value of a collaborative culture Secure executive support Pick a name that matters Gather requirements to learn the business Partner with IT early Treat content owners like royalty Embrace continuous improvement Click HERE for the entire article. For each point, the article provides some detailed explanations. I followed up with Tanis via Twitter to see where Risk Management and IT Security fit in, since they weren&amp;#8217;t explicitly listed in the explanations. For the most part, she said they addressed these issues in the IT liaison step. Tanis did mention (over Twitter) that, because the organization is heavily oriented toward finance, a Risk Assessment was performed in order to protect client data. The assessment concluded that there was, &amp;#8220;Limited risk, as it is an Intranet site&amp;#8221;, and that &amp;#8220;Risk to clients was reduced through governance policies.&amp;#8221; I should point out here that you can not infer that an intranet site will be secure simply because you have good governance policies. Any organization that takes on any IT project that will be deployed on their network (internal or external) should do a thorough risk assessment, and use its recommendations to strengthen any identified vulnerabilities. This may result in strengthening policies, technical safeguards, procedures, personnel screening, roles and responsibilities or training. (Disclaimer: I harp on this stuff because it's a big part of what I do for my clients.) I think the lesson here is that organizations are starting to see value in using social media tools that they keep under their own control. In the early years of Facebook and Twitter, I saw some organizations embracing the publicly available tools to initiate internal collaboration, which was (and still is), generally a bad idea. This kind of thing led to hackers employing social engineering tactics to join &amp;#8220;employee groups&amp;#8221; and learn way too much about the vulnerabilities inside the company&amp;#8217;s walls and networks, which of course, leads to data breaches. Now, with some real implementations we can talk about, I&amp;#8217;m hoping to get a closer look at how these tools can be deployed securely in an environment where you&amp;#8217;re not sharing sensitive corporate data with 700 million of your closest friends (e.g. as would happen on Facebook). I should also mention that the ThoughtFarmer blog also seems to be a good source of thought leadership. Not only are they kindly publishing meaningful success stories, but they also demonstrate an understanding of how to use social media to help others think through their problems. One of their subsequent posts has a list of &amp;#8220;81 Intranet Governance Questions to Ask Yourself.&amp;#8221; (Click HERE) I&amp;#8217;m encouraged by this kind of leadership, both in the vendor community (as demonstrated by ThoughtFarmer) and among the project initiators like Tanis. I hope to follow their progress in the future and share any tips I learn with you. Would your organization be interested in obtaining the right to use my security awareness eLearning content or articles in your enterprise security program? Or would you like help with strategy, risk assessment, program development or training? Please call or email me at the coordinates below... Scott Wright The Streetwise Security Coach Join the Streetwise Security Zone at: http://www.streetwise-security-zone.com/join.html Phone: 1-613-693-0997 Email: scott@streetwise-security-zone.com Twitter ID: http://www.twitter.com/streetsec To receive weekly security tips and other notices about helpful content available on this site, please make sure you are on my list by clicking HERE, and entering your name and email address. &amp;#160; &amp;#160; The post Implementing a robust Intranet that leverages social media technology appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>For a while now, I have been keeping an eye out for technologies that might help organizations leverage social media securely, within an Intranet environment for business purposes. Recently, I came across a success story about the Canadian Medical Association&amp;#8217;s recent implementation of a social Intranet using an out-of-the-box product by ThoughtFarmer. That article (posted on the ThoughtFarmer blog) tapped the CMA project leader, Tanis Roadhouse, for tips on some of the key points in her blue-print for the CMA site&amp;#8217;s implementation. So, I decided to check into the story. The article showed that Tanis, while not being a life-long IT project leader, was pretty well organized, and showed some thought leadership. Here&amp;#8217;s a summary of her 7-point blue-print for building a social intranet: Start with an inspiring vision: the value of a collaborative culture Secure executive support Pick a name that matters Gather requirements to learn the business Partner with IT early Treat content owners like royalty Embrace continuous improvement Click HERE for the entire article. For each point, the article provides some detailed explanations. I followed up with Tanis via Twitter to see where Risk Management and IT Security fit in, since they weren&amp;#8217;t explicitly listed in the explanations. For the most part, she said they addressed these issues in the IT liaison step. Tanis did mention (over Twitter) that, because the organization is heavily oriented toward finance, a Risk Assessment was performed in order to protect client data. The assessment concluded that there was, &amp;#8220;Limited risk, as it is an Intranet site&amp;#8221;, and that &amp;#8220;Risk to clients was reduced through governance policies.&amp;#8221; I should point out here that you can not infer that an intranet site will be secure simply because you have good governance policies. Any organization that takes on any IT project that will be deployed on their network (internal or external) should do a thorough risk assessment, and use its recommendations to strengthen any identified vulnerabilities. This may result in strengthening policies, technical safeguards, procedures, personnel screening, roles and responsibilities or training. (Disclaimer: I harp on this stuff because it's a big part of what I do for my clients.) I think the lesson here is that organizations are starting to see value in using social media tools that they keep under their own control. In the early years of Facebook and Twitter, I saw some organizations embracing the publicly available tools to initiate internal collaboration, which was (and still is), generally a bad idea. This kind of thing led to hackers employing social engineering tactics to join &amp;#8220;employee groups&amp;#8221; and learn way too much about the vulnerabilities inside the company&amp;#8217;s walls and networks, which of course, leads to data breaches. Now, with some real implementations we can talk about, I&amp;#8217;m hoping to get a closer look at how these tools can be deployed securely in an environment where you&amp;#8217;re not sharing sensitive corporate data with 700 million of your closest friends (e.g. as would happen on Facebook). I should also mention that the ThoughtFarmer blog also seems to be a good source of thought leadership. Not only are they kindly publishing meaningful success stories, but they also demonstrate an understanding of how to use social media to help others think through their problems. One of their subsequent posts has a list of &amp;#8220;81 Intranet Governance Questions to Ask Yourself.&amp;#8221; (Click HERE) I&amp;#8217;m encouraged by this kind of leadership, both in the vendor community (as demonstrated by ThoughtFarmer) and among the project initiators like Tanis. I hope to follow their progress in the future and share any tips I learn with you. Would your organization be interested in obtaining the right to use my security awareness eLearning content or articles in your enterprise security program? Or would you like help with strategy, risk assessment, program development or training? Please call or email me at the coordinates below... Scott Wright The Streetwise Security Coach Join the Streetwise Security Zone at: http://www.streetwise-security-zone.com/join.html Phone: 1-613-693-0997 Email: scott@streetwise-security-zone.com Twitter ID: http://www.twitter.com/streetsec To receive weekly security tips and other notices about helpful content available on this site, please make sure you are on my list by clicking HERE, and entering your name and email address. &amp;#160; &amp;#160; The post Implementing a robust Intranet that leverages social media technology appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>How to easily create a much stronger password than you need to thwart a brute force attack</title>
		<link>https://socialmediasecurity.com/2011/06/07/how-to-easily-create-a-much-stronger-password-than-you-need-to-thwart-a-brute-force-attack/</link>
				<pubDate>Wed, 08 Jun 2011 01:14:23 +0000</pubDate>
		
				<category><![CDATA[Contributors]]></category>

		<guid isPermaLink="false">http://socialmediasecurity.com/?p=4285</guid>
				<description><![CDATA[<p style="text-align: justify"><span style="font-size: small">If you have been struggling with the problem of how to keep passwords strong, yet memorable, we may have a simple answer for you. In the Security Now Podcast (episode 303) this week, Steve Gibson presents a very interesting analysis on what makes a good password these days. He calls it Password Haystacks, and there is a pretty simple solution to having to remember strong passwords.</span></p>
<p><span style="font-size: small">Steve's conclusions are very compatible with my usual prefered strategy for choosing passwords - like using the first characters from a song or movie quote, and adding some special characters and numbers. But his advice is interesting about how simple the basic password root can be, and how to easily make it much stronger. It's pretty cool and simple.</span></p>
<p><span style="font-size: small">The bottom line is that by adding length to a good, short password (regardless of whether or not they are repeated characters or patterns) you will massively improve resistance to a brute force attack. This is because today's attacker doesn't know how long the password is, for sure, and will always start with the easy dictionary words and patterns, and then they will move to the shortest possible character combinations in a brute force attack, followed by the next shortest combinations, and so on...&#160;</span></p>
<p style="text-align: justify"><span style="font-size: small">As an example, using this logic, a 23 character random password is not "usefully" stronger than a 3 character random password with 21 repeated characters.&#160; </span></p>
<p style="text-align: justify"><span style="font-size: small">There are some minor caveats in using this approach, to keep the passwords strong, such as having at least one lower, one upper case, one number and one special character in the root of the password. The rest of the characters don't really matter, as long as you don't reveal what pattern you use in the repeated characters or patterns. </span></p>
<p style="text-align: justify"><span style="font-size: small">For example "..B.o.B.........." is a pretty good password, since it would take at least 2 billion centuries with massive cracking array scenario to go through all combinations. So, you don't need a very long song title or movie phrase. You simply need to keep your simple pattern or strategy a secret.<br /></span></p>
<p style="text-align: justify"><span style="font-size: small">The Security Now podcast episode (in text or audio format) where the rationale for this approach is described is at the following link:<br /></span></p>
<p style="text-align: justify"><span style="font-size: small"><a title="Security Now Episode 303 - Password Haystacks" href="http://www.grc.com/securitynow.htm">http://www.grc.com/securitynow.htm</a> (look for Episode 303)</span></p>
<p><span style="font-size: small">Steve also has a web page that analyzes passwords in terms of how long a given password can be expected to stand up to various brute force attacks. You don't have to enter your real password, but try entering something that has the same length, and number of upper, lower case, numbers and special characters as your real password, and see how long it would take an attacker to try all combinations using a brute force approach.</span> </p>
<p><a href="http://www.grc.com/haystack.htm"><span style="font-size: small">http://www.grc.com/haystack.htm</span></a></p>
<p><span style="font-size: small"><span style="font-size: small">If you aren't convinced, or if you want to learn more, post a question or comment below.</span></span></p>
<p style="text-align: justify"><span style="font-size: small">Something to ponder...</span></p>
<p><span style="font-size: small">- Scott</span></p>
<p><em>I am now offering monthly briefings, tailored to organizations that want to build and sustain security awareness for staff. Just because your security team is too busy to do its own training and awareness doesn't mean you can't have an economical way to address human security risks. Please call or email me at the coordinates below...</em><em></em></p>
<p><em><strong>Scott Wright</strong></em></p>
<p><span style="font-size: x-small">The Streetwise Security Coach</span></p>
<p>Join the Streetwise Security Zone at:<a title="Join the Streetwise  Security Zone" href="http://www.streetwise-security-zone.com/join.html"><br />http://www.streetwise-security-zone.com/join.html</a></p>
<p>Phone: 1-613-693-0997<br />Email: scott@streetwise-security-zone.com<br />Twitter ID: <a href="http://www.twitter.com/streetsec">http://www.twitter.com/streetsec</a></p>
<p><span style="font-size: x-small"><span style="font-family: times new roman,times">To receive weekly security tips and other notices about helpful content available on this site, please make sure you are on my list by clicking <a title="Free Weekly Streetwise Security Tips Newsletter Signup" href="http://www.streetwise-security-zone.com/members/streetwise/adminpages/weeklytips-signup">HERE</a>, and entering your name and email address.</span></span></p>
<p>&#160;</p>
<p>&#160;</p>
<p><!-- Site Meter --> <a href="http://s49.sitemeter.com/stats.asp?site=s49sw4sw" target="_top"> <img src="http://s49.sitemeter.com/meter.asp?site=s49sw4sw" alt="Site Meter" border="0" /></a> <!-- Copyright (c)2006 Site Meter --></p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/06/07/how-to-easily-create-a-much-stronger-password-than-you-need-to-thwart-a-brute-force-attack/">How to easily create a much stronger password than you need to thwart a brute force attack</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: small;">If you have been struggling with the problem of how to keep passwords strong, yet memorable, we may have a simple answer for you. In the Security Now Podcast (episode 303) this week, Steve Gibson presents a very interesting analysis on what makes a good password these days. He calls it Password Haystacks, and there is a pretty simple solution to having to remember strong passwords.</span></p>
<p><span style="font-size: small;">Steve&#8217;s conclusions are very compatible with my usual prefered strategy for choosing passwords &#8211; like using the first characters from a song or movie quote, and adding some special characters and numbers. But his advice is interesting about how simple the basic password root can be, and how to easily make it much stronger. It&#8217;s pretty cool and simple.</span></p>
<p><span style="font-size: small;">The bottom line is that by adding length to a good, short password (regardless of whether or not they are repeated characters or patterns) you will massively improve resistance to a brute force attack. This is because today&#8217;s attacker doesn&#8217;t know how long the password is, for sure, and will always start with the easy dictionary words and patterns, and then they will move to the shortest possible character combinations in a brute force attack, followed by the next shortest combinations, and so on&#8230;&nbsp;</span></p>
<p style="text-align: justify;"><span style="font-size: small;">As an example, using this logic, a 23 character random password is not &#8220;usefully&#8221; stronger than a 3 character random password with 21 repeated characters.&nbsp; </span></p>
<p style="text-align: justify;"><span style="font-size: small;">There are some minor caveats in using this approach, to keep the passwords strong, such as having at least one lower, one upper case, one number and one special character in the root of the password. The rest of the characters don&#8217;t really matter, as long as you don&#8217;t reveal what pattern you use in the repeated characters or patterns. </span></p>
<p style="text-align: justify;"><span style="font-size: small;">For example &#8220;..B.o.B&#8230;&#8230;&#8230;.&#8221; is a pretty good password, since it would take at least 2 billion centuries with massive cracking array scenario to go through all combinations. So, you don&#8217;t need a very long song title or movie phrase. You simply need to keep your simple pattern or strategy a secret.<br /></span></p>
<p style="text-align: justify;"><span style="font-size: small;">The Security Now podcast episode (in text or audio format) where the rationale for this approach is described is at the following link:<br /></span></p>
<p style="text-align: justify;"><span style="font-size: small;"><a title="Security Now Episode 303 - Password Haystacks" href="http://www.grc.com/securitynow.htm">http://www.grc.com/securitynow.htm</a> (look for Episode 303)</span></p>
<p><span style="font-size: small;">Steve also has a web page that analyzes passwords in terms of how long a given password can be expected to stand up to various brute force attacks. You don&#8217;t have to enter your real password, but try entering something that has the same length, and number of upper, lower case, numbers and special characters as your real password, and see how long it would take an attacker to try all combinations using a brute force approach.</span> </p>
<p><a href="http://www.grc.com/haystack.htm"><span style="font-size: small;">http://www.grc.com/haystack.htm</span></a></p>
<p><span style="font-size: small;"><span style="font-size: small;">If you aren&#8217;t convinced, or if you want to learn more, post a question or comment below.</span></span></p>
<p style="text-align: justify;"><span style="font-size: small;">Something to ponder&#8230;</span></p>
<p><span style="font-size: small;">&#8211; Scott</span></p>
<p><em>I am now offering monthly briefings, tailored to organizations that want to build and sustain security awareness for staff. Just because your security team is too busy to do its own training and awareness doesn&#8217;t mean you can&#8217;t have an economical way to address human security risks. Please call or email me at the coordinates below&#8230;</em><em></em></p>
<p><em><strong>Scott Wright</strong></em></p>
<p><span style="font-size: x-small;">The Streetwise Security Coach</span></p>
<p>Join the Streetwise Security Zone at:<a title="Join the Streetwise  Security Zone" href="http://www.streetwise-security-zone.com/join.html"><br />http://www.streetwise-security-zone.com/join.html</a></p>
<p>Phone: 1-613-693-0997<br />Email: scott@streetwise-security-zone.com<br />Twitter ID: <a href="http://www.twitter.com/streetsec">http://www.twitter.com/streetsec</a></p>
<p><span style="font-size: x-small;"><span style="font-family: times new roman,times;">To receive weekly security tips and other notices about helpful content available on this site, please make sure you are on my list by clicking <a title="Free Weekly Streetwise Security Tips Newsletter Signup" href="http://www.streetwise-security-zone.com/members/streetwise/adminpages/weeklytips-signup">HERE</a>, and entering your name and email address.</span></span></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><!-- Site Meter --> <a href="http://s49.sitemeter.com/stats.asp?site=s49sw4sw" > <img src="http://s49.sitemeter.com/meter.asp?site=s49sw4sw" alt="Site Meter" border="0" /></a> <!-- Copyright (c)2006 Site Meter --></p>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F06%2F07%2Fhow-to-easily-create-a-much-stronger-password-than-you-need-to-thwart-a-brute-force-attack%2F&amp;t=How+to+easily+create+a+much+stronger+password+than+you+need+to+thwart+a+brute+force+attack" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=How+to+easily+create+a+much+stronger+password+than+you+need+to+thwart+a+brute+force+attack%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F06%2F07%2Fhow-to-easily-create-a-much-stronger-password-than-you-need-to-thwart-a-brute-force-attack%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F06%2F07%2Fhow-to-easily-create-a-much-stronger-password-than-you-need-to-thwart-a-brute-force-attack%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F06%2F07%2Fhow-to-easily-create-a-much-stronger-password-than-you-need-to-thwart-a-brute-force-attack%2F&amp;title=How+to+easily+create+a+much+stronger+password+than+you+need+to+thwart+a+brute+force+attack&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=If+you+have+been+struggling+with+the+problem+of+how+to+keep+passwords+strong%2C+yet+memorable%2C+we+may+have+a+simple+answer+for+you.+In+the+Security+Now+Podcast+%28episode+303%29+this+week%2C+Steve+Gibson+presents+a+very+interesting+analysis+on+what+makes+a+good+password+these+days.+He+calls+it+Password+Haystacks%2C+and+there+is+a+pretty+simple+solution+to+having+to+remember+strong+passwords.Steve%27s+conclusions+are+very+compatible+with+my+usual+prefered+strategy+for+choosing+passwords+-+like+using+the+first+characters+from+a+song+or+movie+quote%2C+and+adding+some+special+characters+and+numbers.+But+his+advice+is+interesting+about+how+simple+the+basic+password+root+can+be%2C+and+how+to+easily+make+it+much+stronger.+It%27s+pretty+cool+and+simple.The+bottom+line+is+that+by+adding+length+to+a+good%2C+short+password+%28regardless+of+whether+or+not+they+are+repeated+characters+or+patterns%29+you+will+massively+improve+resistance+to+a+brute+force+attack.+This+is+because+today%27s+attacker+doesn%27t+know+how+long+the+password+is%2C+for+sure%2C+and+will+always+start+with+the+easy+dictionary+words+and+patterns%2C+and+then+they+will+move+to+the+shortest+possible+character+combinations+in+a+brute+force+attack%2C+followed+by+the+next+shortest+combinations%2C+and+so+on...%26nbsp%3B%0AAs+an+example%2C+using+this+logic%2C+a+23+character+random+password+is+not+%22usefully%22+stronger+than+a+3+character+random+password+with+21+repeated+characters.%26nbsp%3B+%0AThere+are+some+minor+caveats+in+using+this+approach%2C+to+keep+the+passwords+strong%2C+such+as+having+at+least+one+lower%2C+one+upper+case%2C+one+number+and+one+special+character+in+the+root+of+the+password.+The+rest+of+the+characters+don%27t+really+matter%2C+as+long+as+you+don%27t+reveal+what+pattern+you+use+in+the+repeated+characters+or+patterns.+%0AFor+example+%22..B.o.B..........%22+is+a+pretty+good+password%2C+since+it+would+take+at+least+2+billion+centuries+with+massive+cracking+array+scenario+to+go+through+all+combinations.+So%2C+you+don%27t+need+a+very+long+song+title+or+movie+phrase.+You+simply+need+to+keep+your+simple+pattern+or+strategy+a+secret.%0AThe+Security+Now+podcast+episode+%28in+text+or+audio+format%29+where+the+rationale+for+this+approach+is+described+is+at+the+following+link%3A%0Ahttp%3A%2F%2Fwww.grc.com%2Fsecuritynow.htm+%28look+for+Episode+303%29Steve+also+has+a+web+page+that+analyzes+passwords+in+terms+of+how+long+a+given+password+can+be+expected+to+stand+up+to+various+brute+force+attacks.+You+don%27t+have+to+enter+your+real+password%2C+but+try+entering+something+that+has+the+same+length%2C+and+number+of+upper%2C+lower+case%2C+numbers+and+special+characters+as+your+real+password%2C+and+see+how+long+it+would+take+an+attacker+to+try+all+combinations+using+a+brute+force+approach.+http%3A%2F%2Fwww.grc.com%2Fhaystack.htmIf+you+aren%27t+convinced%2C+or+if+you+want+to+learn+more%2C+post+a+question+or+comment+below.%0ASomething+to+ponder...-+ScottI+am+now+offering+monthly+briefings%2C+tailored+to+organizations+that+want+to+build+and+sustain+security+awareness+for+staff.+Just+because+your+security+team+is+too+busy+to+do+its+own+training+and+awareness+doesn%27t+mean+you+can%27t+have+an+economical+way+to+address+human+security+risks.+Please+call+or+email+me+at+the+coordinates+below...%0AScott+Wright%0AThe+Streetwise+Security+Coach%0AJoin+the+Streetwise+Security+Zone+at%3Ahttp%3A%2F%2Fwww.streetwise-security-zone.com%2Fjoin.html%0APhone%3A+1-613-693-0997Email%3A+scott%40streetwise-security-zone.comTwitter+ID%3A+http%3A%2F%2Fwww.twitter.com%2Fstreetsec%0ATo+receive+weekly+security+tips+and+other+notices+about+helpful+content+available+on+this+site%2C+please+make+sure+you+are+on+my+list+by+clicking+HERE%2C+and+entering+your+name+and+email+address.%0A%26nbsp%3B%0A%26nbsp%3B" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F06%2F07%2Fhow-to-easily-create-a-much-stronger-password-than-you-need-to-thwart-a-brute-force-attack%2F&amp;title=How+to+easily+create+a+much+stronger+password+than+you+need+to+thwart+a+brute+force+attack" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2011/06/07/how-to-easily-create-a-much-stronger-password-than-you-need-to-thwart-a-brute-force-attack/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=How+to+easily+create+a+much+stronger+password+than+you+need+to+thwart+a+brute+force+attack&body=If+you+have+been+struggling+with+the+problem+of+how+to+keep+passwords+strong%2C+yet+memorable%2C+we+may+have+a+simple+answer+for+you.+In+the+Security+Now+Podcast+%28episode+303%29+this+week%2C+Steve+Gibson+presents+a+very+interesting+analysis+on+what+makes+a+good+password+these+days.+He+calls+it+Password+Haystacks%2C+and+there+is+a+pretty+simple+solution+to+having+to+remember+strong+passwords.Steve%27s+conclusions+are+very+compatible+with+my+usual+prefered+strategy+for+choosing+passwords+-+like+using+the+first+characters+from+a+song+or+movie+quote%2C+and+adding+some+special+characters+and+numbers.+But+his+advice+is+interesting+about+how+simple+the+basic+password+root+can+be%2C+and+how+to+easily+make+it+much+stronger.+It%27s+pretty+cool+and+simple.The+bottom+line+is+that+by+adding+length+to+a+good%2C+short+password+%28regardless+of+whether+or+not+they+are+repeated+characters+or+patterns%29+you+will+massively+improve+resistance+to+a+brute+force+attack.+This+is+because+today%27s+attacker+doesn%27t+know+how+long+the+password+is%2C+for+sure%2C+and+will+always+start+with+the+easy+dictionary+words+and+patterns%2C+and+then+they+will+move+to+the+shortest+possible+character+combinations+in+a+brute+force+attack%2C+followed+by+the+next+shortest+combinations%2C+and+so+on...%26nbsp%3B%0AAs+an+example%2C+using+this+logic%2C+a+23+character+random+password+is+not+%22usefully%22+stronger+than+a+3+character+random+password+with+21+repeated+characters.%26nbsp%3B+%0AThere+are+some+minor+caveats+in+using+this+approach%2C+to+keep+the+passwords+strong%2C+such+as+having+at+least+one+lower%2C+one+upper+case%2C+one+number+and+one+special+character+in+the+root+of+the+password.+The+rest+of+the+characters+don%27t+really+matter%2C+as+long+as+you+don%27t+reveal+what+pattern+you+use+in+the+repeated+characters+or+patterns.+%0AFor+example+%22..B.o.B..........%22+is+a+pretty+good+password%2C+since+it+would+take+at+least+2+billion+centuries+with+massive+cracking+array+scenario+to+go+through+all+combinations.+So%2C+you+don%27t+need+a+very+long+song+title+or+movie+phrase.+You+simply+need+to+keep+your+simple+pattern+or+strategy+a+secret.%0AThe+Security+Now+podcast+episode+%28in+text+or+audio+format%29+where+the+rationale+for+this+approach+is+described+is+at+the+following+link%3A%0Ahttp%3A%2F%2Fwww.grc.com%2Fsecuritynow.htm+%28look+for+Episode+303%29Steve+also+has+a+web+page+that+analyzes+passwords+in+terms+of+how+long+a+given+password+can+be+expected+to+stand+up+to+various+brute+force+attacks.+You+don%27t+have+to+enter+your+real+password%2C+but+try+entering+something+that+has+the+same+length%2C+and+number+of+upper%2C+lower+case%2C+numbers+and+special+characters+as+your+real+password%2C+and+see+how+long+it+would+take+an+attacker+to+try+all+combinations+using+a+brute+force+approach.+http%3A%2F%2Fwww.grc.com%2Fhaystack.htmIf+you+aren%27t+convinced%2C+or+if+you+want+to+learn+more%2C+post+a+question+or+comment+below.%0ASomething+to+ponder...-+ScottI+am+now+offering+monthly+briefings%2C+tailored+to+organizations+that+want+to+build+and+sustain+security+awareness+for+staff.+Just+because+your+security+team+is+too+busy+to+do+its+own+training+and+awareness+doesn%27t+mean+you+can%27t+have+an+economical+way+to+address+human+security+risks.+Please+call+or+email+me+at+the+coordinates+below...%0AScott+Wright%0AThe+Streetwise+Security+Coach%0AJoin+the+Streetwise+Security+Zone+at%3Ahttp%3A%2F%2Fwww.streetwise-security-zone.com%2Fjoin.html%0APhone%3A+1-613-693-0997Email%3A+scott%40streetwise-security-zone.comTwitter+ID%3A+http%3A%2F%2Fwww.twitter.com%2Fstreetsec%0ATo+receive+weekly+security+tips+and+other+notices+about+helpful+content+available+on+this+site%2C+please+make+sure+you+are+on+my+list+by+clicking+HERE%2C+and+entering+your+name+and+email+address.%0A%26nbsp%3B%0A%26nbsp%3B%20-%20https://socialmediasecurity.com/2011/06/07/how-to-easily-create-a-much-stronger-password-than-you-need-to-thwart-a-brute-force-attack/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/06/07/how-to-easily-create-a-much-stronger-password-than-you-need-to-thwart-a-brute-force-attack/">How to easily create a much stronger password than you need to thwart a brute force attack</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
										<dc:creator>feedback@socialmediasecurity.com (Scott Wright's Security Views)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>If you have been struggling with the problem of how to keep passwords strong, yet memorable, we may have a simple answer for you. In the Security Now Podcast (episode 303) this week, Steve Gibson presents a very interesting analysis on what makes a good password these days. He calls it Password Haystacks, and there is a pretty simple solution to having to remember strong passwords. Steve's conclusions are very compatible with my usual prefered strategy for choosing passwords - like using the first characters from a song or movie quote, and adding some special characters and numbers. But his advice is interesting about how simple the basic password root can be, and how to easily make it much stronger. It's pretty cool and simple. The bottom line is that by adding length to a good, short password (regardless of whether or not they are repeated characters or patterns) you will massively improve resistance to a brute force attack. This is because today's attacker doesn't know how long the password is, for sure, and will always start with the easy dictionary words and patterns, and then they will move to the shortest possible character combinations in a brute force attack, followed by the next shortest combinations, and so on...&amp;#160; As an example, using this logic, a 23 character random password is not "usefully" stronger than a 3 character random password with 21 repeated characters.&amp;#160; There are some minor caveats in using this approach, to keep the passwords strong, such as having at least one lower, one upper case, one number and one special character in the root of the password. The rest of the characters don't really matter, as long as you don't reveal what pattern you use in the repeated characters or patterns. For example "..B.o.B.........." is a pretty good password, since it would take at least 2 billion centuries with massive cracking array scenario to go through all combinations. So, you don't need a very long song title or movie phrase. You simply need to keep your simple pattern or strategy a secret. The Security Now podcast episode (in text or audio format) where the rationale for this approach is described is at the following link: http://www.grc.com/securitynow.htm (look for Episode 303) Steve also has a web page that analyzes passwords in terms of how long a given password can be expected to stand up to various brute force attacks. You don't have to enter your real password, but try entering something that has the same length, and number of upper, lower case, numbers and special characters as your real password, and see how long it would take an attacker to try all combinations using a brute force approach. http://www.grc.com/haystack.htm If you aren't convinced, or if you want to learn more, post a question or comment below. Something to ponder... - Scott I am now offering monthly briefings, tailored to organizations that want to build and sustain security awareness for staff. Just because your security team is too busy to do its own training and awareness doesn't mean you can't have an economical way to address human security risks. Please call or email me at the coordinates below... Scott Wright The Streetwise Security Coach Join the Streetwise Security Zone at: http://www.streetwise-security-zone.com/join.html Phone: 1-613-693-0997 Email: scott@streetwise-security-zone.com Twitter ID: http://www.twitter.com/streetsec To receive weekly security tips and other notices about helpful content available on this site, please make sure you are on my list by clicking HERE, and entering your name and email address. &amp;#160; &amp;#160; The post How to easily create a much stronger password than you need to thwart a brute force attack appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>If you have been struggling with the problem of how to keep passwords strong, yet memorable, we may have a simple answer for you. In the Security Now Podcast (episode 303) this week, Steve Gibson presents a very interesting analysis on what makes a good password these days. He calls it Password Haystacks, and there is a pretty simple solution to having to remember strong passwords. Steve's conclusions are very compatible with my usual prefered strategy for choosing passwords - like using the first characters from a song or movie quote, and adding some special characters and numbers. But his advice is interesting about how simple the basic password root can be, and how to easily make it much stronger. It's pretty cool and simple. The bottom line is that by adding length to a good, short password (regardless of whether or not they are repeated characters or patterns) you will massively improve resistance to a brute force attack. This is because today's attacker doesn't know how long the password is, for sure, and will always start with the easy dictionary words and patterns, and then they will move to the shortest possible character combinations in a brute force attack, followed by the next shortest combinations, and so on...&amp;#160; As an example, using this logic, a 23 character random password is not "usefully" stronger than a 3 character random password with 21 repeated characters.&amp;#160; There are some minor caveats in using this approach, to keep the passwords strong, such as having at least one lower, one upper case, one number and one special character in the root of the password. The rest of the characters don't really matter, as long as you don't reveal what pattern you use in the repeated characters or patterns. For example "..B.o.B.........." is a pretty good password, since it would take at least 2 billion centuries with massive cracking array scenario to go through all combinations. So, you don't need a very long song title or movie phrase. You simply need to keep your simple pattern or strategy a secret. The Security Now podcast episode (in text or audio format) where the rationale for this approach is described is at the following link: http://www.grc.com/securitynow.htm (look for Episode 303) Steve also has a web page that analyzes passwords in terms of how long a given password can be expected to stand up to various brute force attacks. You don't have to enter your real password, but try entering something that has the same length, and number of upper, lower case, numbers and special characters as your real password, and see how long it would take an attacker to try all combinations using a brute force approach. http://www.grc.com/haystack.htm If you aren't convinced, or if you want to learn more, post a question or comment below. Something to ponder... - Scott I am now offering monthly briefings, tailored to organizations that want to build and sustain security awareness for staff. Just because your security team is too busy to do its own training and awareness doesn't mean you can't have an economical way to address human security risks. Please call or email me at the coordinates below... Scott Wright The Streetwise Security Coach Join the Streetwise Security Zone at: http://www.streetwise-security-zone.com/join.html Phone: 1-613-693-0997 Email: scott@streetwise-security-zone.com Twitter ID: http://www.twitter.com/streetsec To receive weekly security tips and other notices about helpful content available on this site, please make sure you are on my list by clicking HERE, and entering your name and email address. &amp;#160; &amp;#160; The post How to easily create a much stronger password than you need to thwart a brute force attack appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Taking over the Facebook Page “buy now” button (Part 1 of 2)</title>
		<link>https://socialmediasecurity.com/2011/05/25/taking-over-the-facebook-page-buy-now-button-part-1-of-2/</link>
				<comments>https://socialmediasecurity.com/2011/05/25/taking-over-the-facebook-page-buy-now-button-part-1-of-2/#respond</comments>
				<pubDate>Wed, 25 May 2011 16:40:56 +0000</pubDate>
		
				<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Social Networking]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://socialmediasecurity.com/?p=4144</guid>
				<description><![CDATA[<p>As I have been testing the security settings of companies social media strategies, I have consistently noticed two things, marketing is desperately trying to find its ROI and IT/Security doesn&#8217;t even know they have a FB page.  I do agree that after a number of months, it is time to show the CFO that spending that insame amount of time [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/05/25/taking-over-the-facebook-page-buy-now-button-part-1-of-2/">Taking over the Facebook Page &#8220;buy now&#8221; button (Part 1 of 2)</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>As I have been testing the security settings of companies social media strategies, I have consistently noticed two things, marketing is desperately trying to find its ROI and IT/Security doesn&#8217;t even know they have a FB page.  I do agree that after a number of months, it is time to show the CFO that spending that insame amount of time on their social media sites is worth the payroll checks. Unfortunately, analytics alone have been a blurry way of making that compelling argument and can be defeated by saying, if, I had put those payroll checks into google&#8230;I could see our ROI in a nice neat report. This is one of the reasons that marketing is jumping head first into technologies like Shoutlet, payvment or <a title="Article on e-commerce apps." href="http://www.practicalecommerce.com/articles/2095-Six-Facebook-Applications-to-Sell-Your-Products">others</a> (FB E-commerce). Why not sell your items on your FB Page?  Your team has worked extremely hard to get thousands of new users to click follow/like. Ultimately, this is going to be the future of pages but because IT/Security is not involved in the social media process it also opens a HUGE GAPPING HOLE in your security policy and procedures. And of course here is your example:</p>
<p>The policy of company ACME is &#8220;no social networking allowed&#8221; on internal networks.  Sites are being blocked at the firewall with rules and enforced with a content filtering tool. IT/Security has done its job with social media, right? BUT an exception is made for Marketing because they are special people. A FB page was created as well as an E-Commerce app installed without consulting IT/Security. I know this because after taking over the FB page using our friends Cain and Able, I replaced just one of the &#8220;buy now&#8221; buttons to redirect it my site and used analytics to see how many people clicked this button.  Showing this to Director of IT he replied &#8220;I didn&#8217;t even know we had a FB Page.&#8221; Part two is coming&#8230;but I leave you with this..</p>
<p>Who is in charge of these buttons?  Have these tools been tested and approved by IT/Sec before you took the 6 mins to install on your facebook page? What permissions are you giving this solution? HEY! IT/Sec does your company have a FB page?  Have you seen it lately? Is it part of your compliance testing?</p>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F05%2F25%2Ftaking-over-the-facebook-page-buy-now-button-part-1-of-2%2F&amp;t=Taking+over+the+Facebook+Page+%E2%80%9Cbuy+now%E2%80%9D+button+%28Part+1+of+2%29" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Taking+over+the+Facebook+Page+%E2%80%9Cbuy+now%E2%80%9D+button+%28Part+1+of+2%29%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F05%2F25%2Ftaking-over-the-facebook-page-buy-now-button-part-1-of-2%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F05%2F25%2Ftaking-over-the-facebook-page-buy-now-button-part-1-of-2%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F05%2F25%2Ftaking-over-the-facebook-page-buy-now-button-part-1-of-2%2F&amp;title=Taking+over+the+Facebook+Page+%E2%80%9Cbuy+now%E2%80%9D+button+%28Part+1+of+2%29&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=As+I+have+been+testing+the+security+settings+of+companies+social+media+strategies%2C+I+have%C2%A0consistently%C2%A0noticed+two+things%2C+marketing+is%C2%A0desperately%C2%A0trying+to+find+its+ROI+and+IT%2FSecurity+doesn%27t%C2%A0even+know+they+have+a+FB+page.+%C2%A0I+do+agree+that+a" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F05%2F25%2Ftaking-over-the-facebook-page-buy-now-button-part-1-of-2%2F&amp;title=Taking+over+the+Facebook+Page+%E2%80%9Cbuy+now%E2%80%9D+button+%28Part+1+of+2%29" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2011/05/25/taking-over-the-facebook-page-buy-now-button-part-1-of-2/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Taking+over+the+Facebook+Page+%E2%80%9Cbuy+now%E2%80%9D+button+%28Part+1+of+2%29&body=As+I+have+been+testing+the+security+settings+of+companies+social+media+strategies%2C+I+have%C2%A0consistently%C2%A0noticed+two+things%2C+marketing+is%C2%A0desperately%C2%A0trying+to+find+its+ROI+and+IT%2FSecurity+doesn%27t%C2%A0even+know+they+have+a+FB+page.+%C2%A0I+do+agree+that+a%20-%20https://socialmediasecurity.com/2011/05/25/taking-over-the-facebook-page-buy-now-button-part-1-of-2/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/05/25/taking-over-the-facebook-page-buy-now-button-part-1-of-2/">Taking over the Facebook Page &#8220;buy now&#8221; button (Part 1 of 2)</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://socialmediasecurity.com/2011/05/25/taking-over-the-facebook-page-buy-now-button-part-1-of-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							<dc:creator>feedback@socialmediasecurity.com (jruffer)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>As I have been testing the security settings of companies social media strategies, I have consistently noticed two things, marketing is desperately trying to find its ROI and IT/Security doesn&amp;#8217;t even know they have a FB page.  I do agree that after a number of months, it is time to show the CFO that spending that insame amount of time [&amp;#8230;] The post Taking over the Facebook Page &amp;#8220;buy now&amp;#8221; button (Part 1 of 2) appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>As I have been testing the security settings of companies social media strategies, I have consistently noticed two things, marketing is desperately trying to find its ROI and IT/Security doesn&amp;#8217;t even know they have a FB page.  I do agree that after a number of months, it is time to show the CFO that spending that insame amount of time [&amp;#8230;] The post Taking over the Facebook Page &amp;#8220;buy now&amp;#8221; button (Part 1 of 2) appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Firesheep’s Revenge</title>
		<link>https://socialmediasecurity.com/2011/05/02/firesheeps-revenge/</link>
				<comments>https://socialmediasecurity.com/2011/05/02/firesheeps-revenge/#comments</comments>
				<pubDate>Tue, 03 May 2011 02:58:03 +0000</pubDate>
		
				<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Google Buzz]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Social Networking]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[firesheep]]></category>
		<category><![CDATA[foursquare]]></category>
		<category><![CDATA[jruffer]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[socialmedia]]></category>

		<guid isPermaLink="false">http://socialmediasecurity.com/?p=3873</guid>
				<description><![CDATA[<p>No, this is not an article on the new version or even newly added super hero features for firesheep? #titlefail? Maybe but please read on then decide. I know firesheep has lost its shiny coin syndrome with most but the attack is still working quite well in the field.  While the readers/listeners have been doing [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/05/02/firesheeps-revenge/">Firesheep&#8217;s Revenge</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>No, this is not an article on the new version or even newly added super hero features for firesheep? #titlefail? Maybe but please read on then decide.</p>
<p>I know firesheep has lost its shiny coin syndrome with most but the attack is still working quite well in the field.  While the readers/listeners have been doing a good job of enabling secure browsing options in Twitter and Facebook, we still have a long way to go. Please keep spreading the word and keep pleading to social networking sites to enable secure browsing by default.  So, Why the &#8220;Firesheep&#8217;s Revenge&#8221; title?  Well these last month’s, a couple of us have been testing common social media monitoring (SMM) tools.  These tools are generally used by small businesses, internal marketing, or external marketing companies to help update social media accounts without the hassle of logging into every social networking site individually.  We have been testing these SSM&#8217;s and found that:</p>
<p><a href="http://hootsuite.com/dashboard#">http://hootsuite.com/dashboard#<br />
</a><a href="http://sproutsocial.com/dashboard">http://sproutsocial.com/dashboard<br />
</a><a href="http://standard.cotweet.com/channels">http://standard.cotweet.com/channels#</a></p>
<p>Are not using secure browsing by default, allowing us to hijack sessions.  What does this mean? Well by adding your social media accounts into these SMM tools, you are granting the tool permission or full control over that account(s). By gaining control over the tool we are bypassing all the hard work you did by enabling secure browsing in each of your twitter and facebook accounts.  Try explaining to the VP of Marketing that even though you checked the “defeat firesheep” box it still works. And not only will it work on Facebook/Twitter but now LinkedIn, Foursquare, ping.fm and Ning accounts all in one interface. Most of the time we were looking at full access to the corporations social media strategy. So, we are right back to where we started, teaching the user that security is usually the last thing on the mind of these rapid development firms. If you do not see the option of “secure browsing”, then please be careful of where you update your social media accounts. Ask your tool makers where this option is located.  If they do not have this option then maybe you should look for another tool.</p>
<p>James F. Ruffer III<br />
Unixbox<br />
@jruffer</p>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F05%2F02%2Ffiresheeps-revenge%2F&amp;t=Firesheep%E2%80%99s+Revenge" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Firesheep%E2%80%99s+Revenge%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F05%2F02%2Ffiresheeps-revenge%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F05%2F02%2Ffiresheeps-revenge%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F05%2F02%2Ffiresheeps-revenge%2F&amp;title=Firesheep%E2%80%99s+Revenge&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=No%2C+this+is+not+an+article+on+the+new+version+or+even+newly+added+super+hero+features+for+firesheep%3F+%23titlefail%3F+Maybe+but+please+read+on+then+decide.%0D%0A%0D%0AI+know+firesheep+has+lost+its+shiny+coin+syndrome+with+most+but+the+attack+is+still+working+quit" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F05%2F02%2Ffiresheeps-revenge%2F&amp;title=Firesheep%E2%80%99s+Revenge" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2011/05/02/firesheeps-revenge/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Firesheep%E2%80%99s+Revenge&body=No%2C+this+is+not+an+article+on+the+new+version+or+even+newly+added+super+hero+features+for+firesheep%3F+%23titlefail%3F+Maybe+but+please+read+on+then+decide.%0D%0A%0D%0AI+know+firesheep+has+lost+its+shiny+coin+syndrome+with+most+but+the+attack+is+still+working+quit%20-%20https://socialmediasecurity.com/2011/05/02/firesheeps-revenge/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/05/02/firesheeps-revenge/">Firesheep&#8217;s Revenge</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://socialmediasecurity.com/2011/05/02/firesheeps-revenge/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
							<dc:creator>feedback@socialmediasecurity.com (jruffer)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>No, this is not an article on the new version or even newly added super hero features for firesheep? #titlefail? Maybe but please read on then decide. I know firesheep has lost its shiny coin syndrome with most but the attack is still working quite well in the field.  While the readers/listeners have been doing [&amp;#8230;] The post Firesheep&amp;#8217;s Revenge appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>No, this is not an article on the new version or even newly added super hero features for firesheep? #titlefail? Maybe but please read on then decide. I know firesheep has lost its shiny coin syndrome with most but the attack is still working quite well in the field.  While the readers/listeners have been doing [&amp;#8230;] The post Firesheep&amp;#8217;s Revenge appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Recent Facebook XSS Attacks Show Increasing Sophistication</title>
		<link>https://socialmediasecurity.com/2011/04/21/recent-facebook-xss-attacks-show-increasing-sophistication-394/</link>
				<pubDate>Thu, 21 Apr 2011 19:37:22 +0000</pubDate>
		
				<category><![CDATA[Contributors]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[socnetsec]]></category>

		<guid isPermaLink="false">http://theharmonyguy.com/?p=1066</guid>
				<description><![CDATA[<p>A few weeks ago, three separate cross-site scripting (XSS) vulnerabilities on Facebook sites were uncovered within a period of about 10 days. At least two of these holes were used to launch viral links or attacks on users &#8211; and it&#8217;s clear that attacks against Facebook users are becoming increasingly sophisticated. The first issue came [...]</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/04/21/recent-facebook-xss-attacks-show-increasing-sophistication-394/">Recent Facebook XSS Attacks Show Increasing Sophistication</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>A few weeks ago, three separate cross-site scripting (XSS) vulnerabilities on Facebook sites were uncovered within a period of about 10 days. At least two of these holes were used to launch viral links or attacks on users &#8211; and it&#8217;s clear that attacks against Facebook users are becoming increasingly sophisticated.</p>
<p>The first issue came from a page on the mobile version of Facebook&#8217;s site. The interface was a prompt for posting stories to a user&#8217;s wall, and the parameter for the text of the prompt did not properly escape output. On March 28, a blogger identifying themselves as &#8220;Joy CrazyDaVinci&#8221; <a title="Autopost Spamming using Facebook Mobile XSS" href="http://blog.crazydavinci.net/2011/03/autopost-spamming-using-facebook-mobile-xss/">posted code</a> that demonstrated how the vulnerability could be used to spread viral links:<span id="more-1066"></span></p>
<blockquote>
<p>&lt;iframe id=&#8221;CrazyDaVinci&#8221; style=&#8221;display:none;&#8221;<br />
src=&#8221;http://m.facebook.com/connect/prompt_feed.php?display=wap&amp;user_message_prompt=&#8217;&lt;script&gt;window.onload=function(){document.forms[0].message.value=&#8217;<span style="color: red;">Just visited http://y.ahoo.it/gajeBA Wow.. cool! nice page dude!!!</span>&#8216;;document.forms[0].submit();}&lt;/script&gt;&#8221;&gt;&lt;/iframe&gt;</p>
</blockquote>
<p>This bit of HTML would be included in a viral page. The code sets the content of the wall post to a message that includes a link to a viral page, then submits the prompt automatically. Anyone clicking the link would get the same code executed on their account. The viral page could be used for malware distribution or phishing attacks, but in most cases where I saw this trick used, the page simply loaded advertisements or &#8220;offer spam&#8221;.</p>
<p>By the next day, several links were spreading virally and <a title="New XSS Facebook Worm Allows Automatic Wall Posts" href="http://www.symantec.com/connect/blogs/new-xss-facebook-worm-allows-automatic-wall-posts">caught the attention</a> of security researchers. Facebook moved quickly to patch the issue, and Crazy DaVinci issued <a title="Statement of Apology" href="http://blog.crazydavinci.net/2011/03/statement-of-apology/">an apology</a> for the example code, explaining that versions of it had actually been circulating for several days prior and that the demonstration was intended to push Facebook for a fix.</p>
<p>On April 3, another XSS problem <a title="Channel.facebook.com cross-site-scripting (XSS) vulnerability by Edgard Chammas" href="http://www.thehackernews.com/2011/04/channelfacebookcom-cross-site-scripting.html">came to light</a>, this time with a Facebook &#8220;channel&#8221; page used for session management. Both another security researcher and I had previously looked at this interface and found it properly escaped, so it&#8217;s likely a code update mistakenly changed the page&#8217;s behavior. Facebook again patched the problem soon after news of it spread.</p>
<p>I didn&#8217;t observe any viral exploitation of the second vulnerability in the wild, but after the first problem came to light, I noted that it was mostly used to submit a form already on the page for posting links. The payload made use of functionality within the vulnerable page, but XSS allows an attacker to do far more. I wondered when we might see a Facebook attack that made greater use of cross-site scripting&#8217;s potential.</p>
<h3>What a Difference a Space Makes</h3>
<p>I didn&#8217;t have to wait long. On April 7, I got word via Twitter of a Facebook app that had live XSS, but the app had disappeared before I got to see it in action. At first, I thought this was yet another case of XSS within the context of a Facebook app. But I soon found other version of the app which were still online, and I quickly realized this was actually an XSS problem with the Facebook Platform. Also, the XSS payload being used did much more than submit a form.</p>
<p>The attack used FBML-based Facebook apps, which render in the context of an apps.facebook.com page. Normally, Facebook filters code to prevent any scripts from directly modifying the page&#8217;s DOM, but the XSS problem gave attackers a bypass. When a user visited the app page, they would see what appeared to be a fairly benign page with a popular video.</p>
<p><a href="http://theharmonyguy.com/wp-content/uploads/2011/04/bullypalxss.jpg"><img class="aligncenter size-medium wp-image-1067" title="Screenshot of XSS-based attack page." src="http://theharmonyguy.com/wp-content/uploads/2011/04/bullypalxss-471x400.jpg" alt="" width="471" height="400" /></a></p>
<p>Unlike many Facebook page scams, the promised video actually works &#8211; if you click play, the video will load and nothing unusual seems to happen. But as the code screenshot below reveals, that click does much more than load the video.</p>
<p><a href="http://theharmonyguy.com/wp-content/uploads/2011/04/bullypalxss2.jpg"><img class="aligncenter size-full wp-image-1069" title="Screenshot of Facebook XSS code." src="http://theharmonyguy.com/wp-content/uploads/2011/04/bullypalxss2.jpg" alt="" width="471" height="176" /></a></p>
<p>When the page first loads, the &#8220;video&#8221; is actually just an image placeholder with a link. Part of the href parameter for that link is shown above. Note the space after the opening quotation mark &#8211; that&#8217;s where the XSS comes in. Normally, Facebook would block a link to a javascript: URL. Adding the space worked around Facebook&#8217;s filters, but the browser would still execute the rest of parameter.</p>
<p>According to Facebook, it turned out that some older code was using PHP&#8217;s built-in parse_url function to determine allowable URLs. For example, while parse_url(&#8220;javascript:alert(1)&#8221;) yields a scheme of &#8220;javascript&#8221; and a path of &#8220;alert(1)&#8221;, adding whitespace gives a different result: parse_url(&#8221; javascript:alert(1)&#8221;) does not return a scheme and has a path of &#8220;javascript:alert(1)&#8221;. Other PHP developers should take note of the difference if parse_url is being used in security-related code.</p>
<h3>A More Advanced Attack</h3>
<p>Clicking the link executed an inline script that in turn added a script element to the page. This loaded more code from a remote address and included several parameters in the GET request. The parameters set variables within the remote code that specified what video to load, what URLs to use for viral posts, and so on. Multiple Facebook apps and domains were used for the viral links, but the main script always came from the same host. This helped the attack persist, since blocking one site would not stop it and the central code was loaded dynamically.</p>
<p>The remote code handled actually loading the video, but also included a number of functions which make use of having script access in a facebook.com context. The script would set the user as attending spam events, invite friends to those events, &#8220;like&#8221; a viral link, and even send IMs to friends using Facebook Chat.</p>
<p>When I came across the attack, one block of code had been commented out, but one blogger <a title="Preliminary analysis of Facebook clickjacking (aprilfoolsprank)" href="http://ashishb.net/uncategorized/a-preliminary-analysis-of-facebook-clickjacking-aprilfoolsprank/">discovered a version of the attack</a> a few days prior and saw it in action. This part loaded a fake login form which actually sent the entered username and password to a log interface on the attacker&#8217;s server. (Remember, this phishing form would appear in the context of a page with typical Facebook chrome.) Since the attack page would load even if a user was not logged in to Facebook, this could have also been a way to make sure a session was available before launching the other functions.</p>
<p>Fake videos and viral links are nothing new on Facebook, but most of these scams tend to be fairly simple. In fact, it&#8217;s not hard to find forums where people offer boilerplate code for launching such schemes &#8211; much like the first XSS worm above which simply submitted a form. But the April XSS attack involved multiple domains, multiple user accounts, and multiple methods for spreading and hijacking user accounts. And it still only scratched the surface of what&#8217;s possible with an XSS vulnerability. I expect we&#8217;ll see more XSS-based attacks and more powerful payloads in the future.</p>
<h3>Postscript on Real-Time Research</h3>
<p>I came across the April attack late one afternoon as I was preparing to leave work&#8230; so I could present on XSS at a local OWASP meeting! Those following me on Twitter saw a somewhat frantic stream of tweets as I tried to find live examples of the attack and sorted through the code while closely watching the clock and wrapping up last-minute presentation details. Earlier this week, I did some searching to review information for this post, and I came across this article from eWEEK: &#8220;<a title="Facebook Bully Video Actually an XSS Exploit" href="http://www.eweek.com/c/a/Security/Facebook-Bully-Video-Actually-a-XSS-Exploit-121829/">Facebook Bully Video Actually an XSS Exploit</a>&#8220;.</p>
<p>I was a bit surprised by it, as I hadn&#8217;t known about it before and saw that it quoted me. I then realized it was quoting my tweets! I then read that I had &#8220;confirmed to eWEEK on Twitter&#8221; one aspect of the story. At first I was confused, but then remembered that during my flood of tweeting, another user had sent an @ reply asking about the very detail the story talked about. Checking that tweet again, I found out the question had come from the article&#8217;s author.</p>
<p>I relate all this not because any of it bothered me, simply because (1) I found it somewhat fascinating that a few quick Twitter updates could become the primary source for a news article and (2) I was humbled to realize that a few quick Twitter updates could become the primary source for a news article! While it&#8217;s great that a story can spread so fast, it was certainly gave me a reminder to be careful when discussing topics of interest on a public forum. But I&#8217;m glad I can do my part in helping raise awareness of online dangers, particular the implications of XSS.</p>
<div class="feedflare">
<a href="http://feeds.feedburner.com/~ff/theharmonyguy?a=oktHDSCAKwM:w406MFk_aqQ:YwkR-u9nhCs"><img src="http://feeds.feedburner.com/~ff/theharmonyguy?d=YwkR-u9nhCs" border="0"></img></a>
</div>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F04%2F21%2Frecent-facebook-xss-attacks-show-increasing-sophistication-394%2F&amp;t=Recent+Facebook+XSS+Attacks+Show+Increasing+Sophistication" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Recent+Facebook+XSS+Attacks+Show+Increasing+Sophistication%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F04%2F21%2Frecent-facebook-xss-attacks-show-increasing-sophistication-394%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F04%2F21%2Frecent-facebook-xss-attacks-show-increasing-sophistication-394%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F04%2F21%2Frecent-facebook-xss-attacks-show-increasing-sophistication-394%2F&amp;title=Recent+Facebook+XSS+Attacks+Show+Increasing+Sophistication&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=A+few+weeks+ago%2C+three+separate+cross-site+scripting+%28XSS%29+vulnerabilities+on+Facebook+sites+were+uncovered+within+a+period+of+about+10+days.+At+least+two+of+these+holes+were+used+to+launch+viral+links+or+attacks+on+users+%26%238211%3B+and+it%26%238217%3Bs+clear+that+attacks+against+Facebook+users+are+becoming+increasingly+sophisticated.+The+first+issue+came+%5B...%5D" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F04%2F21%2Frecent-facebook-xss-attacks-show-increasing-sophistication-394%2F&amp;title=Recent+Facebook+XSS+Attacks+Show+Increasing+Sophistication" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2011/04/21/recent-facebook-xss-attacks-show-increasing-sophistication-394/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Recent+Facebook+XSS+Attacks+Show+Increasing+Sophistication&body=A+few+weeks+ago%2C+three+separate+cross-site+scripting+%28XSS%29+vulnerabilities+on+Facebook+sites+were+uncovered+within+a+period+of+about+10+days.+At+least+two+of+these+holes+were+used+to+launch+viral+links+or+attacks+on+users+%26%238211%3B+and+it%26%238217%3Bs+clear+that+attacks+against+Facebook+users+are+becoming+increasingly+sophisticated.+The+first+issue+came+%5B...%5D%20-%20https://socialmediasecurity.com/2011/04/21/recent-facebook-xss-attacks-show-increasing-sophistication-394/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/04/21/recent-facebook-xss-attacks-show-increasing-sophistication-394/">Recent Facebook XSS Attacks Show Increasing Sophistication</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
										<dc:creator>feedback@socialmediasecurity.com (theharmonyguy)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>A few weeks ago, three separate cross-site scripting (XSS) vulnerabilities on Facebook sites were uncovered within a period of about 10 days. At least two of these holes were used to launch viral links or attacks on users &amp;#8211; and it&amp;#8217;s clear that attacks against Facebook users are becoming increasingly sophisticated. The first issue came [...] The post Recent Facebook XSS Attacks Show Increasing Sophistication appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>A few weeks ago, three separate cross-site scripting (XSS) vulnerabilities on Facebook sites were uncovered within a period of about 10 days. At least two of these holes were used to launch viral links or attacks on users &amp;#8211; and it&amp;#8217;s clear that attacks against Facebook users are becoming increasingly sophisticated. The first issue came [...] The post Recent Facebook XSS Attacks Show Increasing Sophistication appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Social Zombies Gone Wild: Totally Exposed and Uncensored</title>
		<link>https://socialmediasecurity.com/2011/04/18/social-zombies-gone-wild-totally-exposed-and-uncensored/</link>
				<comments>https://socialmediasecurity.com/2011/04/18/social-zombies-gone-wild-totally-exposed-and-uncensored/#respond</comments>
				<pubDate>Mon, 18 Apr 2011 15:05:48 +0000</pubDate>
		
				<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Geolocation]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Social Networking]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[BeEF]]></category>
		<category><![CDATA[kevin]]></category>
		<category><![CDATA[qrcode]]></category>
		<category><![CDATA[research]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[socialmedia]]></category>
		<category><![CDATA[socialnetworking]]></category>
		<category><![CDATA[socnetsec]]></category>
		<category><![CDATA[zombies]]></category>

		<guid isPermaLink="false">http://socialmediasecurity.com/?p=3682</guid>
				<description><![CDATA[<p>Kevin Johnson and Tom Eston gave the third and final &#8220;Social Zombies&#8221; talk at Notacon 8 this weekend.  This talk focused on how social networks are using geolocation and the abuse of location based services. &#8220;Social networks have jumped onto the geolocation bandwagon with location-based tweets, status updates, check-ins, mayorships, and more. This doesn’t take [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/04/18/social-zombies-gone-wild-totally-exposed-and-uncensored/">Social Zombies Gone Wild: Totally Exposed and Uncensored</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p><a href="http://twitter.com/secureideas">Kevin Johnson</a> and <a href="http://twitter.com/agent0x0">Tom Eston</a> gave the third and final &#8220;Social Zombies&#8221; talk at <a href="http://notacon.org">Notacon 8</a> this weekend.  This talk focused on how social networks are using geolocation and the abuse of location based services.</p>
<blockquote><p>&#8220;Social networks have jumped onto the geolocation bandwagon with location-based tweets, status updates, check-ins, mayorships, and more. This doesn’t take into account EXIF, QR codes, and advancements in HTML 5 geo implementations, which are being built into these location-based services. This is often implemented and enabled without the user even knowing it. In fact, geolocation is one of the hottest technologies being used in everything from web browsers to mobile devices. As social networks throw our location coordinates around like candy, its only natural that bad things will happen and abuse will become more popular. This presentation will cover how social networks and other websites are currently using location-based services, what they plan on doing with it, and a discussion on the current privacy and security issues. We will also discuss the latest geolocation hacking techniques and will release custom code that can abuse all of the features being discussed.&#8221;</p></blockquote>
<p>Slides are on SlideShare below:</p>
<div id="__ss_7664492" style="width: 425px;"><strong style="display: block; margin: 12px 0 4px;"><a title="Social Zombies Gone Wild: Totally Exposed and Uncensored" href="http://www.slideshare.net/agent0x0/social-zombies-gone-wild-totally-exposed-and-uncensored-7664492">Social Zombies Gone Wild: Totally Exposed and Uncensored</a></strong> <object id="__sse7664492" width="425" height="355"><param name="movie" value="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=socialzombiesgonewildnotacon8final-110418094757-phpapp02&amp;rel=0&amp;stripped_title=social-zombies-gone-wild-totally-exposed-and-uncensored-7664492&amp;userName=agent0x0" /><param name="allowFullScreen" value="true" /><param name="allowScriptAccess" value="always" /><embed type="application/x-shockwave-flash" width="425" height="355" src="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=socialzombiesgonewildnotacon8final-110418094757-phpapp02&amp;rel=0&amp;stripped_title=social-zombies-gone-wild-totally-exposed-and-uncensored-7664492&amp;userName=agent0x0" name="__sse7664492" allowscriptaccess="always" allowfullscreen="true"></embed></object></p>
<div style="padding: 5px 0 12px;">View more <a href="http://www.slideshare.net/">presentations</a> from <a href="http://www.slideshare.net/agent0x0">agent0x0</a></div>
</div>
<p><script src="http://b.scorecardresearch.com/beacon.js?c1=7&amp;c2=7400849&amp;c3=1&amp;c4=&amp;c5=&amp;c6="></script></p>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F04%2F18%2Fsocial-zombies-gone-wild-totally-exposed-and-uncensored%2F&amp;t=Social+Zombies+Gone+Wild%3A+Totally+Exposed+and+Uncensored" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Social+Zombies+Gone+Wild%3A+Totally+Exposed+and+Uncensored%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F04%2F18%2Fsocial-zombies-gone-wild-totally-exposed-and-uncensored%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F04%2F18%2Fsocial-zombies-gone-wild-totally-exposed-and-uncensored%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F04%2F18%2Fsocial-zombies-gone-wild-totally-exposed-and-uncensored%2F&amp;title=Social+Zombies+Gone+Wild%3A+Totally+Exposed+and+Uncensored&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=Kevin+Johnson+and+Tom+Eston+gave+the+third+and+final+%22Social+Zombies%22+talk+at+Notacon+8+this+weekend.+%C2%A0This+talk+focused+on+how+social+networks+are+using+geolocation+and+the+abuse+of+location+based+services.%0D%0A%22Social+networks+have+jumped+onto+the+ge" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F04%2F18%2Fsocial-zombies-gone-wild-totally-exposed-and-uncensored%2F&amp;title=Social+Zombies+Gone+Wild%3A+Totally+Exposed+and+Uncensored" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2011/04/18/social-zombies-gone-wild-totally-exposed-and-uncensored/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Social+Zombies+Gone+Wild%3A+Totally+Exposed+and+Uncensored&body=Kevin+Johnson+and+Tom+Eston+gave+the+third+and+final+%22Social+Zombies%22+talk+at+Notacon+8+this+weekend.+%C2%A0This+talk+focused+on+how+social+networks+are+using+geolocation+and+the+abuse+of+location+based+services.%0D%0A%22Social+networks+have+jumped+onto+the+ge%20-%20https://socialmediasecurity.com/2011/04/18/social-zombies-gone-wild-totally-exposed-and-uncensored/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/04/18/social-zombies-gone-wild-totally-exposed-and-uncensored/">Social Zombies Gone Wild: Totally Exposed and Uncensored</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://socialmediasecurity.com/2011/04/18/social-zombies-gone-wild-totally-exposed-and-uncensored/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							<dc:creator>feedback@socialmediasecurity.com (Tom)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Kevin Johnson and Tom Eston gave the third and final &amp;#8220;Social Zombies&amp;#8221; talk at Notacon 8 this weekend.  This talk focused on how social networks are using geolocation and the abuse of location based services. &amp;#8220;Social networks have jumped onto the geolocation bandwagon with location-based tweets, status updates, check-ins, mayorships, and more. This doesn’t take [&amp;#8230;] The post Social Zombies Gone Wild: Totally Exposed and Uncensored appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>Kevin Johnson and Tom Eston gave the third and final &amp;#8220;Social Zombies&amp;#8221; talk at Notacon 8 this weekend.  This talk focused on how social networks are using geolocation and the abuse of location based services. &amp;#8220;Social networks have jumped onto the geolocation bandwagon with location-based tweets, status updates, check-ins, mayorships, and more. This doesn’t take [&amp;#8230;] The post Social Zombies Gone Wild: Totally Exposed and Uncensored appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Why Should the CSO Care About an Employee’s Personal Social Media Account?</title>
		<link>https://socialmediasecurity.com/2011/03/29/why-should-the-cso-care-about-an-employees-personal-social-media-account/</link>
				<comments>https://socialmediasecurity.com/2011/03/29/why-should-the-cso-care-about-an-employees-personal-social-media-account/#comments</comments>
				<pubDate>Tue, 29 Mar 2011 20:20:29 +0000</pubDate>
		
				<category><![CDATA[Contributors]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Social Networking]]></category>
		<category><![CDATA[socialmedia]]></category>

		<guid isPermaLink="false">http://socialmediasecurity.com/?p=3326</guid>
				<description><![CDATA[<p>Thank you to Tom for allowing me to participate with social media security dot com. The guys in this community have been great resources in helping me to spread the word on the insecurities with social media. This year, I have been reaching beyond the security space, speaking to many social media clubs, podcampers and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/03/29/why-should-the-cso-care-about-an-employees-personal-social-media-account/">Why Should the CSO Care About an Employee&#8217;s Personal Social Media Account?</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<div>
<div>
<div>
<div>
<div>
<p>Thank you to Tom for allowing me to participate with social media security dot com. The guys in this community have been great resources in helping me to spread the word on the insecurities with social media. This year, I have been reaching beyond the security space, speaking to many social media clubs, podcampers and O’Reilly conferences only to realize something disheartening. Not enough people hear or are listening to us! I am going to start posting some real experiences to help with the questions of “why should I care about social media security?”</p>
</div>
</div>
</div>
</div>
</div>
<div>
<div>
<div>
<div>
<div>
<p>This week at Podcampnashville I was able to demo firesheep and in 3 mins and 48 secs, 64 accounts were in my sidebar waiting for me to double click. After the demo I had some great questions and just like that the session was over.  Later a young lady came to me and admitted she was 1 of the 64 in the sidebar. She asked me to show her what I “could” of done with her account. She was not really impressed or scared that I could of updated the profile, chat with friends or add creepy users.  Then fear came very quickly when I changed from the user account to the PAGES she had admin rights.</p>
</div>
</div>
</div>
</div>
</div>
<blockquote>
<div>
<div>
<div>
<div>
<div>
<p><img src="https://lh3.googleusercontent.com/ImSaMNhK2COQiaWppt8-NiCvzoTlKfOLVeeNk6vqElI9TXl3w2QyWY5iqqiNEcdbyJ7X0F5ihEazo2sF_Twn2JUWIh5AWdc-WGJrTc_tZ-i37pv7XUs" alt="" width="582px;" height="425px;" /></p>
</div>
</div>
</div>
</div>
</div>
</blockquote>
<div>
<div>
<div>
<div>
<div>
<p>She is in charge of the facebook pages of 12 major medical practices in the area. I have to be honest she rocked at maintaining these pages. Impressed by her work, I asked how long she had into these pages and followers. Time was in the 1000’s of hours and also in the $100,000 range of billable time.  My final question to her was&#8230;what would she do if all of this time and money came crashing down by some idiot at a camp running a free Moz Plug-in. She said she would hunt them down. She was kidding of course but I was a little scared to be honest. We went over some settings and she is now going to help spread the word. 1 out of 64 down.</p>
</div>
</div>
</div>
</div>
</div>
<p>Facebook Pages security is basically in the hands of the personal accounts of the admins.  This is one reason why the CSO should care&#8230;</p>
<div>
<div>
<div>
<div>
<div>
<p>Things that make you go HMMMM? &lt;- point to head -Arsenio Hall<br />
Facebook terms and conditions state that you have to have a personal Facebook account to administrate your company page. Facebook company pages allow multiple users to have access to share content.  Are you monitoring or making sure the people with access is meeting your company security standards? If an employee has left, is Facebook Page access part of the account removal process?</p>
</div>
</div>
</div>
</div>
</div>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F03%2F29%2Fwhy-should-the-cso-care-about-an-employees-personal-social-media-account%2F&amp;t=Why+Should+the+CSO+Care+About+an+Employee%E2%80%99s+Personal+Social+Media+Account%3F" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Why+Should+the+CSO+Care+About+an+Employee%E2%80%99s+Personal+Social+Media+Account%3F%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F03%2F29%2Fwhy-should-the-cso-care-about-an-employees-personal-social-media-account%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F03%2F29%2Fwhy-should-the-cso-care-about-an-employees-personal-social-media-account%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F03%2F29%2Fwhy-should-the-cso-care-about-an-employees-personal-social-media-account%2F&amp;title=Why+Should+the+CSO+Care+About+an+Employee%E2%80%99s+Personal+Social+Media+Account%3F&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=Thank+you+to+Tom+for+allowing+me+to+participate+with+social+media+security+dot+com.+The+guys+in+this+community+have+been+great+resources+in+helping+me+to+spread+the+word+on+the+insecurities+with+social+media.+This+year%2C+I+have+been+reachi" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F03%2F29%2Fwhy-should-the-cso-care-about-an-employees-personal-social-media-account%2F&amp;title=Why+Should+the+CSO+Care+About+an+Employee%E2%80%99s+Personal+Social+Media+Account%3F" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2011/03/29/why-should-the-cso-care-about-an-employees-personal-social-media-account/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Why+Should+the+CSO+Care+About+an+Employee%E2%80%99s+Personal+Social+Media+Account%3F&body=Thank+you+to+Tom+for+allowing+me+to+participate+with+social+media+security+dot+com.+The+guys+in+this+community+have+been+great+resources+in+helping+me+to+spread+the+word+on+the+insecurities+with+social+media.+This+year%2C+I+have+been+reachi%20-%20https://socialmediasecurity.com/2011/03/29/why-should-the-cso-care-about-an-employees-personal-social-media-account/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/03/29/why-should-the-cso-care-about-an-employees-personal-social-media-account/">Why Should the CSO Care About an Employee&#8217;s Personal Social Media Account?</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://socialmediasecurity.com/2011/03/29/why-should-the-cso-care-about-an-employees-personal-social-media-account/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
							<dc:creator>feedback@socialmediasecurity.com (jruffer)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Thank you to Tom for allowing me to participate with social media security dot com. The guys in this community have been great resources in helping me to spread the word on the insecurities with social media. This year, I have been reaching beyond the security space, speaking to many social media clubs, podcampers and [&amp;#8230;] The post Why Should the CSO Care About an Employee&amp;#8217;s Personal Social Media Account? appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>Thank you to Tom for allowing me to participate with social media security dot com. The guys in this community have been great resources in helping me to spread the word on the insecurities with social media. This year, I have been reaching beyond the security space, speaking to many social media clubs, podcampers and [&amp;#8230;] The post Why Should the CSO Care About an Employee&amp;#8217;s Personal Social Media Account? appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Dispelling The Myths Of Facebook Privacy And Security</title>
		<link>https://socialmediasecurity.com/2011/02/21/dispelling-the-myths-of-facebook-privacy-and-security/</link>
				<comments>https://socialmediasecurity.com/2011/02/21/dispelling-the-myths-of-facebook-privacy-and-security/#respond</comments>
				<pubDate>Mon, 21 Feb 2011 15:58:00 +0000</pubDate>
		
				<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Social Networking]]></category>

		<guid isPermaLink="false">http://blog.securestate.com/post.aspx?id=d7e2250a-2abd-46ab-9658-71da11ce36fe</guid>
				<description><![CDATA[<p>There are many misconceptions about the security of Facebook, Facebook applications, and the frequent scams that seem to plague the world&#8217;s largest social network.&#160; To help set the record straight, I would like to shed&#160;a bit of reality on the most common myths about Facebook security and privacy today. These are real examples of statements that I have encountered regarding Facebook and their privacy controls and security measures.&#160; Some have surprising truth to them and others are completely false and misleading.&#160; I&#8217;ve broken these myths into three areas: Facebook applications, privacy, and security myths.&#160;<a name="more"></a></p>
<p><a href="http://www.facebook.com"><img style="float: right;" src="http://blog.securestate.com/image.axd?picture=2011%2f2%2ffacebook.png" alt="Facebook" width="100" height="100" /></a> To Facebook&#8217;s credit, Facebook has made considerable strides over the last few years by implementing new security and privacy controls as well as getting the Facebook security team more visible.&#160; Some of the newer implementations, such as full site SSL and social authentication, will continue to improve the security of Facebook.&#160; Unfortunately, many of these myths will still persist.&#160; This is because users will believe what they want to believe despite new controls and efforts being put in place by Facebook.</p>
<p><span style="text-decoration: underline;">Facebook Application Myths</span></p>
<p><strong>Myth: All Facebook applications are created and managed by Facebook.<br />Reality:</strong> Facebook applications are not developed or maintained by Facebook.&#160; They are all developed, maintained, and managed by third-party companies.&#160; Facebook simply provides an API (Application Programming Interface) for developers to &#8220;interact&#8221; with Facebook and its data.&#160; For example, Farmville is created by the company Zynga.&#160; Zynga only uses the Facebook API to interact with Facebook.&#160; One common misconception is that these applications &#8220;look and feel&#8221; like they are part of Facebook so the applications can be trusted.&#160; This is not true.&#160; The Facebook API is designed to allow seamless integration so it provides users with a more integrated Facebook experience. To make matters worse, Facebook recently announced that they will now <a href="http://www.insidefacebook.com/2011/02/11/iframe-page-tab-apps/" target="_blank">allow iframes within page tab applications</a>.&#160; This means that a <a href="http://countermeasures.trendmicro.eu/facebook-open-javascript-hole/" target="_blank">malicious developer</a> can easily do things like redirect users to malicious web sites or use JavaScript to do a host of other things to the user.</p>
<p><strong>Myth: Facebook reviews all applications for security vulnerabilities, scams, or frauds.<br />Reality:</strong> In general it would be very difficult with Facebook&#8217;s current application developer model to review the code for all Facebook applications.&#160; According to <a href="http://www.facebook.com/press/info.php?statistics">Facebook&#8217;s official statistics</a>, people on Facebook install 20 million applications every day and according to an older statistics page I found dated November 2010 there were approximately 550,000 active applications.&#160; This is an extremely large amount of applications to check for security issues.&#160; This problem also becomes more challenging when developers release new code or updates to existing applications.&#160; How is Facebook currently addressing this issue?&#160; Facebook made a statement in this recent <a href="http://www.informationweek.com/news/security/privacy/showArticle.jhtml?articleID=229100113">InformationWeek article</a> talking about how they review applications.&#160; Facebook claimed to have a dedicated security team that "does robust review of all third-party applications, using a risk-based approach."</p>
<p>"That means that we first look at velocity, number of users, types of data shared, and prioritize," the statement read. "This ensures that the team is focused on addressing the biggest risks, rather than just doing a cursory review at the time that an app is first launched."</p>
<p>In other words, they look at applications that fall into specific categories because it would be near impossible to check every single application.&#160; There is also no mention if Facebook conducts a code review of applications selected for review.&#160; The bad news, of course, is that once Facebook shuts down one rogue, malicious application another one is easily right behind it to take its place.</p>
<p><strong>Myth: Facebook applications don&#8217;t have typical web security flaws.<br />Reality:</strong>&#160; Facebook applications can be developed insecurely just like any other web based application.&#160; In fact, <a href="http://theharmonyguy.com/2009/10/09/the-month-of-facebook-bugs-report/" target="_blank">in 2009 security researcher theharmonyguy conducted the &#8220;Month of Facebook Bugs&#8221;</a> exposing security flaws in many of the popular Facebook applications at the time.&#160; These flaws included XSS (Cross-Site Scripting) which can be used to attack the users of applications, SQLi (SQL Injection) which can be used to extract personal or private information from the database of applications, and <a href="http://www.owasp.org/index.php/Clickjacking" target="_blank">ClickJacking</a> or <a href="http://en.wikipedia.org/wiki/Likejacking" target="_blank">LikeJacking</a> which can be used to initiate actions without the user&#8217;s knowledge.&#160;</p>
<p><strong>Myth: Facebook is responsible for any information you provide to Facebook or third-party applications.<br />Reality:</strong> This is a tricky one.&#160; At the end of the day, <em>you&#8217;re responsible</em> for what you post and any information you provide Facebook or third-party applications.&#160; There is no guarantee that Facebook or third-party application developers will not misuse or sell your information.&#160; <a href="http://online.wsj.com/article/SB10001424052748704477904575586690450505642.html" target="_blank">This has happened in the recent past.</a></p>
<p><strong>Myth: Facebook allows developers to do whatever they want with their applications and can collect your personal information.<br />Reality:</strong> Facebook has certain <a href="http://developers.facebook.com/policy/" target="_blank">policies that you can read for yourself </a>about what a developer can or can&#8217;t do.&#160; It&#8217;s important to note that Facebook used to be more restrictive with these rules in the past.&#160; For example, application developers could only keep personal data collected for 24 hours.&#160; Facebook has now removed this restriction and has relaxed many other policies so it&#8217;s easier for developers to integrate with Facebook.&#160; Having said that, it&#8217;s hard for Facebook to truly &#8220;enforce&#8221; these policies unless a malicious application is reviewed by them or it&#8217;s reported to the Facebook security team.&#160; It&#8217;s a battle that is going to be very hard to win based on the current way Facebook allows applications to be developed.</p>
<p><span style="text-decoration: underline;">Facebook Privacy Myths</span></p>
<p><strong>Myth: Facebook reviews all third-party companies that collect your personal information.<br />Reality:</strong> In certain cases like when your friends visit an &#8220;Instant Personalization&#8221; partner like Yelp and the third party can see your information the <a href="https://www.facebook.com/policy.php">Facebook privacy policy</a> states that &#8220;we require these websites and applications to go through an approval process, and to enter into separate agreements designed to protect your privacy.&#8221;&#160; What that means is up for debate but what we do know is that you should be cautious when using Instant Personalization as you may be revealing information about your friends as well.</p>
<p><strong>Myth: Facebook takes user privacy seriously.<br />Reality:</strong> Facebook will try to tell you that they <em>do</em> take your privacy seriously as noted in their <a href="https://www.facebook.com/policy.php" target="_blank">privacy policy</a>.&#160; However, Facebook also has a vested interest in collecting your information.&#160; After all, it&#8217;s how they make money.&#160; Double edged sword?&#160; It certainly is!&#160; The more information you share the more valuable you are to Facebook.&#160; You should always take your privacy on Facebook seriously as they may not always have your best interest at heart.</p>
<p><strong>Myth: Facebook has very little privacy controls.<br />Reality:</strong> This is false.&#160; In fact, Facebook has made great strides over the years in providing its user base with easier to use privacy controls.&#160; I&#8217;ve seen this myself while putting together my <a href="http://socialmediasecurity.com/downloads/Facebook_Privacy_and_Security_Guide.pdf" target="_blank">Facebook Privacy &#38; Security Guide</a> over the years.&#160; The problem has become that many users don&#8217;t know where these settings are or how to use them.&#160; Facebook also hasn&#8217;t done a great job of communicating changes to privacy settings in the past.&#160; Users of Facebook and computer users in general have become immune to pop-ups and hard to read sign-in notifications.&#160; It&#8217;s simply become easier for users to just &#8220;click through&#8221; so they can get to what they want in Facebook.</p>
<p><strong>Myth: Facebook makes it easy for users to delete their accounts.<br />Reality:</strong> The truth is that the process of deleting your Facebook account has gotten only slightly better over the years but still remains a confusing one.&#160; For example, <a href="http://www.wikihow.com/Permanently-Delete-a-Facebook-Account">here is one guide that walks you through the procedure</a>.&#160; Facebook still has account &#8220;deactivation&#8221; as the first step in the account deletion process, which many users still find confusing.&#160; Many users are also confused between &#8220;deactivation&#8221; and &#8220;deletion.&#8221;&#160; Others think that by successfully deleting their account all the information including pictures they posted are removed from Facebook forever.&#160; While Facebook may say they remove all of your information, you still can&#8217;t stop others from copying it or saving those party pictures of you to their hard drive.&#160; The rule to remember is that once you post something on Facebook, you should always think of it as public information.</p>
<p><span style="text-decoration: underline;">Facebook Security Myths</span></p>
<p><strong>Myth: Facebook scams are mostly variations of the same one over the years.<br />Reality:</strong> Many of the Facebook scams found are simple variations of text messaging, promotion give-a-ways (iPads, iPods [insert latest hot gadget here]), who visited your profile (ProfileSpy), and improvements to existing Facebook services like chat and instant messaging.&#160; In fact, one scam I <a href="http://www.spylogic.net/2010/01/beware-of-evil-facebook-groups/" target="_blank">blogged about over a year ago</a> is still being used today.&#160; The basic rule to remember is that if something is popular in our culture, such as tech products that everyone wants, it&#8217;s most likely going to be used for scams and frauds.&#160; Remember the old rule: if it sounds too good to be true, it probably is.</p>
<p><strong>Myth: I can&#8217;t get a virus or malware by using Facebook<br />Reality:</strong>&#160; All it takes is clicking on a malicious link from one of your friends, installing a rogue application, or falling for one of the many scams that offer &#8220;free&#8221; stuff.&#160; Facebook is doing a better job of cleaning up malicious links and other related activity.&#160; However, the <a href="http://www.spamfighter.com/News-15695-New-Koobface-Campaign-Making-Rounds-on-Facebook.htm" target="_blank">Koobface worm and associated variants</a> are still a problem and adapt well to attempts by Facebook to rid them from the platform.</p>
<p><strong>Myth:</strong> <strong>I can trust my friends on Facebook because they would never send me anything malicious.<br />Reality:</strong> It&#8217;s always nice to trust your friends but this gets complicated on Facebook.&#160; Social Network worms such as Koobface as well as hijacked or stolen accounts are frequently used to social engineer Facebook users to click on a link or send money to foreign countries.&#160; All of these scams exploit the trust relationships that you have with people you know.&#160; It&#8217;s a simple and highly effective technique that&#8217;s still being used today.</p>
<p><strong>Myth: Facebook does not have a security team or a way to report security issues/SPAM/scams.<br />Reality:</strong> Contrary to popular belief, Facebook does have a <a href="http://www.facebook.com/security" target="_blank">security team</a> and ways to report security and privacy issues.&#160; In the past, many of these types of requests would have met the infamous &#8220;Facebook Blackhole&#8221; in which emails or support requests were never answered.&#160; Recently, there have been many improvements to help communicate the presence of this team.&#160; For example, you can &#8220;like&#8221; the <a href="https://www.facebook.com/security" target="_blank">Facebook security page</a>, <a href="https://www.facebook.com/help/?topic=security" target="_blank">report a compromised account</a>, learn how to <a href="https://www.facebook.com/security?sk=app_6009294086">report security vulnerabilities</a>, as well as get good <a href="https://www.facebook.com/security?sk=app_10442206389" target="_blank">tips on what to do when you see security issues</a>.</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/02/21/dispelling-the-myths-of-facebook-privacy-and-security/">Dispelling The Myths Of Facebook Privacy And Security</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>There are many misconceptions about the security of Facebook, Facebook applications, and the frequent scams that seem to plague the world&rsquo;s largest social network.&nbsp; To help set the record straight, I would like to shed&nbsp;a bit of reality on the most common myths about Facebook security and privacy today. These are real examples of statements that I have encountered regarding Facebook and their privacy controls and security measures.&nbsp; Some have surprising truth to them and others are completely false and misleading.&nbsp; I&rsquo;ve broken these myths into three areas: Facebook applications, privacy, and security myths.&nbsp;<a name="more"></a></p>
<p><a href="http://www.facebook.com"><img style="float: right;" src="http://blog.securestate.com/image.axd?picture=2011%2f2%2ffacebook.png" alt="Facebook" width="100" height="100" /></a> To Facebook&rsquo;s credit, Facebook has made considerable strides over the last few years by implementing new security and privacy controls as well as getting the Facebook security team more visible.&nbsp; Some of the newer implementations, such as full site SSL and social authentication, will continue to improve the security of Facebook.&nbsp; Unfortunately, many of these myths will still persist.&nbsp; This is because users will believe what they want to believe despite new controls and efforts being put in place by Facebook.</p>
<p><span style="text-decoration: underline;">Facebook Application Myths</span></p>
<p><strong>Myth: All Facebook applications are created and managed by Facebook.<br />Reality:</strong> Facebook applications are not developed or maintained by Facebook.&nbsp; They are all developed, maintained, and managed by third-party companies.&nbsp; Facebook simply provides an API (Application Programming Interface) for developers to &ldquo;interact&rdquo; with Facebook and its data.&nbsp; For example, Farmville is created by the company Zynga.&nbsp; Zynga only uses the Facebook API to interact with Facebook.&nbsp; One common misconception is that these applications &ldquo;look and feel&rdquo; like they are part of Facebook so the applications can be trusted.&nbsp; This is not true.&nbsp; The Facebook API is designed to allow seamless integration so it provides users with a more integrated Facebook experience. To make matters worse, Facebook recently announced that they will now <a href="http://www.insidefacebook.com/2011/02/11/iframe-page-tab-apps/" >allow iframes within page tab applications</a>.&nbsp; This means that a <a href="http://countermeasures.trendmicro.eu/facebook-open-javascript-hole/" >malicious developer</a> can easily do things like redirect users to malicious web sites or use JavaScript to do a host of other things to the user.</p>
<p><strong>Myth: Facebook reviews all applications for security vulnerabilities, scams, or frauds.<br />Reality:</strong> In general it would be very difficult with Facebook&rsquo;s current application developer model to review the code for all Facebook applications.&nbsp; According to <a href="http://www.facebook.com/press/info.php?statistics">Facebook&rsquo;s official statistics</a>, people on Facebook install 20 million applications every day and according to an older statistics page I found dated November 2010 there were approximately 550,000 active applications.&nbsp; This is an extremely large amount of applications to check for security issues.&nbsp; This problem also becomes more challenging when developers release new code or updates to existing applications.&nbsp; How is Facebook currently addressing this issue?&nbsp; Facebook made a statement in this recent <a href="http://www.informationweek.com/news/security/privacy/showArticle.jhtml?articleID=229100113">InformationWeek article</a> talking about how they review applications.&nbsp; Facebook claimed to have a dedicated security team that &#8220;does robust review of all third-party applications, using a risk-based approach.&#8221;</p>
<p>&#8220;That means that we first look at velocity, number of users, types of data shared, and prioritize,&#8221; the statement read. &#8220;This ensures that the team is focused on addressing the biggest risks, rather than just doing a cursory review at the time that an app is first launched.&#8221;</p>
<p>In other words, they look at applications that fall into specific categories because it would be near impossible to check every single application.&nbsp; There is also no mention if Facebook conducts a code review of applications selected for review.&nbsp; The bad news, of course, is that once Facebook shuts down one rogue, malicious application another one is easily right behind it to take its place.</p>
<p><strong>Myth: Facebook applications don&rsquo;t have typical web security flaws.<br />Reality:</strong>&nbsp; Facebook applications can be developed insecurely just like any other web based application.&nbsp; In fact, <a href="http://theharmonyguy.com/2009/10/09/the-month-of-facebook-bugs-report/" >in 2009 security researcher theharmonyguy conducted the &ldquo;Month of Facebook Bugs&rdquo;</a> exposing security flaws in many of the popular Facebook applications at the time.&nbsp; These flaws included XSS (Cross-Site Scripting) which can be used to attack the users of applications, SQLi (SQL Injection) which can be used to extract personal or private information from the database of applications, and <a href="http://www.owasp.org/index.php/Clickjacking" >ClickJacking</a> or <a href="http://en.wikipedia.org/wiki/Likejacking" >LikeJacking</a> which can be used to initiate actions without the user&rsquo;s knowledge.&nbsp;</p>
<p><strong>Myth: Facebook is responsible for any information you provide to Facebook or third-party applications.<br />Reality:</strong> This is a tricky one.&nbsp; At the end of the day, <em>you&rsquo;re responsible</em> for what you post and any information you provide Facebook or third-party applications.&nbsp; There is no guarantee that Facebook or third-party application developers will not misuse or sell your information.&nbsp; <a href="http://online.wsj.com/article/SB10001424052748704477904575586690450505642.html" >This has happened in the recent past.</a></p>
<p><strong>Myth: Facebook allows developers to do whatever they want with their applications and can collect your personal information.<br />Reality:</strong> Facebook has certain <a href="http://developers.facebook.com/policy/" >policies that you can read for yourself </a>about what a developer can or can&rsquo;t do.&nbsp; It&rsquo;s important to note that Facebook used to be more restrictive with these rules in the past.&nbsp; For example, application developers could only keep personal data collected for 24 hours.&nbsp; Facebook has now removed this restriction and has relaxed many other policies so it&rsquo;s easier for developers to integrate with Facebook.&nbsp; Having said that, it&rsquo;s hard for Facebook to truly &ldquo;enforce&rdquo; these policies unless a malicious application is reviewed by them or it&rsquo;s reported to the Facebook security team.&nbsp; It&rsquo;s a battle that is going to be very hard to win based on the current way Facebook allows applications to be developed.</p>
<p><span style="text-decoration: underline;">Facebook Privacy Myths</span></p>
<p><strong>Myth: Facebook reviews all third-party companies that collect your personal information.<br />Reality:</strong> In certain cases like when your friends visit an &ldquo;Instant Personalization&rdquo; partner like Yelp and the third party can see your information the <a href="https://www.facebook.com/policy.php">Facebook privacy policy</a> states that &ldquo;we require these websites and applications to go through an approval process, and to enter into separate agreements designed to protect your privacy.&rdquo;&nbsp; What that means is up for debate but what we do know is that you should be cautious when using Instant Personalization as you may be revealing information about your friends as well.</p>
<p><strong>Myth: Facebook takes user privacy seriously.<br />Reality:</strong> Facebook will try to tell you that they <em>do</em> take your privacy seriously as noted in their <a href="https://www.facebook.com/policy.php" >privacy policy</a>.&nbsp; However, Facebook also has a vested interest in collecting your information.&nbsp; After all, it&rsquo;s how they make money.&nbsp; Double edged sword?&nbsp; It certainly is!&nbsp; The more information you share the more valuable you are to Facebook.&nbsp; You should always take your privacy on Facebook seriously as they may not always have your best interest at heart.</p>
<p><strong>Myth: Facebook has very little privacy controls.<br />Reality:</strong> This is false.&nbsp; In fact, Facebook has made great strides over the years in providing its user base with easier to use privacy controls.&nbsp; I&rsquo;ve seen this myself while putting together my <a href="http://socialmediasecurity.com/downloads/Facebook_Privacy_and_Security_Guide.pdf" >Facebook Privacy &amp; Security Guide</a> over the years.&nbsp; The problem has become that many users don&rsquo;t know where these settings are or how to use them.&nbsp; Facebook also hasn&rsquo;t done a great job of communicating changes to privacy settings in the past.&nbsp; Users of Facebook and computer users in general have become immune to pop-ups and hard to read sign-in notifications.&nbsp; It&rsquo;s simply become easier for users to just &ldquo;click through&rdquo; so they can get to what they want in Facebook.</p>
<p><strong>Myth: Facebook makes it easy for users to delete their accounts.<br />Reality:</strong> The truth is that the process of deleting your Facebook account has gotten only slightly better over the years but still remains a confusing one.&nbsp; For example, <a href="http://www.wikihow.com/Permanently-Delete-a-Facebook-Account">here is one guide that walks you through the procedure</a>.&nbsp; Facebook still has account &ldquo;deactivation&rdquo; as the first step in the account deletion process, which many users still find confusing.&nbsp; Many users are also confused between &ldquo;deactivation&rdquo; and &ldquo;deletion.&rdquo;&nbsp; Others think that by successfully deleting their account all the information including pictures they posted are removed from Facebook forever.&nbsp; While Facebook may say they remove all of your information, you still can&rsquo;t stop others from copying it or saving those party pictures of you to their hard drive.&nbsp; The rule to remember is that once you post something on Facebook, you should always think of it as public information.</p>
<p><span style="text-decoration: underline;">Facebook Security Myths</span></p>
<p><strong>Myth: Facebook scams are mostly variations of the same one over the years.<br />Reality:</strong> Many of the Facebook scams found are simple variations of text messaging, promotion give-a-ways (iPads, iPods [insert latest hot gadget here]), who visited your profile (ProfileSpy), and improvements to existing Facebook services like chat and instant messaging.&nbsp; In fact, one scam I <a href="http://www.spylogic.net/2010/01/beware-of-evil-facebook-groups/" >blogged about over a year ago</a> is still being used today.&nbsp; The basic rule to remember is that if something is popular in our culture, such as tech products that everyone wants, it&rsquo;s most likely going to be used for scams and frauds.&nbsp; Remember the old rule: if it sounds too good to be true, it probably is.</p>
<p><strong>Myth: I can&rsquo;t get a virus or malware by using Facebook<br />Reality:</strong>&nbsp; All it takes is clicking on a malicious link from one of your friends, installing a rogue application, or falling for one of the many scams that offer &ldquo;free&rdquo; stuff.&nbsp; Facebook is doing a better job of cleaning up malicious links and other related activity.&nbsp; However, the <a href="http://www.spamfighter.com/News-15695-New-Koobface-Campaign-Making-Rounds-on-Facebook.htm" >Koobface worm and associated variants</a> are still a problem and adapt well to attempts by Facebook to rid them from the platform.</p>
<p><strong>Myth:</strong> <strong>I can trust my friends on Facebook because they would never send me anything malicious.<br />Reality:</strong> It&rsquo;s always nice to trust your friends but this gets complicated on Facebook.&nbsp; Social Network worms such as Koobface as well as hijacked or stolen accounts are frequently used to social engineer Facebook users to click on a link or send money to foreign countries.&nbsp; All of these scams exploit the trust relationships that you have with people you know.&nbsp; It&rsquo;s a simple and highly effective technique that&rsquo;s still being used today.</p>
<p><strong>Myth: Facebook does not have a security team or a way to report security issues/SPAM/scams.<br />Reality:</strong> Contrary to popular belief, Facebook does have a <a href="http://www.facebook.com/security" >security team</a> and ways to report security and privacy issues.&nbsp; In the past, many of these types of requests would have met the infamous &ldquo;Facebook Blackhole&rdquo; in which emails or support requests were never answered.&nbsp; Recently, there have been many improvements to help communicate the presence of this team.&nbsp; For example, you can &ldquo;like&rdquo; the <a href="https://www.facebook.com/security" >Facebook security page</a>, <a href="https://www.facebook.com/help/?topic=security" >report a compromised account</a>, learn how to <a href="https://www.facebook.com/security?sk=app_6009294086">report security vulnerabilities</a>, as well as get good <a href="https://www.facebook.com/security?sk=app_10442206389" >tips on what to do when you see security issues</a>.</p>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F02%2F21%2Fdispelling-the-myths-of-facebook-privacy-and-security%2F&amp;t=Dispelling+The+Myths+Of+Facebook+Privacy+And+Security" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Dispelling+The+Myths+Of+Facebook+Privacy+And+Security%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F02%2F21%2Fdispelling-the-myths-of-facebook-privacy-and-security%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F02%2F21%2Fdispelling-the-myths-of-facebook-privacy-and-security%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F02%2F21%2Fdispelling-the-myths-of-facebook-privacy-and-security%2F&amp;title=Dispelling+The+Myths+Of+Facebook+Privacy+And+Security&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=There+are+many+misconceptions+about+the+security+of+Facebook%2C+Facebook+applications%2C+and+the+frequent+scams+that+seem+to+plague+the+world%26rsquo%3Bs+largest+social+network.%26nbsp%3B+To+help+set+the+record+straight%2C+I+would+like+to+shed%26nbsp%3Ba+bit+of+reality+on+the+most+common+myths+about+Facebook+security+and+privacy+today.+These+are+real+examples+of+statements+that+I+have+encountered+regarding+Facebook+and+their+privacy+controls+and+security+measures.%26nbsp%3B+Some+have+surprising+truth+to+them+and+others+are+completely+false+and+misleading.%26nbsp%3B+I%26rsquo%3Bve+broken+these+myths+into+three+areas%3A+Facebook+applications%2C+privacy%2C+and+security+myths.%26nbsp%3B%0A+To+Facebook%26rsquo%3Bs+credit%2C+Facebook+has+made+considerable+strides+over+the+last+few+years+by+implementing+new+security+and+privacy+controls+as+well+as+getting+the+Facebook+security+team+more+visible.%26nbsp%3B+Some+of+the+newer+implementations%2C+such+as+full+site+SSL+and+social+authentication%2C+will+continue+to+improve+the+security+of+Facebook.%26nbsp%3B+Unfortunately%2C+many+of+these+myths+will+still+persist.%26nbsp%3B+This+is+because+users+will+believe+what+they+want+to+believe+despite+new+controls+and+efforts+being+put+in+place+by+Facebook.%0AFacebook+Application+Myths%0AMyth%3A+All+Facebook+applications+are+created+and+managed+by+Facebook.Reality%3A+Facebook+applications+are+not+developed+or+maintained+by+Facebook.%26nbsp%3B+They+are+all+developed%2C+maintained%2C+and+managed+by+third-party+companies.%26nbsp%3B+Facebook+simply+provides+an+API+%28Application+Programming+Interface%29+for+developers+to+%26ldquo%3Binteract%26rdquo%3B+with+Facebook+and+its+data.%26nbsp%3B+For+example%2C+Farmville+is+created+by+the+company+Zynga.%26nbsp%3B+Zynga+only+uses+the+Facebook+API+to+interact+with+Facebook.%26nbsp%3B+One+common+misconception+is+that+these+applications+%26ldquo%3Blook+and+feel%26rdquo%3B+like+they+are+part+of+Facebook+so+the+applications+can+be+trusted.%26nbsp%3B+This+is+not+true.%26nbsp%3B+The+Facebook+API+is+designed+to+allow+seamless+integration+so+it+provides+users+with+a+more+integrated+Facebook+experience.+To+make+matters+worse%2C+Facebook+recently+announced+that+they+will+now+allow+iframes+within+page+tab+applications.%26nbsp%3B+This+means+that+a+malicious+developer+can+easily+do+things+like+redirect+users+to+malicious+web+sites+or+use+JavaScript+to+do+a+host+of+other+things+to+the+user.%0AMyth%3A+Facebook+reviews+all+applications+for+security+vulnerabilities%2C+scams%2C+or+frauds.Reality%3A+In+general+it+would+be+very+difficult+with+Facebook%26rsquo%3Bs+current+application+developer+model+to+review+the+code+for+all+Facebook+applications.%26nbsp%3B+According+to+Facebook%26rsquo%3Bs+official+statistics%2C+people+on+Facebook+install+20+million+applications+every+day+and+according+to+an+older+statistics+page+I+found+dated+November+2010+there+were+approximately+550%2C000+active+applications.%26nbsp%3B+This+is+an+extremely+large+amount+of+applications+to+check+for+security+issues.%26nbsp%3B+This+problem+also+becomes+more+challenging+when+developers+release+new+code+or+updates+to+existing+applications.%26nbsp%3B+How+is+Facebook+currently+addressing+this+issue%3F%26nbsp%3B+Facebook+made+a+statement+in+this+recent+InformationWeek+article+talking+about+how+they+review+applications.%26nbsp%3B+Facebook+claimed+to+have+a+dedicated+security+team+that+%22does+robust+review+of+all+third-party+applications%2C+using+a+risk-based+approach.%22%0A%22That+means+that+we+first+look+at+velocity%2C+number+of+users%2C+types+of+data+shared%2C+and+prioritize%2C%22+the+statement+read.+%22This+ensures+that+the+team+is+focused+on+addressing+the+biggest+risks%2C+rather+than+just+doing+a+cursory+review+at+the+time+that+an+app+is+first+launched.%22%0AIn+other+words%2C+they+look+at+applications+that+fall+into+specific+categories+because+it+would+be+near+impossible+to+check+every+single+application.%26nbsp%3B+There+is+also+no+mention+if+Facebook+conducts+a+code+review+of+applications+selected+for+review.%26nbsp%3B+The+bad+news%2C+of+course%2C+is+that+once+Facebook+shuts+down+one+rogue%2C+malicious+application+another+one+is+easily+right+behind+it+to+take+its+place.%0AMyth%3A+Facebook+applications+don%26rsquo%3Bt+have+typical+web+security+flaws.Reality%3A%26nbsp%3B+Facebook+applications+can+be+developed+insecurely+just+like+any+other+web+based+application.%26nbsp%3B+In+fact%2C+in+2009+security+researcher+theharmonyguy+conducted+the+%26ldquo%3BMonth+of+Facebook+Bugs%26rdquo%3B+exposing+security+flaws+in+many+of+the+popular+Facebook+applications+at+the+time.%26nbsp%3B+These+flaws+included+XSS+%28Cross-Site+Scripting%29+which+can+be+used+to+attack+the+users+of+applications%2C+SQLi+%28SQL+Injection%29+which+can+be+used+to+extract+personal+or+private+information+from+the+database+of+applications%2C+and+ClickJacking+or+LikeJacking+which+can+be+used+to+initiate+actions+without+the+user%26rsquo%3Bs+knowledge.%26nbsp%3B%0AMyth%3A+Facebook+is+responsible+for+any+information+you+provide+to+Facebook+or+third-party+applications.Reality%3A+This+is+a+tricky+one.%26nbsp%3B+At+the+end+of+the+day%2C+you%26rsquo%3Bre+responsible+for+what+you+post+and+any+information+you+provide+Facebook+or+third-party+applications.%26nbsp%3B+There+is+no+guarantee+that+Facebook+or+third-party+application+developers+will+not+misuse+or+sell+your+information.%26nbsp%3B+This+has+happened+in+the+recent+past.%0AMyth%3A+Facebook+allows+developers+to+do+whatever+they+want+with+their+applications+and+can+collect+your+personal+information.Reality%3A+Facebook+has+certain+policies+that+you+can+read+for+yourself+about+what+a+developer+can+or+can%26rsquo%3Bt+do.%26nbsp%3B+It%26rsquo%3Bs+important+to+note+that+Facebook+used+to+be+more+restrictive+with+these+rules+in+the+past.%26nbsp%3B+For+example%2C+application+developers+could+only+keep+personal+data+collected+for+24+hours.%26nbsp%3B+Facebook+has+now+removed+this+restriction+and+has+relaxed+many+other+policies+so+it%26rsquo%3Bs+easier+for+developers+to+integrate+with+Facebook.%26nbsp%3B+Having+said+that%2C+it%26rsquo%3Bs+hard+for+Facebook+to+truly+%26ldquo%3Benforce%26rdquo%3B+these+policies+unless+a+malicious+application+is+reviewed+by+them+or+it%26rsquo%3Bs+reported+to+the+Facebook+security+team.%26nbsp%3B+It%26rsquo%3Bs+a+battle+that+is+going+to+be+very+hard+to+win+based+on+the+current+way+Facebook+allows+applications+to+be+developed.%0AFacebook+Privacy+Myths%0AMyth%3A+Facebook+reviews+all+third-party+companies+that+collect+your+personal+information.Reality%3A+In+certain+cases+like+when+your+friends+visit+an+%26ldquo%3BInstant+Personalization%26rdquo%3B+partner+like+Yelp+and+the+third+party+can+see+your+information+the+Facebook+privacy+policy+states+that+%26ldquo%3Bwe+require+these+websites+and+applications+to+go+through+an+approval+process%2C+and+to+enter+into+separate+agreements+designed+to+protect+your+privacy.%26rdquo%3B%26nbsp%3B+What+that+means+is+up+for+debate+but+what+we+do+know+is+that+you+should+be+cautious+when+using+Instant+Personalization+as+you+may+be+revealing+information+about+your+friends+as+well.%0AMyth%3A+Facebook+takes+user+privacy+seriously.Reality%3A+Facebook+will+try+to+tell+you+that+they+do+take+your+privacy+seriously+as+noted+in+their+privacy+policy.%26nbsp%3B+However%2C+Facebook+also+has+a+vested+interest+in+collecting+your+information.%26nbsp%3B+After+all%2C+it%26rsquo%3Bs+how+they+make+money.%26nbsp%3B+Double+edged+sword%3F%26nbsp%3B+It+certainly+is%21%26nbsp%3B+The+more+information+you+share+the+more+valuable+you+are+to+Facebook.%26nbsp%3B+You+should+always+take+your+privacy+on+Facebook+seriously+as+they+may+not+always+have+your+best+interest+at+heart.%0AMyth%3A+Facebook+has+very+little+privacy+controls.Reality%3A+This+is+false.%26nbsp%3B+In+fact%2C+Facebook+has+made+great+strides+over+the+years+in+providing+its+user+base+with+easier+to+use+privacy+controls.%26nbsp%3B+I%26rsquo%3Bve+seen+this+myself+while+putting+together+my+Facebook+Privacy+%26amp%3B+Security+Guide+over+the+years.%26nbsp%3B+The+problem+has+become+that+many+users+don%26rsquo%3Bt+know+where+these+settings+are+or+how+to+use+them.%26nbsp%3B+Facebook+also+hasn%26rsquo%3Bt+done+a+great+job+of+communicating+changes+to+privacy+settings+in+the+past.%26nbsp%3B+Users+of+Facebook+and+computer+users+in+general+have+become+immune+to+pop-ups+and+hard+to+read+sign-in+notifications.%26nbsp%3B+It%26rsquo%3Bs+simply+become+easier+for+users+to+just+%26ldquo%3Bclick+through%26rdquo%3B+so+they+can+get+to+what+they+want+in+Facebook.%0AMyth%3A+Facebook+makes+it+easy+for+users+to+delete+their+accounts.Reality%3A+The+truth+is+that+the+process+of+deleting+your+Facebook+account+has+gotten+only+slightly+better+over+the+years+but+still+remains+a+confusing+one.%26nbsp%3B+For+example%2C+here+is+one+guide+that+walks+you+through+the+procedure.%26nbsp%3B+Facebook+still+has+account+%26ldquo%3Bdeactivation%26rdquo%3B+as+the+first+step+in+the+account+deletion+process%2C+which+many+users+still+find+confusing.%26nbsp%3B+Many+users+are+also+confused+between+%26ldquo%3Bdeactivation%26rdquo%3B+and+%26ldquo%3Bdeletion.%26rdquo%3B%26nbsp%3B+Others+think+that+by+successfully+deleting+their+account+all+the+information+including+pictures+they+posted+are+removed+from+Facebook+forever.%26nbsp%3B+While+Facebook+may+say+they+remove+all+of+your+information%2C+you+still+can%26rsquo%3Bt+stop+others+from+copying+it+or+saving+those+party+pictures+of+you+to+their+hard+drive.%26nbsp%3B+The+rule+to+remember+is+that+once+you+post+something+on+Facebook%2C+you+should+always+think+of+it+as+public+information.%0AFacebook+Security+Myths%0AMyth%3A+Facebook+scams+are+mostly+variations+of+the+same+one+over+the+years.Reality%3A+Many+of+the+Facebook+scams+found+are+simple+variations+of+text+messaging%2C+promotion+give-a-ways+%28iPads%2C+iPods+%5Binsert+latest+hot+gadget+here%5D%29%2C+who+visited+your+profile+%28ProfileSpy%29%2C+and+improvements+to+existing+Facebook+services+like+chat+and+instant+messaging.%26nbsp%3B+In+fact%2C+one+scam+I+blogged+about+over+a+year+ago+is+still+being+used+today.%26nbsp%3B+The+basic+rule+to+remember+is+that+if+something+is+popular+in+our+culture%2C+such+as+tech+products+that+everyone+wants%2C+it%26rsquo%3Bs+most+likely+going+to+be+used+for+scams+and+frauds.%26nbsp%3B+Remember+the+old+rule%3A+if+it+sounds+too+good+to+be+true%2C+it+probably+is.%0AMyth%3A+I+can%26rsquo%3Bt+get+a+virus+or+malware+by+using+FacebookReality%3A%26nbsp%3B+All+it+takes+is+clicking+on+a+malicious+link+from+one+of+your+friends%2C+installing+a+rogue+application%2C+or+falling+for+one+of+the+many+scams+that+offer+%26ldquo%3Bfree%26rdquo%3B+stuff.%26nbsp%3B+Facebook+is+doing+a+better+job+of+cleaning+up+malicious+links+and+other+related+activity.%26nbsp%3B+However%2C+the+Koobface+worm+and+associated+variants+are+still+a+problem+and+adapt+well+to+attempts+by+Facebook+to+rid+them+from+the+platform.%0AMyth%3A+I+can+trust+my+friends+on+Facebook+because+they+would+never+send+me+anything+malicious.Reality%3A+It%26rsquo%3Bs+always+nice+to+trust+your+friends+but+this+gets+complicated+on+Facebook.%26nbsp%3B+Social+Network+worms+such+as+Koobface+as+well+as+hijacked+or+stolen+accounts+are+frequently+used+to+social+engineer+Facebook+users+to+click+on+a+link+or+send+money+to+foreign+countries.%26nbsp%3B+All+of+these+scams+exploit+the+trust+relationships+that+you+have+with+people+you+know.%26nbsp%3B+It%26rsquo%3Bs+a+simple+and+highly+effective+technique+that%26rsquo%3Bs+still+being+used+today.%0AMyth%3A+Facebook+does+not+have+a+security+team+or+a+way+to+report+security+issues%2FSPAM%2Fscams.Reality%3A+Contrary+to+popular+belief%2C+Facebook+does+have+a+security+team+and+ways+to+report+security+and+privacy+issues.%26nbsp%3B+In+the+past%2C+many+of+these+types+of+requests+would+have+met+the+infamous+%26ldquo%3BFacebook+Blackhole%26rdquo%3B+in+which+emails+or+support+requests+were+never+answered.%26nbsp%3B+Recently%2C+there+have+been+many+improvements+to+help+communicate+the+presence+of+this+team.%26nbsp%3B+For+example%2C+you+can+%26ldquo%3Blike%26rdquo%3B+the+Facebook+security+page%2C+report+a+compromised+account%2C+learn+how+to+report+security+vulnerabilities%2C+as+well+as+get+good+tips+on+what+to+do+when+you+see+security+issues." title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F02%2F21%2Fdispelling-the-myths-of-facebook-privacy-and-security%2F&amp;title=Dispelling+The+Myths+Of+Facebook+Privacy+And+Security" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2011/02/21/dispelling-the-myths-of-facebook-privacy-and-security/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Dispelling+The+Myths+Of+Facebook+Privacy+And+Security&body=There+are+many+misconceptions+about+the+security+of+Facebook%2C+Facebook+applications%2C+and+the+frequent+scams+that+seem+to+plague+the+world%26rsquo%3Bs+largest+social+network.%26nbsp%3B+To+help+set+the+record+straight%2C+I+would+like+to+shed%26nbsp%3Ba+bit+of+reality+on+the+most+common+myths+about+Facebook+security+and+privacy+today.+These+are+real+examples+of+statements+that+I+have+encountered+regarding+Facebook+and+their+privacy+controls+and+security+measures.%26nbsp%3B+Some+have+surprising+truth+to+them+and+others+are+completely+false+and+misleading.%26nbsp%3B+I%26rsquo%3Bve+broken+these+myths+into+three+areas%3A+Facebook+applications%2C+privacy%2C+and+security+myths.%26nbsp%3B%0A+To+Facebook%26rsquo%3Bs+credit%2C+Facebook+has+made+considerable+strides+over+the+last+few+years+by+implementing+new+security+and+privacy+controls+as+well+as+getting+the+Facebook+security+team+more+visible.%26nbsp%3B+Some+of+the+newer+implementations%2C+such+as+full+site+SSL+and+social+authentication%2C+will+continue+to+improve+the+security+of+Facebook.%26nbsp%3B+Unfortunately%2C+many+of+these+myths+will+still+persist.%26nbsp%3B+This+is+because+users+will+believe+what+they+want+to+believe+despite+new+controls+and+efforts+being+put+in+place+by+Facebook.%0AFacebook+Application+Myths%0AMyth%3A+All+Facebook+applications+are+created+and+managed+by+Facebook.Reality%3A+Facebook+applications+are+not+developed+or+maintained+by+Facebook.%26nbsp%3B+They+are+all+developed%2C+maintained%2C+and+managed+by+third-party+companies.%26nbsp%3B+Facebook+simply+provides+an+API+%28Application+Programming+Interface%29+for+developers+to+%26ldquo%3Binteract%26rdquo%3B+with+Facebook+and+its+data.%26nbsp%3B+For+example%2C+Farmville+is+created+by+the+company+Zynga.%26nbsp%3B+Zynga+only+uses+the+Facebook+API+to+interact+with+Facebook.%26nbsp%3B+One+common+misconception+is+that+these+applications+%26ldquo%3Blook+and+feel%26rdquo%3B+like+they+are+part+of+Facebook+so+the+applications+can+be+trusted.%26nbsp%3B+This+is+not+true.%26nbsp%3B+The+Facebook+API+is+designed+to+allow+seamless+integration+so+it+provides+users+with+a+more+integrated+Facebook+experience.+To+make+matters+worse%2C+Facebook+recently+announced+that+they+will+now+allow+iframes+within+page+tab+applications.%26nbsp%3B+This+means+that+a+malicious+developer+can+easily+do+things+like+redirect+users+to+malicious+web+sites+or+use+JavaScript+to+do+a+host+of+other+things+to+the+user.%0AMyth%3A+Facebook+reviews+all+applications+for+security+vulnerabilities%2C+scams%2C+or+frauds.Reality%3A+In+general+it+would+be+very+difficult+with+Facebook%26rsquo%3Bs+current+application+developer+model+to+review+the+code+for+all+Facebook+applications.%26nbsp%3B+According+to+Facebook%26rsquo%3Bs+official+statistics%2C+people+on+Facebook+install+20+million+applications+every+day+and+according+to+an+older+statistics+page+I+found+dated+November+2010+there+were+approximately+550%2C000+active+applications.%26nbsp%3B+This+is+an+extremely+large+amount+of+applications+to+check+for+security+issues.%26nbsp%3B+This+problem+also+becomes+more+challenging+when+developers+release+new+code+or+updates+to+existing+applications.%26nbsp%3B+How+is+Facebook+currently+addressing+this+issue%3F%26nbsp%3B+Facebook+made+a+statement+in+this+recent+InformationWeek+article+talking+about+how+they+review+applications.%26nbsp%3B+Facebook+claimed+to+have+a+dedicated+security+team+that+%22does+robust+review+of+all+third-party+applications%2C+using+a+risk-based+approach.%22%0A%22That+means+that+we+first+look+at+velocity%2C+number+of+users%2C+types+of+data+shared%2C+and+prioritize%2C%22+the+statement+read.+%22This+ensures+that+the+team+is+focused+on+addressing+the+biggest+risks%2C+rather+than+just+doing+a+cursory+review+at+the+time+that+an+app+is+first+launched.%22%0AIn+other+words%2C+they+look+at+applications+that+fall+into+specific+categories+because+it+would+be+near+impossible+to+check+every+single+application.%26nbsp%3B+There+is+also+no+mention+if+Facebook+conducts+a+code+review+of+applications+selected+for+review.%26nbsp%3B+The+bad+news%2C+of+course%2C+is+that+once+Facebook+shuts+down+one+rogue%2C+malicious+application+another+one+is+easily+right+behind+it+to+take+its+place.%0AMyth%3A+Facebook+applications+don%26rsquo%3Bt+have+typical+web+security+flaws.Reality%3A%26nbsp%3B+Facebook+applications+can+be+developed+insecurely+just+like+any+other+web+based+application.%26nbsp%3B+In+fact%2C+in+2009+security+researcher+theharmonyguy+conducted+the+%26ldquo%3BMonth+of+Facebook+Bugs%26rdquo%3B+exposing+security+flaws+in+many+of+the+popular+Facebook+applications+at+the+time.%26nbsp%3B+These+flaws+included+XSS+%28Cross-Site+Scripting%29+which+can+be+used+to+attack+the+users+of+applications%2C+SQLi+%28SQL+Injection%29+which+can+be+used+to+extract+personal+or+private+information+from+the+database+of+applications%2C+and+ClickJacking+or+LikeJacking+which+can+be+used+to+initiate+actions+without+the+user%26rsquo%3Bs+knowledge.%26nbsp%3B%0AMyth%3A+Facebook+is+responsible+for+any+information+you+provide+to+Facebook+or+third-party+applications.Reality%3A+This+is+a+tricky+one.%26nbsp%3B+At+the+end+of+the+day%2C+you%26rsquo%3Bre+responsible+for+what+you+post+and+any+information+you+provide+Facebook+or+third-party+applications.%26nbsp%3B+There+is+no+guarantee+that+Facebook+or+third-party+application+developers+will+not+misuse+or+sell+your+information.%26nbsp%3B+This+has+happened+in+the+recent+past.%0AMyth%3A+Facebook+allows+developers+to+do+whatever+they+want+with+their+applications+and+can+collect+your+personal+information.Reality%3A+Facebook+has+certain+policies+that+you+can+read+for+yourself+about+what+a+developer+can+or+can%26rsquo%3Bt+do.%26nbsp%3B+It%26rsquo%3Bs+important+to+note+that+Facebook+used+to+be+more+restrictive+with+these+rules+in+the+past.%26nbsp%3B+For+example%2C+application+developers+could+only+keep+personal+data+collected+for+24+hours.%26nbsp%3B+Facebook+has+now+removed+this+restriction+and+has+relaxed+many+other+policies+so+it%26rsquo%3Bs+easier+for+developers+to+integrate+with+Facebook.%26nbsp%3B+Having+said+that%2C+it%26rsquo%3Bs+hard+for+Facebook+to+truly+%26ldquo%3Benforce%26rdquo%3B+these+policies+unless+a+malicious+application+is+reviewed+by+them+or+it%26rsquo%3Bs+reported+to+the+Facebook+security+team.%26nbsp%3B+It%26rsquo%3Bs+a+battle+that+is+going+to+be+very+hard+to+win+based+on+the+current+way+Facebook+allows+applications+to+be+developed.%0AFacebook+Privacy+Myths%0AMyth%3A+Facebook+reviews+all+third-party+companies+that+collect+your+personal+information.Reality%3A+In+certain+cases+like+when+your+friends+visit+an+%26ldquo%3BInstant+Personalization%26rdquo%3B+partner+like+Yelp+and+the+third+party+can+see+your+information+the+Facebook+privacy+policy+states+that+%26ldquo%3Bwe+require+these+websites+and+applications+to+go+through+an+approval+process%2C+and+to+enter+into+separate+agreements+designed+to+protect+your+privacy.%26rdquo%3B%26nbsp%3B+What+that+means+is+up+for+debate+but+what+we+do+know+is+that+you+should+be+cautious+when+using+Instant+Personalization+as+you+may+be+revealing+information+about+your+friends+as+well.%0AMyth%3A+Facebook+takes+user+privacy+seriously.Reality%3A+Facebook+will+try+to+tell+you+that+they+do+take+your+privacy+seriously+as+noted+in+their+privacy+policy.%26nbsp%3B+However%2C+Facebook+also+has+a+vested+interest+in+collecting+your+information.%26nbsp%3B+After+all%2C+it%26rsquo%3Bs+how+they+make+money.%26nbsp%3B+Double+edged+sword%3F%26nbsp%3B+It+certainly+is%21%26nbsp%3B+The+more+information+you+share+the+more+valuable+you+are+to+Facebook.%26nbsp%3B+You+should+always+take+your+privacy+on+Facebook+seriously+as+they+may+not+always+have+your+best+interest+at+heart.%0AMyth%3A+Facebook+has+very+little+privacy+controls.Reality%3A+This+is+false.%26nbsp%3B+In+fact%2C+Facebook+has+made+great+strides+over+the+years+in+providing+its+user+base+with+easier+to+use+privacy+controls.%26nbsp%3B+I%26rsquo%3Bve+seen+this+myself+while+putting+together+my+Facebook+Privacy+%26amp%3B+Security+Guide+over+the+years.%26nbsp%3B+The+problem+has+become+that+many+users+don%26rsquo%3Bt+know+where+these+settings+are+or+how+to+use+them.%26nbsp%3B+Facebook+also+hasn%26rsquo%3Bt+done+a+great+job+of+communicating+changes+to+privacy+settings+in+the+past.%26nbsp%3B+Users+of+Facebook+and+computer+users+in+general+have+become+immune+to+pop-ups+and+hard+to+read+sign-in+notifications.%26nbsp%3B+It%26rsquo%3Bs+simply+become+easier+for+users+to+just+%26ldquo%3Bclick+through%26rdquo%3B+so+they+can+get+to+what+they+want+in+Facebook.%0AMyth%3A+Facebook+makes+it+easy+for+users+to+delete+their+accounts.Reality%3A+The+truth+is+that+the+process+of+deleting+your+Facebook+account+has+gotten+only+slightly+better+over+the+years+but+still+remains+a+confusing+one.%26nbsp%3B+For+example%2C+here+is+one+guide+that+walks+you+through+the+procedure.%26nbsp%3B+Facebook+still+has+account+%26ldquo%3Bdeactivation%26rdquo%3B+as+the+first+step+in+the+account+deletion+process%2C+which+many+users+still+find+confusing.%26nbsp%3B+Many+users+are+also+confused+between+%26ldquo%3Bdeactivation%26rdquo%3B+and+%26ldquo%3Bdeletion.%26rdquo%3B%26nbsp%3B+Others+think+that+by+successfully+deleting+their+account+all+the+information+including+pictures+they+posted+are+removed+from+Facebook+forever.%26nbsp%3B+While+Facebook+may+say+they+remove+all+of+your+information%2C+you+still+can%26rsquo%3Bt+stop+others+from+copying+it+or+saving+those+party+pictures+of+you+to+their+hard+drive.%26nbsp%3B+The+rule+to+remember+is+that+once+you+post+something+on+Facebook%2C+you+should+always+think+of+it+as+public+information.%0AFacebook+Security+Myths%0AMyth%3A+Facebook+scams+are+mostly+variations+of+the+same+one+over+the+years.Reality%3A+Many+of+the+Facebook+scams+found+are+simple+variations+of+text+messaging%2C+promotion+give-a-ways+%28iPads%2C+iPods+%5Binsert+latest+hot+gadget+here%5D%29%2C+who+visited+your+profile+%28ProfileSpy%29%2C+and+improvements+to+existing+Facebook+services+like+chat+and+instant+messaging.%26nbsp%3B+In+fact%2C+one+scam+I+blogged+about+over+a+year+ago+is+still+being+used+today.%26nbsp%3B+The+basic+rule+to+remember+is+that+if+something+is+popular+in+our+culture%2C+such+as+tech+products+that+everyone+wants%2C+it%26rsquo%3Bs+most+likely+going+to+be+used+for+scams+and+frauds.%26nbsp%3B+Remember+the+old+rule%3A+if+it+sounds+too+good+to+be+true%2C+it+probably+is.%0AMyth%3A+I+can%26rsquo%3Bt+get+a+virus+or+malware+by+using+FacebookReality%3A%26nbsp%3B+All+it+takes+is+clicking+on+a+malicious+link+from+one+of+your+friends%2C+installing+a+rogue+application%2C+or+falling+for+one+of+the+many+scams+that+offer+%26ldquo%3Bfree%26rdquo%3B+stuff.%26nbsp%3B+Facebook+is+doing+a+better+job+of+cleaning+up+malicious+links+and+other+related+activity.%26nbsp%3B+However%2C+the+Koobface+worm+and+associated+variants+are+still+a+problem+and+adapt+well+to+attempts+by+Facebook+to+rid+them+from+the+platform.%0AMyth%3A+I+can+trust+my+friends+on+Facebook+because+they+would+never+send+me+anything+malicious.Reality%3A+It%26rsquo%3Bs+always+nice+to+trust+your+friends+but+this+gets+complicated+on+Facebook.%26nbsp%3B+Social+Network+worms+such+as+Koobface+as+well+as+hijacked+or+stolen+accounts+are+frequently+used+to+social+engineer+Facebook+users+to+click+on+a+link+or+send+money+to+foreign+countries.%26nbsp%3B+All+of+these+scams+exploit+the+trust+relationships+that+you+have+with+people+you+know.%26nbsp%3B+It%26rsquo%3Bs+a+simple+and+highly+effective+technique+that%26rsquo%3Bs+still+being+used+today.%0AMyth%3A+Facebook+does+not+have+a+security+team+or+a+way+to+report+security+issues%2FSPAM%2Fscams.Reality%3A+Contrary+to+popular+belief%2C+Facebook+does+have+a+security+team+and+ways+to+report+security+and+privacy+issues.%26nbsp%3B+In+the+past%2C+many+of+these+types+of+requests+would+have+met+the+infamous+%26ldquo%3BFacebook+Blackhole%26rdquo%3B+in+which+emails+or+support+requests+were+never+answered.%26nbsp%3B+Recently%2C+there+have+been+many+improvements+to+help+communicate+the+presence+of+this+team.%26nbsp%3B+For+example%2C+you+can+%26ldquo%3Blike%26rdquo%3B+the+Facebook+security+page%2C+report+a+compromised+account%2C+learn+how+to+report+security+vulnerabilities%2C+as+well+as+get+good+tips+on+what+to+do+when+you+see+security+issues.%20-%20https://socialmediasecurity.com/2011/02/21/dispelling-the-myths-of-facebook-privacy-and-security/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/02/21/dispelling-the-myths-of-facebook-privacy-and-security/">Dispelling The Myths Of Facebook Privacy And Security</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://socialmediasecurity.com/2011/02/21/dispelling-the-myths-of-facebook-privacy-and-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							<dc:creator>feedback@socialmediasecurity.com</dc:creator><enclosure length="92998" type="application/pdf" url="http://socialmediasecurity.com/downloads/Facebook_Privacy_and_Security_Guide.pdf"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>There are many misconceptions about the security of Facebook, Facebook applications, and the frequent scams that seem to plague the world&amp;#8217;s largest social network.&amp;#160; To help set the record straight, I would like to shed&amp;#160;a bit of reality on the most common myths about Facebook security and privacy today. These are real examples of statements that I have encountered regarding Facebook and their privacy controls and security measures.&amp;#160; Some have surprising truth to them and others are completely false and misleading.&amp;#160; I&amp;#8217;ve broken these myths into three areas: Facebook applications, privacy, and security myths.&amp;#160; To Facebook&amp;#8217;s credit, Facebook has made considerable strides over the last few years by implementing new security and privacy controls as well as getting the Facebook security team more visible.&amp;#160; Some of the newer implementations, such as full site SSL and social authentication, will continue to improve the security of Facebook.&amp;#160; Unfortunately, many of these myths will still persist.&amp;#160; This is because users will believe what they want to believe despite new controls and efforts being put in place by Facebook. Facebook Application Myths Myth: All Facebook applications are created and managed by Facebook. Reality: Facebook applications are not developed or maintained by Facebook.&amp;#160; They are all developed, maintained, and managed by third-party companies.&amp;#160; Facebook simply provides an API (Application Programming Interface) for developers to &amp;#8220;interact&amp;#8221; with Facebook and its data.&amp;#160; For example, Farmville is created by the company Zynga.&amp;#160; Zynga only uses the Facebook API to interact with Facebook.&amp;#160; One common misconception is that these applications &amp;#8220;look and feel&amp;#8221; like they are part of Facebook so the applications can be trusted.&amp;#160; This is not true.&amp;#160; The Facebook API is designed to allow seamless integration so it provides users with a more integrated Facebook experience. To make matters worse, Facebook recently announced that they will now allow iframes within page tab applications.&amp;#160; This means that a malicious developer can easily do things like redirect users to malicious web sites or use JavaScript to do a host of other things to the user. Myth: Facebook reviews all applications for security vulnerabilities, scams, or frauds. Reality: In general it would be very difficult with Facebook&amp;#8217;s current application developer model to review the code for all Facebook applications.&amp;#160; According to Facebook&amp;#8217;s official statistics, people on Facebook install 20 million applications every day and according to an older statistics page I found dated November 2010 there were approximately 550,000 active applications.&amp;#160; This is an extremely large amount of applications to check for security issues.&amp;#160; This problem also becomes more challenging when developers release new code or updates to existing applications.&amp;#160; How is Facebook currently addressing this issue?&amp;#160; Facebook made a statement in this recent InformationWeek article talking about how they review applications.&amp;#160; Facebook claimed to have a dedicated security team that "does robust review of all third-party applications, using a risk-based approach." "That means that we first look at velocity, number of users, types of data shared, and prioritize," the statement read. "This ensures that the team is focused on addressing the biggest risks, rather than just doing a cursory review at the time that an app is first launched." In other words, they look at applications that fall into specific categories because it would be near impossible to check every single application.&amp;#160; There is also no mention if Facebook conducts a code review of applications selected for review.&amp;#160; The bad news, of course, is that once Facebook shuts down one rogue, malicious application another one is easily right behind it to take its place. Myth: Facebook applications don&amp;#8217;t have typical web security flaws. Reality:&amp;#160; Facebook applications can be developed insecurely just like any other web based application.&amp;#160; In fact, in 2009 security researcher theharmonyguy conducted the &amp;#8220;Month of Facebook Bugs&amp;#8221; exposing security flaws in many of the popular Facebook applications at the time.&amp;#160; These flaws included XSS (Cross-Site Scripting) which can be used to attack the users of applications, SQLi (SQL Injection) which can be used to extract personal or private information from the database of applications, and ClickJacking or LikeJacking which can be used to initiate actions without the user&amp;#8217;s knowledge.&amp;#160; Myth: Facebook is responsible for any information you provide to Facebook or third-party applications. Reality: This is a tricky one.&amp;#160; At the end of the day, you&amp;#8217;re responsible for what you post and any information you provide Facebook or third-party applications.&amp;#160; There is no guarantee that Facebook or third-party application developers will not misuse or sell your information.&amp;#160; This has happened in the recent past. Myth: Facebook allows developers to do whatever they want with their applications and can collect your personal information. Reality: Facebook has certain policies that you can read for yourself about what a developer can or can&amp;#8217;t do.&amp;#160; It&amp;#8217;s important to note that Facebook used to be more restrictive with these rules in the past.&amp;#160; For example, application developers could only keep personal data collected for 24 hours.&amp;#160; Facebook has now removed this restriction and has relaxed many other policies so it&amp;#8217;s easier for developers to integrate with Facebook.&amp;#160; Having said that, it&amp;#8217;s hard for Facebook to truly &amp;#8220;enforce&amp;#8221; these policies unless a malicious application is reviewed by them or it&amp;#8217;s reported to the Facebook security team.&amp;#160; It&amp;#8217;s a battle that is going to be very hard to win based on the current way Facebook allows applications to be developed. Facebook Privacy Myths Myth: Facebook reviews all third-party companies that collect your personal information. Reality: In certain cases like when your friends visit an &amp;#8220;Instant Personalization&amp;#8221; partner like Yelp and the third party can see your information the Facebook privacy policy states that &amp;#8220;we require these websites and applications to go through an approval process, and to enter into separate agreements designed to protect your privacy.&amp;#8221;&amp;#160; What that means is up for debate but what we do know is that you should be cautious when using Instant Personalization as you may be revealing information about your friends as well. Myth: Facebook takes user privacy seriously. Reality: Facebook will try to tell you that they do take your privacy seriously as noted in their privacy policy.&amp;#160; However, Facebook also has a vested interest in collecting your information.&amp;#160; After all, it&amp;#8217;s how they make money.&amp;#160; Double edged sword?&amp;#160; It certainly is!&amp;#160; The more information you share the more valuable you are to Facebook.&amp;#160; You should always take your privacy on Facebook seriously as they may not always have your best interest at heart. Myth: Facebook has very little privacy controls. Reality: This is false.&amp;#160; In fact, Facebook has made great strides over the years in providing its user base with easier to use privacy controls.&amp;#160; I&amp;#8217;ve seen this myself while putting together my Facebook Privacy &amp;#38; Security Guide over the years.&amp;#160; The problem has become that many users don&amp;#8217;t know where these settings are or how to use them.&amp;#160; Facebook also hasn&amp;#8217;t done a great job of communicating changes to privacy settings in the past.&amp;#160; Users of Facebook and computer users in general have become immune to pop-ups and hard to read sign-in notifications.&amp;#160; It&amp;#8217;s simply become easier for users to just &amp;#8220;click through&amp;#8221; so they can get to what they want in Facebook. Myth: Facebook makes it easy for users to delete their accounts. Reality: The truth is that the process of deleting your Facebook account has gotten only slightly better over the years but still remains a confusing one.&amp;#160; For example, here is one guide that walks you through the procedure.&amp;#160; Facebook still has account &amp;#8220;deactivation&amp;#8221; as the first step in the account deletion process, which many users still find confusing.&amp;#160; Many users are also confused between &amp;#8220;deactivation&amp;#8221; and &amp;#8220;deletion.&amp;#8221;&amp;#160; Others think that by successfully deleting their account all the information including pictures they posted are removed from Facebook forever.&amp;#160; While Facebook may say they remove all of your information, you still can&amp;#8217;t stop others from copying it or saving those party pictures of you to their hard drive.&amp;#160; The rule to remember is that once you post something on Facebook, you should always think of it as public information. Facebook Security Myths Myth: Facebook scams are mostly variations of the same one over the years. Reality: Many of the Facebook scams found are simple variations of text messaging, promotion give-a-ways (iPads, iPods [insert latest hot gadget here]), who visited your profile (ProfileSpy), and improvements to existing Facebook services like chat and instant messaging.&amp;#160; In fact, one scam I blogged about over a year ago is still being used today.&amp;#160; The basic rule to remember is that if something is popular in our culture, such as tech products that everyone wants, it&amp;#8217;s most likely going to be used for scams and frauds.&amp;#160; Remember the old rule: if it sounds too good to be true, it probably is. Myth: I can&amp;#8217;t get a virus or malware by using Facebook Reality:&amp;#160; All it takes is clicking on a malicious link from one of your friends, installing a rogue application, or falling for one of the many scams that offer &amp;#8220;free&amp;#8221; stuff.&amp;#160; Facebook is doing a better job of cleaning up malicious links and other related activity.&amp;#160; However, the Koobface worm and associated variants are still a problem and adapt well to attempts by Facebook to rid them from the platform. Myth: I can trust my friends on Facebook because they would never send me anything malicious. Reality: It&amp;#8217;s always nice to trust your friends but this gets complicated on Facebook.&amp;#160; Social Network worms such as Koobface as well as hijacked or stolen accounts are frequently used to social engineer Facebook users to click on a link or send money to foreign countries.&amp;#160; All of these scams exploit the trust relationships that you have with people you know.&amp;#160; It&amp;#8217;s a simple and highly effective technique that&amp;#8217;s still being used today. Myth: Facebook does not have a security team or a way to report security issues/SPAM/scams. Reality: Contrary to popular belief, Facebook does have a security team and ways to report security and privacy issues.&amp;#160; In the past, many of these types of requests would have met the infamous &amp;#8220;Facebook Blackhole&amp;#8221; in which emails or support requests were never answered.&amp;#160; Recently, there have been many improvements to help communicate the presence of this team.&amp;#160; For example, you can &amp;#8220;like&amp;#8221; the Facebook security page, report a compromised account, learn how to report security vulnerabilities, as well as get good tips on what to do when you see security issues. The post Dispelling The Myths Of Facebook Privacy And Security appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>There are many misconceptions about the security of Facebook, Facebook applications, and the frequent scams that seem to plague the world&amp;#8217;s largest social network.&amp;#160; To help set the record straight, I would like to shed&amp;#160;a bit of reality on the most common myths about Facebook security and privacy today. These are real examples of statements that I have encountered regarding Facebook and their privacy controls and security measures.&amp;#160; Some have surprising truth to them and others are completely false and misleading.&amp;#160; I&amp;#8217;ve broken these myths into three areas: Facebook applications, privacy, and security myths.&amp;#160; To Facebook&amp;#8217;s credit, Facebook has made considerable strides over the last few years by implementing new security and privacy controls as well as getting the Facebook security team more visible.&amp;#160; Some of the newer implementations, such as full site SSL and social authentication, will continue to improve the security of Facebook.&amp;#160; Unfortunately, many of these myths will still persist.&amp;#160; This is because users will believe what they want to believe despite new controls and efforts being put in place by Facebook. Facebook Application Myths Myth: All Facebook applications are created and managed by Facebook. Reality: Facebook applications are not developed or maintained by Facebook.&amp;#160; They are all developed, maintained, and managed by third-party companies.&amp;#160; Facebook simply provides an API (Application Programming Interface) for developers to &amp;#8220;interact&amp;#8221; with Facebook and its data.&amp;#160; For example, Farmville is created by the company Zynga.&amp;#160; Zynga only uses the Facebook API to interact with Facebook.&amp;#160; One common misconception is that these applications &amp;#8220;look and feel&amp;#8221; like they are part of Facebook so the applications can be trusted.&amp;#160; This is not true.&amp;#160; The Facebook API is designed to allow seamless integration so it provides users with a more integrated Facebook experience. To make matters worse, Facebook recently announced that they will now allow iframes within page tab applications.&amp;#160; This means that a malicious developer can easily do things like redirect users to malicious web sites or use JavaScript to do a host of other things to the user. Myth: Facebook reviews all applications for security vulnerabilities, scams, or frauds. Reality: In general it would be very difficult with Facebook&amp;#8217;s current application developer model to review the code for all Facebook applications.&amp;#160; According to Facebook&amp;#8217;s official statistics, people on Facebook install 20 million applications every day and according to an older statistics page I found dated November 2010 there were approximately 550,000 active applications.&amp;#160; This is an extremely large amount of applications to check for security issues.&amp;#160; This problem also becomes more challenging when developers release new code or updates to existing applications.&amp;#160; How is Facebook currently addressing this issue?&amp;#160; Facebook made a statement in this recent InformationWeek article talking about how they review applications.&amp;#160; Facebook claimed to have a dedicated security team that "does robust review of all third-party applications, using a risk-based approach." "That means that we first look at velocity, number of users, types of data shared, and prioritize," the statement read. "This ensures that the team is focused on addressing the biggest risks, rather than just doing a cursory review at the time that an app is first launched." In other words, they look at applications that fall into specific categories because it would be near impossible to check every single application.&amp;#160; There is also no mention if Facebook conducts a code review of applications selected for review.&amp;#160; The bad news, of course, is that once Facebook shuts down one rogue, malicious application another one is easily right behind it to take its place. Myth: Facebook applications don&amp;#8217;t have typical web security flaws. Reality:&amp;#160; Facebook applications can be developed insecurely just like any other web based application.&amp;#160; In fact, in 2009 security researcher theharmonyguy conducted the &amp;#8220;Month of Facebook Bugs&amp;#8221; exposing security flaws in many of the popular Facebook applications at the time.&amp;#160; These flaws included XSS (Cross-Site Scripting) which can be used to attack the users of applications, SQLi (SQL Injection) which can be used to extract personal or private information from the database of applications, and ClickJacking or LikeJacking which can be used to initiate actions without the user&amp;#8217;s knowledge.&amp;#160; Myth: Facebook is responsible for any information you provide to Facebook or third-party applications. Reality: This is a tricky one.&amp;#160; At the end of the day, you&amp;#8217;re responsible for what you post and any information you provide Facebook or third-party applications.&amp;#160; There is no guarantee that Facebook or third-party application developers will not misuse or sell your information.&amp;#160; This has happened in the recent past. Myth: Facebook allows developers to do whatever they want with their applications and can collect your personal information. Reality: Facebook has certain policies that you can read for yourself about what a developer can or can&amp;#8217;t do.&amp;#160; It&amp;#8217;s important to note that Facebook used to be more restrictive with these rules in the past.&amp;#160; For example, application developers could only keep personal data collected for 24 hours.&amp;#160; Facebook has now removed this restriction and has relaxed many other policies so it&amp;#8217;s easier for developers to integrate with Facebook.&amp;#160; Having said that, it&amp;#8217;s hard for Facebook to truly &amp;#8220;enforce&amp;#8221; these policies unless a malicious application is reviewed by them or it&amp;#8217;s reported to the Facebook security team.&amp;#160; It&amp;#8217;s a battle that is going to be very hard to win based on the current way Facebook allows applications to be developed. Facebook Privacy Myths Myth: Facebook reviews all third-party companies that collect your personal information. Reality: In certain cases like when your friends visit an &amp;#8220;Instant Personalization&amp;#8221; partner like Yelp and the third party can see your information the Facebook privacy policy states that &amp;#8220;we require these websites and applications to go through an approval process, and to enter into separate agreements designed to protect your privacy.&amp;#8221;&amp;#160; What that means is up for debate but what we do know is that you should be cautious when using Instant Personalization as you may be revealing information about your friends as well. Myth: Facebook takes user privacy seriously. Reality: Facebook will try to tell you that they do take your privacy seriously as noted in their privacy policy.&amp;#160; However, Facebook also has a vested interest in collecting your information.&amp;#160; After all, it&amp;#8217;s how they make money.&amp;#160; Double edged sword?&amp;#160; It certainly is!&amp;#160; The more information you share the more valuable you are to Facebook.&amp;#160; You should always take your privacy on Facebook seriously as they may not always have your best interest at heart. Myth: Facebook has very little privacy controls. Reality: This is false.&amp;#160; In fact, Facebook has made great strides over the years in providing its user base with easier to use privacy controls.&amp;#160; I&amp;#8217;ve seen this myself while putting together my Facebook Privacy &amp;#38; Security Guide over the years.&amp;#160; The problem has become that many users don&amp;#8217;t know where these settings are or how to use them.&amp;#160; Facebook also hasn&amp;#8217;t done a great job of communicating changes to privacy settings in the past.&amp;#160; Users of Facebook and computer users in general have become immune to pop-ups and hard to read sign-in notifications.&amp;#160; It&amp;#8217;s simply become easier for users to just &amp;#8220;click through&amp;#8221; so they can get to what they want in Facebook. Myth: Facebook makes it easy for users to delete their accounts. Reality: The truth is that the process of deleting your Facebook account has gotten only slightly better over the years but still remains a confusing one.&amp;#160; For example, here is one guide that walks you through the procedure.&amp;#160; Facebook still has account &amp;#8220;deactivation&amp;#8221; as the first step in the account deletion process, which many users still find confusing.&amp;#160; Many users are also confused between &amp;#8220;deactivation&amp;#8221; and &amp;#8220;deletion.&amp;#8221;&amp;#160; Others think that by successfully deleting their account all the information including pictures they posted are removed from Facebook forever.&amp;#160; While Facebook may say they remove all of your information, you still can&amp;#8217;t stop others from copying it or saving those party pictures of you to their hard drive.&amp;#160; The rule to remember is that once you post something on Facebook, you should always think of it as public information. Facebook Security Myths Myth: Facebook scams are mostly variations of the same one over the years. Reality: Many of the Facebook scams found are simple variations of text messaging, promotion give-a-ways (iPads, iPods [insert latest hot gadget here]), who visited your profile (ProfileSpy), and improvements to existing Facebook services like chat and instant messaging.&amp;#160; In fact, one scam I blogged about over a year ago is still being used today.&amp;#160; The basic rule to remember is that if something is popular in our culture, such as tech products that everyone wants, it&amp;#8217;s most likely going to be used for scams and frauds.&amp;#160; Remember the old rule: if it sounds too good to be true, it probably is. Myth: I can&amp;#8217;t get a virus or malware by using Facebook Reality:&amp;#160; All it takes is clicking on a malicious link from one of your friends, installing a rogue application, or falling for one of the many scams that offer &amp;#8220;free&amp;#8221; stuff.&amp;#160; Facebook is doing a better job of cleaning up malicious links and other related activity.&amp;#160; However, the Koobface worm and associated variants are still a problem and adapt well to attempts by Facebook to rid them from the platform. Myth: I can trust my friends on Facebook because they would never send me anything malicious. Reality: It&amp;#8217;s always nice to trust your friends but this gets complicated on Facebook.&amp;#160; Social Network worms such as Koobface as well as hijacked or stolen accounts are frequently used to social engineer Facebook users to click on a link or send money to foreign countries.&amp;#160; All of these scams exploit the trust relationships that you have with people you know.&amp;#160; It&amp;#8217;s a simple and highly effective technique that&amp;#8217;s still being used today. Myth: Facebook does not have a security team or a way to report security issues/SPAM/scams. Reality: Contrary to popular belief, Facebook does have a security team and ways to report security and privacy issues.&amp;#160; In the past, many of these types of requests would have met the infamous &amp;#8220;Facebook Blackhole&amp;#8221; in which emails or support requests were never answered.&amp;#160; Recently, there have been many improvements to help communicate the presence of this team.&amp;#160; For example, you can &amp;#8220;like&amp;#8221; the Facebook security page, report a compromised account, learn how to report security vulnerabilities, as well as get good tips on what to do when you see security issues. The post Dispelling The Myths Of Facebook Privacy And Security appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Can enterprises use private social media tools for secure collaboration internally?</title>
		<link>https://socialmediasecurity.com/2011/02/10/can-enterprises-use-private-social-media-tools-for-secure-collaboration-internally/</link>
				<pubDate>Thu, 10 Feb 2011 12:10:48 +0000</pubDate>
		
				<category><![CDATA[Contributors]]></category>

		<guid isPermaLink="false">http://socialmediasecurity.com/?p=2677</guid>
				<description><![CDATA[<p style="text-align: justify"><span style="font-size: small">We know that many organizations are using open source Wiki software and platforms (e.g. <a href="http://www.mediawiki.org">Mediawiki</a>) to do collaboration internally without exposing their systems to 600 million other users. But are there any other tools that enterprises can use to mimic the real-time connectivity of social networking sites like Facebook internally?</span></p>
<p style="text-align: justify"><span style="font-size: small"><strong>Why would a business want private social networking tools? Isn't that an oxymoron?</strong><br /></span></p>
<p style="text-align: justify"><span style="font-size: small">I believe that enterprises can and will eventually begin to use  "internal" or "private" social networks to allow for easier real-time  collaboration, while avoiding some of the risks of the "public" social  networks - such as social engineering attacks, Koobface attacks, etc.  I'd really like to learn more about what the options are for businesses  to deploy their own social media tools internally, or in a private  cloud. Internal deployments would probably tend to be more secure, with potentially  more control over access and authentication of users. But a cloud-based  implementation by a trusted service provider might also be quite secure. Either way, the facility would be less of an easy target for attackers.</p>
<p> Have you seen or heard of such a thing? If so, where can I learn more about them?</span> <span style="font-size: small">Doing a Google search turns up many hits, but I'd like to hear about some success stories and reviews of these kinds of solutions that could benefit the members of the Streetwise Security Zone as we try to figure out how to leverage the power of social media, in a secure and efficient way.</p>
<p> Also, what are your thoughts? What would it take for enterprises to be  able to use social networks and social media tools securely?&#160;</span></p>
<p style="text-align: justify"><span style="font-size: small"><br /></span></p>
<p><em>I am now offering monthly briefings, tailored to organizations that want to build and sustain security awareness for staff. Just because your security team is too busy to do its own training and awareness doesn't mean you can't have an economical way to address human security risks. Please call or email me at the coordinates below...</em><em></em></p>
<p><em><strong>Scott Wright</strong></em></p>
<p><span style="font-size: x-small">The Streetwise Security Coach</span></p>
<p>Join the Streetwise Security Zone at:<a title="Join the Streetwise  Security Zone" href="http://www.streetwise-security-zone.com/join.html"><br />http://www.streetwise-security-zone.com/join.html</a></p>
<p>Phone: 1-613-693-0997<br />Email: scott@streetwise-security-zone.com<br />Twitter ID: <a href="http://www.twitter.com/streetsec">http://www.twitter.com/streetsec</a></p>
<p><span style="font-size: x-small"><span style="font-family: times new roman,times">To receive weekly security tips and other notices about helpful content available on this site, please make sure you are on my list by clicking <a title="Free Weekly Streetwise Security Tips Newsletter Signup" href="http://www.streetwise-security-zone.com/members/streetwise/adminpages/weeklytips-signup">HERE</a>, and entering your name and email address.</span></span></p>
<p>&#160;</p>
<p>&#160;</p>
<p><!-- Site Meter --> <a href="http://s49.sitemeter.com/stats.asp?site=s49sw4sw" target="_top"> <img src="http://s49.sitemeter.com/meter.asp?site=s49sw4sw" alt="Site Meter" border="0" /></a> <!-- Copyright (c)2006 Site Meter --></p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/02/10/can-enterprises-use-private-social-media-tools-for-secure-collaboration-internally/">Can enterprises use private social media tools for secure collaboration internally?</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: small;">We know that many organizations are using open source Wiki software and platforms (e.g. <a href="http://www.mediawiki.org">Mediawiki</a>) to do collaboration internally without exposing their systems to 600 million other users. But are there any other tools that enterprises can use to mimic the real-time connectivity of social networking sites like Facebook internally?</span></p>
<p style="text-align: justify;"><span style="font-size: small;"><strong>Why would a business want private social networking tools? Isn&#8217;t that an oxymoron?</strong><br /></span></p>
<p style="text-align: justify;"><span style="font-size: small;">I believe that enterprises can and will eventually begin to use  &#8220;internal&#8221; or &#8220;private&#8221; social networks to allow for easier real-time  collaboration, while avoiding some of the risks of the &#8220;public&#8221; social  networks &#8211; such as social engineering attacks, Koobface attacks, etc.  I&#8217;d really like to learn more about what the options are for businesses  to deploy their own social media tools internally, or in a private  cloud. Internal deployments would probably tend to be more secure, with potentially  more control over access and authentication of users. But a cloud-based  implementation by a trusted service provider might also be quite secure. Either way, the facility would be less of an easy target for attackers.</p>
<p> Have you seen or heard of such a thing? If so, where can I learn more about them?</span> <span style="font-size: small;">Doing a Google search turns up many hits, but I&#8217;d like to hear about some success stories and reviews of these kinds of solutions that could benefit the members of the Streetwise Security Zone as we try to figure out how to leverage the power of social media, in a secure and efficient way.</p>
<p> Also, what are your thoughts? What would it take for enterprises to be  able to use social networks and social media tools securely?&nbsp;</span></p>
<p style="text-align: justify;"><span style="font-size: small;"><br /></span></p>
<p><em>I am now offering monthly briefings, tailored to organizations that want to build and sustain security awareness for staff. Just because your security team is too busy to do its own training and awareness doesn&#8217;t mean you can&#8217;t have an economical way to address human security risks. Please call or email me at the coordinates below&#8230;</em><em></em></p>
<p><em><strong>Scott Wright</strong></em></p>
<p><span style="font-size: x-small;">The Streetwise Security Coach</span></p>
<p>Join the Streetwise Security Zone at:<a title="Join the Streetwise  Security Zone" href="http://www.streetwise-security-zone.com/join.html"><br />http://www.streetwise-security-zone.com/join.html</a></p>
<p>Phone: 1-613-693-0997<br />Email: scott@streetwise-security-zone.com<br />Twitter ID: <a href="http://www.twitter.com/streetsec">http://www.twitter.com/streetsec</a></p>
<p><span style="font-size: x-small;"><span style="font-family: times new roman,times;">To receive weekly security tips and other notices about helpful content available on this site, please make sure you are on my list by clicking <a title="Free Weekly Streetwise Security Tips Newsletter Signup" href="http://www.streetwise-security-zone.com/members/streetwise/adminpages/weeklytips-signup">HERE</a>, and entering your name and email address.</span></span></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><!-- Site Meter --> <a href="http://s49.sitemeter.com/stats.asp?site=s49sw4sw" > <img src="http://s49.sitemeter.com/meter.asp?site=s49sw4sw" alt="Site Meter" border="0" /></a> <!-- Copyright (c)2006 Site Meter --></p>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F02%2F10%2Fcan-enterprises-use-private-social-media-tools-for-secure-collaboration-internally%2F&amp;t=Can+enterprises+use+private+social+media+tools+for+secure+collaboration+internally%3F" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Can+enterprises+use+private+social+media+tools+for+secure+collaboration+internally%3F%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F02%2F10%2Fcan-enterprises-use-private-social-media-tools-for-secure-collaboration-internally%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F02%2F10%2Fcan-enterprises-use-private-social-media-tools-for-secure-collaboration-internally%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F02%2F10%2Fcan-enterprises-use-private-social-media-tools-for-secure-collaboration-internally%2F&amp;title=Can+enterprises+use+private+social+media+tools+for+secure+collaboration+internally%3F&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=We+know+that+many+organizations+are+using+open+source+Wiki+software+and+platforms+%28e.g.+Mediawiki%29+to+do+collaboration+internally+without+exposing+their+systems+to+600+million+other+users.+But+are+there+any+other+tools+that+enterprises+can+use+to+mimic+the+real-time+connectivity+of+social+networking+sites+like+Facebook+internally%3F%0AWhy+would+a+business+want+private+social+networking+tools%3F+Isn%27t+that+an+oxymoron%3F%0AI+believe+that+enterprises+can+and+will+eventually+begin+to+use++%22internal%22+or+%22private%22+social+networks+to+allow+for+easier+real-time++collaboration%2C+while+avoiding+some+of+the+risks+of+the+%22public%22+social++networks+-+such+as+social+engineering+attacks%2C+Koobface+attacks%2C+etc.++I%27d+really+like+to+learn+more+about+what+the+options+are+for+businesses++to+deploy+their+own+social+media+tools+internally%2C+or+in+a+private++cloud.+Internal+deployments+would+probably+tend+to+be+more+secure%2C+with+potentially++more+control+over+access+and+authentication+of+users.+But+a+cloud-based++implementation+by+a+trusted+service+provider+might+also+be+quite+secure.+Either+way%2C+the+facility+would+be+less+of+an+easy+target+for+attackers.+Have+you+seen+or+heard+of+such+a+thing%3F+If+so%2C+where+can+I+learn+more+about+them%3F+Doing+a+Google+search+turns+up+many+hits%2C+but+I%27d+like+to+hear+about+some+success+stories+and+reviews+of+these+kinds+of+solutions+that+could+benefit+the+members+of+the+Streetwise+Security+Zone+as+we+try+to+figure+out+how+to+leverage+the+power+of+social+media%2C+in+a+secure+and+efficient+way.+Also%2C+what+are+your+thoughts%3F+What+would+it+take+for+enterprises+to+be++able+to+use+social+networks+and+social+media+tools+securely%3F%26nbsp%3B%0AI+am+now+offering+monthly+briefings%2C+tailored+to+organizations+that+want+to+build+and+sustain+security+awareness+for+staff.+Just+because+your+security+team+is+too+busy+to+do+its+own+training+and+awareness+doesn%27t+mean+you+can%27t+have+an+economical+way+to+address+human+security+risks.+Please+call+or+email+me+at+the+coordinates+below...%0AScott+Wright%0AThe+Streetwise+Security+Coach%0AJoin+the+Streetwise+Security+Zone+at%3Ahttp%3A%2F%2Fwww.streetwise-security-zone.com%2Fjoin.html%0APhone%3A+1-613-693-0997Email%3A+scott%40streetwise-security-zone.comTwitter+ID%3A+http%3A%2F%2Fwww.twitter.com%2Fstreetsec%0ATo+receive+weekly+security+tips+and+other+notices+about+helpful+content+available+on+this+site%2C+please+make+sure+you+are+on+my+list+by+clicking+HERE%2C+and+entering+your+name+and+email+address.%0A%26nbsp%3B%0A%26nbsp%3B" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2011%2F02%2F10%2Fcan-enterprises-use-private-social-media-tools-for-secure-collaboration-internally%2F&amp;title=Can+enterprises+use+private+social+media+tools+for+secure+collaboration+internally%3F" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2011/02/10/can-enterprises-use-private-social-media-tools-for-secure-collaboration-internally/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Can+enterprises+use+private+social+media+tools+for+secure+collaboration+internally%3F&body=We+know+that+many+organizations+are+using+open+source+Wiki+software+and+platforms+%28e.g.+Mediawiki%29+to+do+collaboration+internally+without+exposing+their+systems+to+600+million+other+users.+But+are+there+any+other+tools+that+enterprises+can+use+to+mimic+the+real-time+connectivity+of+social+networking+sites+like+Facebook+internally%3F%0AWhy+would+a+business+want+private+social+networking+tools%3F+Isn%27t+that+an+oxymoron%3F%0AI+believe+that+enterprises+can+and+will+eventually+begin+to+use++%22internal%22+or+%22private%22+social+networks+to+allow+for+easier+real-time++collaboration%2C+while+avoiding+some+of+the+risks+of+the+%22public%22+social++networks+-+such+as+social+engineering+attacks%2C+Koobface+attacks%2C+etc.++I%27d+really+like+to+learn+more+about+what+the+options+are+for+businesses++to+deploy+their+own+social+media+tools+internally%2C+or+in+a+private++cloud.+Internal+deployments+would+probably+tend+to+be+more+secure%2C+with+potentially++more+control+over+access+and+authentication+of+users.+But+a+cloud-based++implementation+by+a+trusted+service+provider+might+also+be+quite+secure.+Either+way%2C+the+facility+would+be+less+of+an+easy+target+for+attackers.+Have+you+seen+or+heard+of+such+a+thing%3F+If+so%2C+where+can+I+learn+more+about+them%3F+Doing+a+Google+search+turns+up+many+hits%2C+but+I%27d+like+to+hear+about+some+success+stories+and+reviews+of+these+kinds+of+solutions+that+could+benefit+the+members+of+the+Streetwise+Security+Zone+as+we+try+to+figure+out+how+to+leverage+the+power+of+social+media%2C+in+a+secure+and+efficient+way.+Also%2C+what+are+your+thoughts%3F+What+would+it+take+for+enterprises+to+be++able+to+use+social+networks+and+social+media+tools+securely%3F%26nbsp%3B%0AI+am+now+offering+monthly+briefings%2C+tailored+to+organizations+that+want+to+build+and+sustain+security+awareness+for+staff.+Just+because+your+security+team+is+too+busy+to+do+its+own+training+and+awareness+doesn%27t+mean+you+can%27t+have+an+economical+way+to+address+human+security+risks.+Please+call+or+email+me+at+the+coordinates+below...%0AScott+Wright%0AThe+Streetwise+Security+Coach%0AJoin+the+Streetwise+Security+Zone+at%3Ahttp%3A%2F%2Fwww.streetwise-security-zone.com%2Fjoin.html%0APhone%3A+1-613-693-0997Email%3A+scott%40streetwise-security-zone.comTwitter+ID%3A+http%3A%2F%2Fwww.twitter.com%2Fstreetsec%0ATo+receive+weekly+security+tips+and+other+notices+about+helpful+content+available+on+this+site%2C+please+make+sure+you+are+on+my+list+by+clicking+HERE%2C+and+entering+your+name+and+email+address.%0A%26nbsp%3B%0A%26nbsp%3B%20-%20https://socialmediasecurity.com/2011/02/10/can-enterprises-use-private-social-media-tools-for-secure-collaboration-internally/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2011/02/10/can-enterprises-use-private-social-media-tools-for-secure-collaboration-internally/">Can enterprises use private social media tools for secure collaboration internally?</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
										<dc:creator>feedback@socialmediasecurity.com (Scott Wright's Security Views)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>We know that many organizations are using open source Wiki software and platforms (e.g. Mediawiki) to do collaboration internally without exposing their systems to 600 million other users. But are there any other tools that enterprises can use to mimic the real-time connectivity of social networking sites like Facebook internally? Why would a business want private social networking tools? Isn't that an oxymoron? I believe that enterprises can and will eventually begin to use "internal" or "private" social networks to allow for easier real-time collaboration, while avoiding some of the risks of the "public" social networks - such as social engineering attacks, Koobface attacks, etc. I'd really like to learn more about what the options are for businesses to deploy their own social media tools internally, or in a private cloud. Internal deployments would probably tend to be more secure, with potentially more control over access and authentication of users. But a cloud-based implementation by a trusted service provider might also be quite secure. Either way, the facility would be less of an easy target for attackers. Have you seen or heard of such a thing? If so, where can I learn more about them? Doing a Google search turns up many hits, but I'd like to hear about some success stories and reviews of these kinds of solutions that could benefit the members of the Streetwise Security Zone as we try to figure out how to leverage the power of social media, in a secure and efficient way. Also, what are your thoughts? What would it take for enterprises to be able to use social networks and social media tools securely?&amp;#160; I am now offering monthly briefings, tailored to organizations that want to build and sustain security awareness for staff. Just because your security team is too busy to do its own training and awareness doesn't mean you can't have an economical way to address human security risks. Please call or email me at the coordinates below... Scott Wright The Streetwise Security Coach Join the Streetwise Security Zone at: http://www.streetwise-security-zone.com/join.html Phone: 1-613-693-0997 Email: scott@streetwise-security-zone.com Twitter ID: http://www.twitter.com/streetsec To receive weekly security tips and other notices about helpful content available on this site, please make sure you are on my list by clicking HERE, and entering your name and email address. &amp;#160; &amp;#160; The post Can enterprises use private social media tools for secure collaboration internally? appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>We know that many organizations are using open source Wiki software and platforms (e.g. Mediawiki) to do collaboration internally without exposing their systems to 600 million other users. But are there any other tools that enterprises can use to mimic the real-time connectivity of social networking sites like Facebook internally? Why would a business want private social networking tools? Isn't that an oxymoron? I believe that enterprises can and will eventually begin to use "internal" or "private" social networks to allow for easier real-time collaboration, while avoiding some of the risks of the "public" social networks - such as social engineering attacks, Koobface attacks, etc. I'd really like to learn more about what the options are for businesses to deploy their own social media tools internally, or in a private cloud. Internal deployments would probably tend to be more secure, with potentially more control over access and authentication of users. But a cloud-based implementation by a trusted service provider might also be quite secure. Either way, the facility would be less of an easy target for attackers. Have you seen or heard of such a thing? If so, where can I learn more about them? Doing a Google search turns up many hits, but I'd like to hear about some success stories and reviews of these kinds of solutions that could benefit the members of the Streetwise Security Zone as we try to figure out how to leverage the power of social media, in a secure and efficient way. Also, what are your thoughts? What would it take for enterprises to be able to use social networks and social media tools securely?&amp;#160; I am now offering monthly briefings, tailored to organizations that want to build and sustain security awareness for staff. Just because your security team is too busy to do its own training and awareness doesn't mean you can't have an economical way to address human security risks. Please call or email me at the coordinates below... Scott Wright The Streetwise Security Coach Join the Streetwise Security Zone at: http://www.streetwise-security-zone.com/join.html Phone: 1-613-693-0997 Email: scott@streetwise-security-zone.com Twitter ID: http://www.twitter.com/streetsec To receive weekly security tips and other notices about helpful content available on this site, please make sure you are on my list by clicking HERE, and entering your name and email address. &amp;#160; &amp;#160; The post Can enterprises use private social media tools for secure collaboration internally? appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Looking at Facebook’s Strategy and Possible New Directions</title>
		<link>https://socialmediasecurity.com/2010/11/15/looking-at-facebooks-strategy-and-possible-new-directions-427/</link>
				<pubDate>Mon, 15 Nov 2010 09:48:57 +0000</pubDate>
		
				<category><![CDATA[Contributors]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[socnetsec]]></category>

		<guid isPermaLink="false">http://theharmonyguy.com/?p=1049</guid>
				<description><![CDATA[<p>Over the last few months, Facebook has rolled out several significant new features, such as Places and the updated Groups. On Monday, Facebook is holding another event to announce what many expect to be an improved messaging feature. As I&#8217;ve watched these changes, I&#8217;ve been thinking about where Facebook might be headed. At first, I [...]</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2010/11/15/looking-at-facebooks-strategy-and-possible-new-directions-427/">Looking at Facebook’s Strategy and Possible New Directions</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>Over the last few months, Facebook has rolled out several significant new features, such as Places and the updated Groups. On Monday, Facebook is holding another event to announce what many expect to be an improved messaging feature. As I&#8217;ve watched these changes, I&#8217;ve been thinking about where Facebook might be headed.</p>
<p>At first, I started to think Facebook was simply looking to extend its reach by acting as an invisible layer of sorts. Anil Dash once talked about Facebook melting into the larger Web, but perhaps Facebook would end up becoming part of the underlying fabric of the Internet. In past public appearances, Facebook CEO Mark Zuckerberg seemed to be the kind of person who was content to remain in the background, and the company&#8217;s strategy seemed to reflect a similar style. I&#8217;ve mentioned before the idea of Facebook becoming and identity layer on the Internet, and innovations such as their Graph API have made it easier than ever for sites to integrate with Facebook.</p>
<p><span id="more-1049"></span>But Facebook&#8217;s updated Groups feature changed my perspective, since it added functionality that would drive users back to facebook.com. Of course, the upgrade did enable e-mail as a way of interacting with groups. In some ways, Facebook&#8217;s overall strategy could be compared to Google&#8217;s. Years ago, many sites focused on &#8220;stickiness,&#8221; trying to keep users hooked. By contrast, Google drove users away by providing relevant links to other sites. But to see Google as non-sticky would be an oversimplification. In fact, the company built a successful ad network that extended its reach across the web. Also, Google has created a number of other products that many people stay logged into, such as Gmail.</p>
<p>And now, people are expecting Facebook to announce a web-based e-mail client that will compete with Gmail. I&#8217;m predicting that Facebook will roll out a new messaging system, but it won&#8217;t be a Gmail clone or simply another client for managing traditional POP/IMAP e-mail. That&#8217;s not to say there won&#8217;t be any e-mail gateway, but I think Facebook&#8217;s plans will go much further. I&#8217;m guessing that at least part of the new system will involve somehow extending private messaging features across Facebook-integrated websites.</p>
<p>In any event, I think Facebook&#8217;s announcement will include at least a few surprises for those who have been discussing the possibilities. Facebook has a history of introducing features that aren&#8217;t quite what people expected &#8211; and often end up leading to practical implementations of ideas that were previously niche experiments. Personally, I think it&#8217;s a bit short-sighted to think that Facebook would simply join the market for web-based e-mail without trying to reinvent it, especially given the service&#8217;s cautiousness about past features that allowed or potentially allowed spam-like behaviors.</p>
<p>Facebook has also been accused many times of somehow standing in opposition to &#8220;openness.&#8221; Personally, I think the term has become a buzzword that&#8217;s often used without much specificity. And even though I&#8217;ve often been a critic of Facebook, I do think many of the accusations aren&#8217;t entirely fair. From RSS feeds to developer APIs, Facebook has opened up data in ways that many other sites can&#8217;t claim. Today&#8217;s Facebook is certainly far more &#8220;open&#8221; that years ago &#8211; in fact, I would argue that the site has at times been too open lately, such as when some user data became reclassified as &#8220;publicly available&#8221; last fall. But regardless of Facebook&#8217;s degree of openness, the company has always been careful to maintain a high degree of control over information and features on the site. This can be positive, such as quickly removing malware links, or negative, such as controversial decisions to bar users or certain content.</p>
<p>Either way, that control has helped the site build a powerful database of profiles that generally reflects real people and real relationships. That&#8217;s part of what fascinated me about the site&#8217;s recent spat with Google over contact information. In the past, a list of e-mail addresses was about the only semi-reliable way to identify a group of people across the Internet. Now, many sites rely on Facebook&#8217;s social graph for that function. In terms of identity, the value of e-mail addresses has declined, and I don&#8217;t think exporting them from Facebook would provide as much value as Google might think. On the other hand, Google may realize this and be so concerned about the shift that they&#8217;re trying to curb Facebook&#8217;s influence. This would especially make sense if Google intends to introduce a more comprehensive social networking product that would need e-mail addresses as a starting point. Regardless, I&#8217;m sure Google feels threatened by the prospect of Facebook providing a better alternative to traditional e-mail &#8211; a change that would only bolster the value of a Facebook profile as the primary way to identify a typical Internet user.</p>
<div class="feedflare">
<a href="http://feeds.feedburner.com/~ff/theharmonyguy?a=sPGv0wxglnc:HovnR8ll7QE:YwkR-u9nhCs"><img src="http://feeds.feedburner.com/~ff/theharmonyguy?d=YwkR-u9nhCs" border="0"></img></a>
</div>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F11%2F15%2Flooking-at-facebooks-strategy-and-possible-new-directions-427%2F&amp;t=Looking+at+Facebook%E2%80%99s+Strategy+and+Possible+New+Directions" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Looking+at+Facebook%E2%80%99s+Strategy+and+Possible+New+Directions%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F11%2F15%2Flooking-at-facebooks-strategy-and-possible-new-directions-427%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F11%2F15%2Flooking-at-facebooks-strategy-and-possible-new-directions-427%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F11%2F15%2Flooking-at-facebooks-strategy-and-possible-new-directions-427%2F&amp;title=Looking+at+Facebook%E2%80%99s+Strategy+and+Possible+New+Directions&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=Over+the+last+few+months%2C+Facebook+has+rolled+out+several+significant+new+features%2C+such+as+Places+and+the+updated+Groups.+On+Monday%2C+Facebook+is+holding+another+event+to+announce+what+many+expect+to+be+an+improved+messaging+feature.+As+I%26%238217%3Bve+watched+these+changes%2C+I%26%238217%3Bve+been+thinking+about+where+Facebook+might+be+headed.+At+first%2C+I+%5B...%5D" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F11%2F15%2Flooking-at-facebooks-strategy-and-possible-new-directions-427%2F&amp;title=Looking+at+Facebook%E2%80%99s+Strategy+and+Possible+New+Directions" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2010/11/15/looking-at-facebooks-strategy-and-possible-new-directions-427/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Looking+at+Facebook%E2%80%99s+Strategy+and+Possible+New+Directions&body=Over+the+last+few+months%2C+Facebook+has+rolled+out+several+significant+new+features%2C+such+as+Places+and+the+updated+Groups.+On+Monday%2C+Facebook+is+holding+another+event+to+announce+what+many+expect+to+be+an+improved+messaging+feature.+As+I%26%238217%3Bve+watched+these+changes%2C+I%26%238217%3Bve+been+thinking+about+where+Facebook+might+be+headed.+At+first%2C+I+%5B...%5D%20-%20https://socialmediasecurity.com/2010/11/15/looking-at-facebooks-strategy-and-possible-new-directions-427/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2010/11/15/looking-at-facebooks-strategy-and-possible-new-directions-427/">Looking at Facebook’s Strategy and Possible New Directions</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
										<dc:creator>feedback@socialmediasecurity.com (theharmonyguy)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Over the last few months, Facebook has rolled out several significant new features, such as Places and the updated Groups. On Monday, Facebook is holding another event to announce what many expect to be an improved messaging feature. As I&amp;#8217;ve watched these changes, I&amp;#8217;ve been thinking about where Facebook might be headed. At first, I [...] The post Looking at Facebook’s Strategy and Possible New Directions appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>Over the last few months, Facebook has rolled out several significant new features, such as Places and the updated Groups. On Monday, Facebook is holding another event to announce what many expect to be an improved messaging feature. As I&amp;#8217;ve watched these changes, I&amp;#8217;ve been thinking about where Facebook might be headed. At first, I [...] The post Looking at Facebook’s Strategy and Possible New Directions appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Thoughts on the Wall Street Journal’s Facebook Investigation</title>
		<link>https://socialmediasecurity.com/2010/10/25/thoughts-on-the-wall-street-journals-facebook-investigation/</link>
				<pubDate>Mon, 25 Oct 2010 11:56:45 +0000</pubDate>
		
				<category><![CDATA[Contributors]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[socnetsec]]></category>

		<guid isPermaLink="false">http://theharmonyguy.com/?p=1023</guid>
				<description><![CDATA[<p>A front-page story in last Monday&#8217;s Wall Street Journal declared a &#8220;privacy breach&#8221; of Facebook information based on an investigation conducted by the paper. The Journal found that third-party applications using the Facebook Platform were leaking users&#8217; Facebook IDs to other companies, such as advertising networks. The report generated controversy across the Web, and some [...]</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2010/10/25/thoughts-on-the-wall-street-journals-facebook-investigation/">Thoughts on the Wall Street Journal’s Facebook Investigation</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>A <a title="Facebook in Privacy Breach" href="http://online.wsj.com/article/SB10001424052702304772804575558484075236968.html">front-page story</a> in last Monday&#8217;s Wall Street Journal declared a &#8220;privacy breach&#8221; of Facebook information based on an investigation conducted by the paper. The Journal found that third-party applications using the Facebook Platform were leaking users&#8217; Facebook IDs to other companies, such as advertising networks.</p>
<p>The report generated controversy across the Web, and some reactions were strongly negative. On TechCrunch, Michael Arrington <a title="Fear And Loathing At The Wall Street Journal" href="http://techcrunch.com/2010/10/18/fear-and-loathing-at-the-wall-street-journal/">dismissed the article</a> as alarmist and overblown. Forbes&#8217; Kashmir Hill <a title="Did the Wall Street Journal Overreact to Facebook Privacy ‘Breach’?" href="http://blogs.forbes.com/kashmirhill/2010/10/18/did-the-wall-street-journal-overreact-to-facebook-privacy-concern/">surveyed other responses</a>, including a conversation on Twitter between Jeff Jarvis and Henry Blodget, and expressed skepticism over the Journal&#8217;s tone.</p>
<p>I&#8217;ve been a bit surprised by the degree to which some have written off the Journal&#8217;s coverage. Some may disagree with the label of &#8220;privacy breach,&#8221; but I thought the report laid out the issues well and did not paint the problem as a conspiracy on the part of Facebook or application developers. Either way, I&#8217;m glad to see that the article has sparked renewed conversation about shortcomings of web applications and databases of information about web users. Also, many may not realize that information leakage on the Facebook Platform has historically been even worse.</p>
<p><span id="more-1023"></span>Information leakage via a referrer is not a new problem and can certainly affect other websites. But that doesn&#8217;t lessen the significance of the behavior observed in the WSJ investigation. Privacy policies are nearly always careful to note that a service does not transfer personally identifiable information to third parties without consent. Online advertising networks often stress the anonymity of their tracking and data collection. The behavior of Facebook applications, even if unintentional, violated the spirit of such statements and the letter of Facebook&#8217;s own policies.</p>
<p>Some people downplayed the repercussions of such a scenario on the basis that it did not lead to any &#8220;private&#8221; profile information being transferred to advertisers &#8211; a point Facebook was quick to stress. Yet when did that become the bar for our concept of acceptable online privacy? Should other services stop worrying about anonymizing data or identifying users, since now we should only be concerned about &#8220;private&#8221; content instead of personally identifiable information? Furthermore, keep in mind that Facebook gets to define what&#8217;s considered private information in this situation &#8211; and that definition has changed over the last few years. At one time in the not-too-distant past, even a user&#8217;s name and picture could be classified as private.</p>
<p>Many reactions have noted that a Facebook user&#8217;s name and picture are already considered public information, easily accessed via Facebook&#8217;s APIs. Or as a Facebook spokesmen <a title="Facebook privacy: was there really a breach?" href="http://www.thedailybeast.com/blogs-and-stories/2010-10-19/facebook-privacy-was-there-really-a-breach/">put it</a>, &#8220;I don&#8217;t see from a logic standpoint how information available to anyone in the world with an Internet connection can even be &#8216;breached.&#8217;&#8221; But this argument fails to address the real problem with leaked IDs in the referrer. The issue was not simply what data applications were leaking, but when and how that data was leaked. The problem was not that advertisers could theoretically figure out your name given an ID number &#8211; it&#8217;s that they were given a specific ID number at the moment a user accessed a particular page. Essentially, advertisers and tracking networks were able to act as if they were part of Facebook&#8217;s instant personalization program. Ads could have theoretically greeted users by name &#8211; the provider could connect a specific visit with a specific person.</p>
<p>Interestingly enough, many past advertisements in Facebook applications did greet users by name. Some ads also including names and pictures of friends. Facebook took steps several times to quell controversies that arose from such tactics, but I&#8217;m not sure many people understood the technical details that enabled such ads. Rather than simply leak a user&#8217;s ID, applications were actually passing a value called the session secret to scripts for third-party ad networks.</p>
<p>With a session secret, such networks could (and often did) make requests to the Facebook API for private profile information of both the user and their friends, or even private content, such as photos. Typically, this information was processed client-side and used to dynamically generate advertisements. But no technical limitations prevented ad networks from modifying their code to retrieve the information. In fact, a number of advertisements did send back certain details, such as age or gender.</p>
<p>Change to the Facebook Platform, such as the introduction of OAuth earlier this year, have led to the deprecation of session secrets and removed this particular problem. I&#8217;m not sure how much this sort of information leakage or similar security problems motivated the changes, but problems with session secrets certainly persisted quite a while prior to them. If the WSJ had conducted their study a year ago, the results could have been even more worrying.</p>
<p>Still, I&#8217;m glad that the Journal&#8217;s research has led many to look more closely at the issues they raised. First, the story has drawn attention to more general problems with web applications. Remember, the Web was originally designed for accessing static pages of primarily textual information, not the sort of complex programs found in browsers today. (HTML 2.0 didn&#8217;t even have a script tag.) Data leaking via referrers or a page&#8217;s scripts all having the same scope are problems that go beyond Facebook apps and will likely lead to more difficulties in the future if not addressed.</p>
<p>Second, people are now investigating silos of information collected about website visitors, such as RapLeaf&#8217;s extensive database. Several responses to the Journal piece noted that many such collections of data provide far more detail on web users and are worthy of greater attention. I agree that they deserve scrutiny, and now reporters at the Journal seem to be helping in that regard as well.</p>
<p>We&#8217;ve entered an age where we can do things never previously possible. Such opportunities can be exciting and clearly positive, but others could bring unintended consequences. I think the availability and depth of information about people now being gathered and analyzed falls into the latter category. Perhaps we will soon live in a world where hardly any bit of data is truly private, or perhaps we will reach a more open world through increased sharing of content. But I think it well worth our time to stop and think about the ramifications of technological developments before we simply forge ahead with them.</p>
<p>Over the last few years, I&#8217;ve tried to bring attention to some of the issues relating to the information Facebook collects and uses. They&#8217;re certainly not the only privacy issues relevant to today&#8217;s Internet users, and they may not be the most important. But I think they do matter, and as Facebook grows, their importance may increase. Similarly, I think it wrong to dismiss the Journal&#8217;s investigation as &#8220;complete rubbish,&#8221; and I look forward to the rest of the dialogue they&#8217;ve now generated.</p>
<div class="feedflare">
<a href="http://feeds.feedburner.com/~ff/theharmonyguy?a=L-0U2JWRsdc:EMKLAlpMcPA:YwkR-u9nhCs"><img src="http://feeds.feedburner.com/~ff/theharmonyguy?d=YwkR-u9nhCs" border="0"></img></a>
</div>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F10%2F25%2Fthoughts-on-the-wall-street-journals-facebook-investigation%2F&amp;t=Thoughts+on+the+Wall+Street+Journal%E2%80%99s+Facebook+Investigation" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Thoughts+on+the+Wall+Street+Journal%E2%80%99s+Facebook+Investigation%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F10%2F25%2Fthoughts-on-the-wall-street-journals-facebook-investigation%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F10%2F25%2Fthoughts-on-the-wall-street-journals-facebook-investigation%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F10%2F25%2Fthoughts-on-the-wall-street-journals-facebook-investigation%2F&amp;title=Thoughts+on+the+Wall+Street+Journal%E2%80%99s+Facebook+Investigation&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=A+front-page+story+in+last+Monday%26%238217%3Bs+Wall+Street+Journal+declared+a+%26%238220%3Bprivacy+breach%26%238221%3B+of+Facebook+information+based+on+an+investigation+conducted+by+the+paper.+The+Journal+found+that+third-party+applications+using+the+Facebook+Platform+were+leaking+users%26%238217%3B+Facebook+IDs+to+other+companies%2C+such+as+advertising+networks.+The+report+generated+controversy+across+the+Web%2C+and+some+%5B...%5D" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F10%2F25%2Fthoughts-on-the-wall-street-journals-facebook-investigation%2F&amp;title=Thoughts+on+the+Wall+Street+Journal%E2%80%99s+Facebook+Investigation" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2010/10/25/thoughts-on-the-wall-street-journals-facebook-investigation/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Thoughts+on+the+Wall+Street+Journal%E2%80%99s+Facebook+Investigation&body=A+front-page+story+in+last+Monday%26%238217%3Bs+Wall+Street+Journal+declared+a+%26%238220%3Bprivacy+breach%26%238221%3B+of+Facebook+information+based+on+an+investigation+conducted+by+the+paper.+The+Journal+found+that+third-party+applications+using+the+Facebook+Platform+were+leaking+users%26%238217%3B+Facebook+IDs+to+other+companies%2C+such+as+advertising+networks.+The+report+generated+controversy+across+the+Web%2C+and+some+%5B...%5D%20-%20https://socialmediasecurity.com/2010/10/25/thoughts-on-the-wall-street-journals-facebook-investigation/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2010/10/25/thoughts-on-the-wall-street-journals-facebook-investigation/">Thoughts on the Wall Street Journal’s Facebook Investigation</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
										<dc:creator>feedback@socialmediasecurity.com (theharmonyguy)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>A front-page story in last Monday&amp;#8217;s Wall Street Journal declared a &amp;#8220;privacy breach&amp;#8221; of Facebook information based on an investigation conducted by the paper. The Journal found that third-party applications using the Facebook Platform were leaking users&amp;#8217; Facebook IDs to other companies, such as advertising networks. The report generated controversy across the Web, and some [...] The post Thoughts on the Wall Street Journal’s Facebook Investigation appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>A front-page story in last Monday&amp;#8217;s Wall Street Journal declared a &amp;#8220;privacy breach&amp;#8221; of Facebook information based on an investigation conducted by the paper. The Journal found that third-party applications using the Facebook Platform were leaking users&amp;#8217; Facebook IDs to other companies, such as advertising networks. The report generated controversy across the Web, and some [...] The post Thoughts on the Wall Street Journal’s Facebook Investigation appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Two New Social Media Security White Papers Released</title>
		<link>https://socialmediasecurity.com/2010/10/13/two-new-social-media-security-white-papers-released/</link>
				<pubDate>Thu, 14 Oct 2010 03:53:18 +0000</pubDate>
		
				<category><![CDATA[Contributors]]></category>
		<category><![CDATA[Social Networking]]></category>
		<category><![CDATA[socnetsec]]></category>

		<guid isPermaLink="false">http://www.spylogic.net/?p=527</guid>
				<description><![CDATA[<p>My employer (SecureState) has released two white papers as part of our Social Media Security Awareness Month.  You can also download some cool wallpaper for this month created by Rob our graphic designer (see the picture on the right).  :-) First is some research several of my colleagues and I worked on.  The paper is titled: [...]</p>
<h3>Share and Enjoy</h3>
<p><!-- Start WP Socializer - Social Buttons - Output --><br />
 &#8226; <a href="http://www.facebook.com/share.php?u=http%3A%2F%2Fwww.spylogic.net%2F2010%2F10%2Ftwo-new-social-media-security-white-papers-released%2F&#38;t=Two+New+Social+Media+Security+White+Papers+Released" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &#8226; <a href="http://twitter.com/home?status=Two+New+Social+Media+Security+White+Papers+Released%20-%20http%3A%2F%2Fwww.spylogic.net%3Fp%3D527%20@agent0x0" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &#8226; <a href="http://delicious.com/post?url=http%3A%2F%2Fwww.spylogic.net%2F2010%2F10%2Ftwo-new-social-media-security-white-papers-released%2F&#38;title=Two+New+Social+Media+Security+White+Papers+Released&#38;notes=My+employer+%28SecureState%29+has+released+two+white+papers+as+part+of+our+Social+Media+Security+Awareness+Month.+%C2%A0You+can+also+download+some+cool+wallpaper+for+this+month+created+by+Rob+our+graphic+designer+%28see+the+picture+on+the+right%29.+%C2%A0%3A-%29%0D%0A%0D%0AFirs" title="Post this on Delicious" target="_blank" rel="nofollow">Delicious</a> &#8226; <a href="http://digg.com/submit?phase=2&#38;url=http%3A%2F%2Fwww.spylogic.net%2F2010%2F10%2Ftwo-new-social-media-security-white-papers-released%2F&#38;title=Two+New+Social+Media+Security+White+Papers+Released&#38;bodytext=My+employer+%28SecureState%29+has+released+two+white+papers+as+part+of+our+Social+Media+Security+Awareness+Month.+%C2%A0You+can+also+download+some+cool+wallpaper+for+this+month+created+by+Rob+our+graphic+designer+%28see+the+picture+on+the+right%29.+%C2%A0%3A-%29%0D%0A%0D%0AFirs" title="Submit this to Digg" target="_blank" rel="nofollow">Digg</a> &#8226; <a href="http://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.spylogic.net%2F2010%2F10%2Ftwo-new-social-media-security-white-papers-released%2F&#38;title=Two+New+Social+Media+Security+White+Papers+Released" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &#8226; <a href="http://www.spylogic.net/2010/10/two-new-social-media-security-white-papers-released/" title="Two New Social Media Security White Papers Released" target="_blank" rel="nofollow">Add to favorites</a> &#8226; <a href="mailto:tom@spylogic.net?subject=Two New Social Media Security White Papers Released&#38;body=My employer (SecureState) has released two white papers as part of our Social Media Security Awareness Month.  You can also download some cool wallpaper for this month created by Rob our graphic designer (see the picture on the right).  :-)

Firs - http://www.spylogic.net/2010/10/two-new-social-media-security-white-papers-released/" title="Email this" target="_blank" rel="nofollow">Email</a> &#8226; <a href="http://feeds2.feedburner.com/spylogic" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a><br />
<!-- End WP Socializer - Social Buttons - Output --></p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2010/10/13/two-new-social-media-security-white-papers-released/">Two New Social Media Security White Papers Released</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p><a href="http://www.spylogic.net/wp-content/uploads/2010/10/SecureStateSocialMedia_1024x768.jpg"><img class="size-thumbnail wp-image-528 alignright" title="SecureStateSocialMedia_1024x768" src="http://www.spylogic.net/wp-content/uploads/2010/10/SecureStateSocialMedia_1024x768-150x150.jpg" alt="" width="150" height="150" /></a>My employer (SecureState) has released two white papers as part of our <a href="http://www.securestate.com/Services/Profiling--Penetration/Offensive/Pages/SocialScan.aspx">Social Media Security Awareness Month</a>.  You can also <a href="http://www.securestate.com/MediaCenter/Pages/Wallpapers.aspx">download</a> some cool wallpaper for this month created by Rob our graphic designer (see the picture on the right).  <img src="https://s.w.org/images/core/emoji/12.0.0-1/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>First is some research several of my colleagues and I worked on.  The paper is titled: <strong>&#8220;Profiling User Passwords on Social Networks&#8221;</strong>.  The paper discusses the password problem that we all know and love as well as how you can determine passwords by what individuals post on their profiles.  We dive into tools from <a href="http://www.digininja.org/">Robin Wood</a>, Mark Baggett and others that can be used to pull keywords from profiles and other sources to create wordlists.  These wordlists can be used for brute force attacks on user accounts.  Next, we look at password complexity of several popular social networks with some research around brute force controls that some of the social networks have implemented, or in some cases haven&#8217;t.  Lastly, we discuss some things that users of social networks can do when choosing passwords.  <a href="http://www.securestate.com/Downloadables/Documents/Whitepapers/Profiling_User_Passwords_on_Social_Networks.pdf">You can download my paper here</a>.</p>
<p>The other paper released is titled: <strong>&#8220;Security Gaps in Social Media Websites for Children Open Door to Attackers Aiming To Prey On Children&#8221;</strong> by my colleague Scott White.  In his paper he looks at the security of social media websites specifically designed for children.  This is some very detailed research and sheds some light on how predators are using these sites to target children as well as some issues that are unique to these types of social media websites.  <a href="http://www.securestate.com/Downloadables/Documents/Whitepapers/Security_Gaps_in_Social_Media_Websites_for_Children.pdf">You can download Scott&#8217;s paper here</a>.</p>
<p>Speaking of social media&#8230;I&#8217;ll be presenting &#8220;Social Impact: Risks and Rewards of Social Media&#8221; at the <a href="https://www.informationsecuritysummit.org/">Information Security Summit </a>this Friday at 10am.  I&#8217;ll have the slide deck posted shortly after the conference.</p>
<h3>Share and Enjoy</h3>
<p><!-- Start WP Socializer - Social Buttons - Output --><br />
 &bull; <a href="http://www.facebook.com/share.php?u=http%3A%2F%2Fwww.spylogic.net%2F2010%2F10%2Ftwo-new-social-media-security-white-papers-released%2F&amp;t=Two+New+Social+Media+Security+White+Papers+Released" title="Share this on Facebook"  rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Two+New+Social+Media+Security+White+Papers+Released%20-%20http%3A%2F%2Fwww.spylogic.net%3Fp%3D527%20@agent0x0" title="Tweet this !"  rel="nofollow">Twitter</a> &bull; <a href="http://delicious.com/post?url=http%3A%2F%2Fwww.spylogic.net%2F2010%2F10%2Ftwo-new-social-media-security-white-papers-released%2F&amp;title=Two+New+Social+Media+Security+White+Papers+Released&amp;notes=My+employer+%28SecureState%29+has+released+two+white+papers+as+part+of+our+Social+Media+Security+Awareness+Month.+%C2%A0You+can+also+download+some+cool+wallpaper+for+this+month+created+by+Rob+our+graphic+designer+%28see+the+picture+on+the+right%29.+%C2%A0%3A-%29%0D%0A%0D%0AFirs" title="Post this on Delicious"  rel="nofollow">Delicious</a> &bull; <a href="http://digg.com/submit?phase=2&amp;url=http%3A%2F%2Fwww.spylogic.net%2F2010%2F10%2Ftwo-new-social-media-security-white-papers-released%2F&amp;title=Two+New+Social+Media+Security+White+Papers+Released&amp;bodytext=My+employer+%28SecureState%29+has+released+two+white+papers+as+part+of+our+Social+Media+Security+Awareness+Month.+%C2%A0You+can+also+download+some+cool+wallpaper+for+this+month+created+by+Rob+our+graphic+designer+%28see+the+picture+on+the+right%29.+%C2%A0%3A-%29%0D%0A%0D%0AFirs" title="Submit this to Digg"  rel="nofollow">Digg</a> &bull; <a href="http://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.spylogic.net%2F2010%2F10%2Ftwo-new-social-media-security-white-papers-released%2F&amp;title=Two+New+Social+Media+Security+White+Papers+Released" title="Submit this to StumbleUpon"  rel="nofollow">StumbleUpon</a> &bull; <a href="http://www.spylogic.net/2010/10/two-new-social-media-security-white-papers-released/" onclick="addBookmark(event);" title="Two New Social Media Security White Papers Released"  rel="nofollow">Add to favorites</a> &bull; <a href=%22mailto:tom@spylogic.net?subject=Two New Social Media Security White Papers Released&amp;body=My employer (SecureState) has released two white papers as part of our Social Media Security Awareness Month.  You can also download some cool wallpaper for this month created by Rob our graphic designer (see the picture on the right).  <img src="https://s.w.org/images/core/emoji/12.0.0-1/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" />

Firs - http://www.spylogic.net/2010/10/two-new-social-media-security-white-papers-released/" title="Email this"  rel="nofollow">Email</a> &bull; <a href="http://feeds2.feedburner.com/spylogic" title="Subscribe to RSS"  rel="nofollow">RSS</a><br />
<!-- End WP Socializer - Social Buttons - Output --></p>
<p><a href="http://feedads.g.doubleclick.net/~a/aY5kkyOJSlMEtnhOb2lDJPvGv3Q/0/da"><img src="http://feedads.g.doubleclick.net/~a/aY5kkyOJSlMEtnhOb2lDJPvGv3Q/0/di" border="0" ismap="true"></img></a><br />
<a href="http://feedads.g.doubleclick.net/~a/aY5kkyOJSlMEtnhOb2lDJPvGv3Q/1/da"><img src="http://feedads.g.doubleclick.net/~a/aY5kkyOJSlMEtnhOb2lDJPvGv3Q/1/di" border="0" ismap="true"></img></a></p>
<div class="feedflare">
<a href="http://feeds.feedburner.com/~ff/spylogic?a=W8eyEc-E90k:YmmxdHktHdM:V_sGLiPBpWU"><img src="http://feeds.feedburner.com/~ff/spylogic?i=W8eyEc-E90k:YmmxdHktHdM:V_sGLiPBpWU" border="0"></img></a> <a href="http://feeds.feedburner.com/~ff/spylogic?a=W8eyEc-E90k:YmmxdHktHdM:F7zBnMyn0Lo"><img src="http://feeds.feedburner.com/~ff/spylogic?i=W8eyEc-E90k:YmmxdHktHdM:F7zBnMyn0Lo" border="0"></img></a> <a href="http://feeds.feedburner.com/~ff/spylogic?a=W8eyEc-E90k:YmmxdHktHdM:gIN9vFwOqvQ"><img src="http://feeds.feedburner.com/~ff/spylogic?i=W8eyEc-E90k:YmmxdHktHdM:gIN9vFwOqvQ" border="0"></img></a>
</div>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F10%2F13%2Ftwo-new-social-media-security-white-papers-released%2F&amp;t=Two+New+Social+Media+Security+White+Papers+Released" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Two+New+Social+Media+Security+White+Papers+Released%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F10%2F13%2Ftwo-new-social-media-security-white-papers-released%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F10%2F13%2Ftwo-new-social-media-security-white-papers-released%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F10%2F13%2Ftwo-new-social-media-security-white-papers-released%2F&amp;title=Two+New+Social+Media+Security+White+Papers+Released&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=My+employer+%28SecureState%29+has+released+two+white+papers+as+part+of+our+Social+Media+Security+Awareness+Month.+%C2%A0You+can+also+download+some+cool+wallpaper+for+this+month+created+by+Rob+our+graphic+designer+%28see+the+picture+on+the+right%29.+%C2%A0%3A-%29+First+is+some+research+several+of+my+colleagues%C2%A0and+I+worked+on.+%C2%A0The+paper+is+titled%3A+%5B...%5DShare+and+Enjoy%0A%0A%0A+%26bull%3B+Facebook+%26bull%3B+Twitter+%26bull%3B+Delicious+%26bull%3B+Digg+%26bull%3B+StumbleUpon+%26bull%3B+Add+to+favorites+%26bull%3B+Email+%26bull%3B+RSS" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F10%2F13%2Ftwo-new-social-media-security-white-papers-released%2F&amp;title=Two+New+Social+Media+Security+White+Papers+Released" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2010/10/13/two-new-social-media-security-white-papers-released/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Two+New+Social+Media+Security+White+Papers+Released&body=My+employer+%28SecureState%29+has+released+two+white+papers+as+part+of+our+Social+Media+Security+Awareness+Month.+%C2%A0You+can+also+download+some+cool+wallpaper+for+this+month+created+by+Rob+our+graphic+designer+%28see+the+picture+on+the+right%29.+%C2%A0%3A-%29+First+is+some+research+several+of+my+colleagues%C2%A0and+I+worked+on.+%C2%A0The+paper+is+titled%3A+%5B...%5DShare+and+Enjoy%0A%0A%0A+%26bull%3B+Facebook+%26bull%3B+Twitter+%26bull%3B+Delicious+%26bull%3B+Digg+%26bull%3B+StumbleUpon+%26bull%3B+Add+to+favorites+%26bull%3B+Email+%26bull%3B+RSS%20-%20https://socialmediasecurity.com/2010/10/13/two-new-social-media-security-white-papers-released/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2010/10/13/two-new-social-media-security-white-papers-released/">Two New Social Media Security White Papers Released</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
										<dc:creator>feedback@socialmediasecurity.com (Tom)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>My employer (SecureState) has released two white papers as part of our Social Media Security Awareness Month.  You can also download some cool wallpaper for this month created by Rob our graphic designer (see the picture on the right).  :-) First is some research several of my colleagues and I worked on.  The paper is titled: [...] Share and Enjoy &amp;#8226; Facebook &amp;#8226; Twitter &amp;#8226; Delicious &amp;#8226; Digg &amp;#8226; StumbleUpon &amp;#8226; Add to favorites &amp;#8226; Email &amp;#8226; RSS The post Two New Social Media Security White Papers Released appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>My employer (SecureState) has released two white papers as part of our Social Media Security Awareness Month.  You can also download some cool wallpaper for this month created by Rob our graphic designer (see the picture on the right).  :-) First is some research several of my colleagues and I worked on.  The paper is titled: [...] Share and Enjoy &amp;#8226; Facebook &amp;#8226; Twitter &amp;#8226; Delicious &amp;#8226; Digg &amp;#8226; StumbleUpon &amp;#8226; Add to favorites &amp;#8226; Email &amp;#8226; RSS The post Two New Social Media Security White Papers Released appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Instant Personalization Program Gets New Partner, Security Issue</title>
		<link>https://socialmediasecurity.com/2010/09/21/instant-personalization-program-gets-new-partner-security-issue/</link>
				<pubDate>Tue, 21 Sep 2010 16:46:27 +0000</pubDate>
		
				<category><![CDATA[Contributors]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[socnetsec]]></category>

		<guid isPermaLink="false">http://theharmonyguy.com/?p=991</guid>
				<description><![CDATA[<p>Facebook announced last week that movie information site Rotten Tomatoes would join Docs.com, Pandora, and Yelp as a partner in the social networking service&#8217;s &#8220;instant personalization&#8221; program. Rotten Tomatoes will now be able to automatically identify and access public information for visitors logged in to Facebook, unless those users have opted out of the program. [...]</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2010/09/21/instant-personalization-program-gets-new-partner-security-issue/">Instant Personalization Program Gets New Partner, Security Issue</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>Facebook announced last week that movie information site Rotten Tomatoes would join Docs.com, Pandora, and Yelp as a partner in the social networking service&#8217;s &#8220;instant personalization&#8221; program. Rotten Tomatoes will now be able to automatically identify and access public information for visitors logged in to Facebook, unless those users have opted out of the program. This marks the first new partner since Facebook launched the feature earlier this year.</p>
<p>Soon after that initial roll-out, security researchers noted vulnerabilities on Yelp&#8217;s website that allowed an attacker to craft pages which would hijack Yelp&#8217;s credentials and gain the same level of access to user data. TechCrunch writer Jason Kincaid <a title="Yelp Security Hole Puts Facebook User Data At Risk, Underscores Problems With ‘Instant Personalization’" href="http://techcrunch.com/2010/05/11/yelp-security-hole-puts-facebook-user-data-at-risk-underscores-problems-with-instant-personalization/">reported</a> on the cross-site scripting (XSS) holes, and made <a title="Another Security Hole Found On Yelp, Facebook Data Once Again Put At Risk" href="http://techcrunch.com/2010/05/11/another-security-hole-found-on-yelp-facebook-data-once-again-put-at-risk/">this prediction</a>: &#8220;I suspect we’ll see similar exploits on Facebook partner sites in the future.&#8221;</p>
<p>Kincaid&#8217;s suspicions have now been confirmed, as the latest site with instant personalization also had an exploitable XSS vulnerability, which has now been patched. I&#8217;ll quickly add that Flixster, the company behind Rotten Tomatoes, has always been very responsive when I&#8217;ve contacted them about security issues. They have assured me that they have done XSS testing and prevention, which is more than could be said for many web developers. In posting about this issue, I primarily want to illustrate a larger point about web security.</p>
<p><span id="more-991"></span>When I heard about the expansion of instant personalization, I took a look at Rotten Tomatoes to see if any XSS problems might arise. I found one report of an old hole, but it appeared to be patched. After browsing around for a bit, though, I discovered a way I could insert some text into certain pages. At first it appeared that the site properly escaped any characters which could lead to an exploit. But ironically enough, certain unfiltered characters affected a third-party script used by the site in such a way that one could then execute arbitrary scripts. Since I had not seen this hole documented anywhere, I reported it to Rotten Tomatoes, and they promptly worked to fix it.</p>
<p>I&#8217;ve long argued that as more sites integrate with Facebook in more ways, we&#8217;ll see this type of problem become more common. Vulnerable applications built on the Facebook Platform provided new avenues for accessing and hijacking user accounts; now external websites that connect to Facebook open more possible security issues. As Kincaid noted in May, &#8220;Given how common XSS vulnerabilities are, if Facebook expands the program we can likely expect similar exploits. It’s also worth pointing out that some large sites with many Facebook Connect users &#8211; like Farmville.com or CNN &#8211; could also be susceptible to similar security problems. In short, the system just isn’t very secure.&#8221;</p>
<p>Overcoming such weaknesses is not a trivial matter, though, especially given the current architecture of how scripts are handled in a web page. Currently, any included script has essentially the same level of access and control as any other script on the page, including malicious code injected via an XSS vulnerability. If a site uses instant personalization, injected scripts can access the data used by Facebook&#8217;s code to enable social features. That&#8217;s not Facebook&#8217;s fault, and it would be difficult to avoid in any single sign-on infrastructure.</p>
<p>Of course, all of this applies to scripts intentionally included in the page as well, such as ad networks. With the Rotten Tomatoes roll-out, Facebook <a title="Facebook Expands Instant Personalization Program, Adds Rotten Tomatoes As Partner" href="http://techcrunch.com/2010/09/17/facebook-expands-instant-personalization-program-adds-rotten-tomatoes-as-partner/">made clear</a> that &#8220;User data is never transferred to ad networks.&#8221; Also, &#8220;Partner sites follow clear product/security/privacy guidelines,&#8221; and I assume Facebook is monitoring their usage. I&#8217;m not disputing any of these claims &#8211; Facebook is quite correct that advertisers are not getting user data.</p>
<p>But that&#8217;s due to policy limitations, not technical restrictions. Rotten Tomatoes includes a number of scripts from external sources for displaying ads or providing various functions. Any of these scripts could theoretically access a Facebook user&#8217;s information, though it would almost certainly be removed in short order. I did find it interesting that an external link-sharing widget on the site builds an array of links on the page, including the link to a user&#8217;s Facebook profile. This happens client-side, though, and the data is never actually transferred to another server.</p>
<p>I bring up these aspects simply to note the technical challenges involved in this sort of federated system. I think it&#8217;s very possible that we will eventually see ad network code on a Facebook-integrated site that tries to load available user data. After all, I&#8217;ve observed that behavior in many Facebook applications over the last few years &#8211; even after Facebook issued explicit policies against such hijacking.</p>
<p>These dangers are part of the reason why JavaScript guru Douglas Crockford has declared security to be the number one problem with the World Wide Web today. Crockford has even advocated that we halt HTML5 development and focus on improving security in the browser first. While that won&#8217;t likely happen, I think Crockford&#8217;s concerns are justified and that many web developers have yet to realize how dangerous cross-site scripting can be. Perhaps these issues with instant personalization sites will help increase awareness and understanding of the threat.</p>
<p><strong>Postscript:</strong> This morning, an XSS vulnerability on Twitter led to script-based worms (somewhat reminiscent of &#8220;samy is my hero&#8221;) and general havoc across the site. This particular incident was not related to any mashups, but once again emphasizes the real-world security ramifications of cross-site scripting in a world of mainstream web applications.</p>
<p><strong>Update (Sep. 27):</strong> Today news broke that Scribd had also become part of Facebook&#8217;s Instant Personalization program. I took a look at the site and discovered within minutes that it has a quite trivial XSS vulnerability. This particular issue should have been obvious given even a basic understanding of application security. It also indicates that Facebook is not doing much to evaluate the security of new instant personalization partners. <strong>Update 2:</strong> Scribd patched the most obvious XSS issue right about the time I updated this post: entering HTML into the search box brought up a page that loaded it unfiltered. Another search issue remained, however: starting with a closing script tag would still affect code later in the results page. After about half an hour, that problem was also patched. I&#8217;m glad Scribd moved so quickly to fix these problems, but I still find it disconcerting they were there to start with. I&#8217;ve not done any further checking for other XSS issues.</p>
<div class="feedflare">
<a href="http://feeds.feedburner.com/~ff/theharmonyguy?a=jG1vElFqZQo:caJx1B6pFII:YwkR-u9nhCs"><img src="http://feeds.feedburner.com/~ff/theharmonyguy?d=YwkR-u9nhCs" border="0"></img></a>
</div>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F09%2F21%2Finstant-personalization-program-gets-new-partner-security-issue%2F&amp;t=Instant+Personalization+Program+Gets+New+Partner%2C+Security+Issue" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Instant+Personalization+Program+Gets+New+Partner%2C+Security+Issue%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F09%2F21%2Finstant-personalization-program-gets-new-partner-security-issue%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F09%2F21%2Finstant-personalization-program-gets-new-partner-security-issue%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F09%2F21%2Finstant-personalization-program-gets-new-partner-security-issue%2F&amp;title=Instant+Personalization+Program+Gets+New+Partner%2C+Security+Issue&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=Facebook+announced+last+week+that+movie+information+site+Rotten+Tomatoes+would+join+Docs.com%2C+Pandora%2C+and+Yelp+as+a+partner+in+the+social+networking+service%26%238217%3Bs+%26%238220%3Binstant+personalization%26%238221%3B+program.+Rotten+Tomatoes+will+now+be+able+to+automatically+identify+and+access+public+information+for+visitors+logged+in+to+Facebook%2C+unless+those+users+have+opted+out+of+the+program.+%5B...%5D" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F09%2F21%2Finstant-personalization-program-gets-new-partner-security-issue%2F&amp;title=Instant+Personalization+Program+Gets+New+Partner%2C+Security+Issue" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2010/09/21/instant-personalization-program-gets-new-partner-security-issue/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Instant+Personalization+Program+Gets+New+Partner%2C+Security+Issue&body=Facebook+announced+last+week+that+movie+information+site+Rotten+Tomatoes+would+join+Docs.com%2C+Pandora%2C+and+Yelp+as+a+partner+in+the+social+networking+service%26%238217%3Bs+%26%238220%3Binstant+personalization%26%238221%3B+program.+Rotten+Tomatoes+will+now+be+able+to+automatically+identify+and+access+public+information+for+visitors+logged+in+to+Facebook%2C+unless+those+users+have+opted+out+of+the+program.+%5B...%5D%20-%20https://socialmediasecurity.com/2010/09/21/instant-personalization-program-gets-new-partner-security-issue/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2010/09/21/instant-personalization-program-gets-new-partner-security-issue/">Instant Personalization Program Gets New Partner, Security Issue</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
										<dc:creator>feedback@socialmediasecurity.com (theharmonyguy)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Facebook announced last week that movie information site Rotten Tomatoes would join Docs.com, Pandora, and Yelp as a partner in the social networking service&amp;#8217;s &amp;#8220;instant personalization&amp;#8221; program. Rotten Tomatoes will now be able to automatically identify and access public information for visitors logged in to Facebook, unless those users have opted out of the program. [...] The post Instant Personalization Program Gets New Partner, Security Issue appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>Facebook announced last week that movie information site Rotten Tomatoes would join Docs.com, Pandora, and Yelp as a partner in the social networking service&amp;#8217;s &amp;#8220;instant personalization&amp;#8221; program. Rotten Tomatoes will now be able to automatically identify and access public information for visitors logged in to Facebook, unless those users have opted out of the program. [...] The post Instant Personalization Program Gets New Partner, Security Issue appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Link Hygiene – the same old risks apply to newly launched services like Ping for iTunes</title>
		<link>https://socialmediasecurity.com/2010/09/05/link-hygiene-the-same-old-risks-apply-to-newly-launched-services-like-ping-for-itunes/</link>
				<pubDate>Sun, 05 Sep 2010 16:57:50 +0000</pubDate>
		
				<category><![CDATA[Contributors]]></category>

		<guid isPermaLink="false">http://socialmediasecurity.com/?p=2496</guid>
				<description><![CDATA[<p><img src="http://www.streetwise-security-zone.com/l1/streetwise/appdata/blog/00000171.jpg" border="0" vspace="5" hspace="5" align="left"> </p>
<p style="text-align: justify"><span style="font-size: small">As  each major player in today's technology and Web-connected world makes a  move to get a bigger piece of the social networking pie, they take on  new risks they haven't seen before. But if they only looked around,  they'd be able to see and learn from the mistakes of others.</p>
<p></span><span style="font-size: small">This  week Apple launched "Ping", a new social network that serves the iTunes  community. But they don't seem to have learned much from those that  have ventured into this space before them. The Ping forums are being  bombarded with spam posts containing phishing links. As blogger <em>Chester Wisniewski</em>, from antivirus maker Sophos points out, "Did they not see this coming?" (click <a title="Chester Wisniewski of Sophos on iTunes Ping spam problems" href="http://www.sophos.com/blogs/chetw/g/2010/09/02/apple-pingd-comment-spam-coming/">HERE</a>).</p>
<p></span><span style="font-size: small">While  Apple should have anticipated the problems, and tried a bit harder to  protect legitimate users from this unwanted content, my advice to users  is the same as for any social network: <em><strong>Use good link hygiene</strong></em>.<strong></p>
<p>What is Good Link Hygiene?</strong><br /></span></p>
<p style="text-align: justify"><span style="font-size: small">Link  hygiene is something we all need to practice on a daily basis, whether  it's while we're reading Email or browsing social networks. It's about  avoiding the risks associated with malicious sites and content, as well  as malicious file attachments.</span></p>
<p style="text-align: justify"><span style="font-size: small">There   are many different ways in which hackers and scammers can trick you  into  giving them access to valuable information and computer resources.</span></p>
<p style="text-align: justify"><span style="font-size: small">Here  are four of the nine items I teach people to check for when it comes to  link hygiene which can reduce the risks of becoming a victim from  malicious content in Email and websites:</span></p>
<p style="padding-left: 30px"><span style="font-size: small">1)	Are your Email configuration options set to disable previewing of content or loading of images?</span></p>
<p style="padding-left: 30px"><span style="font-size: small">2)	Is your computer&#8217;s operating system and application software (e.g. browser, Adobe Reader) up to date?</span></p>
<p style="padding-left: 30px"><span style="font-size: small">3)	Do you have a reputable anti-malware product with up to date patches and virus signatures on your computer?</span></p>
<p style="padding-left: 30px"><span style="font-size: small">4)	Do you know what your anti-malware product&#8217;s alerts look like, so you can recognize most fake virus alerts?</span></p>
<p><span style="font-size: x-small"><span style="font-size: small">&#160;So,  Apple - as well as other social networks - should take some blame for  allowing their social network to become polluted with malicious content. </span></span><span style="font-size: x-small"><span style="font-size: small">However, it's almost impossible for sites to eliminate these risks entirely. I</span></span><span style="font-size: x-small"><span style="font-size: small">t's up to us, the users, to stay vigilant, and know how to avoid becoming a victim. </span><br /></span></p>
<hr />
<p><span style="font-size: x-small">If  you're a Business Premium member of the Streetwise Security Zone, you  can download the PDF version of this month's coaching content on Link  Hygiene by clicking <a href="http://www.streetwise-security-zone.com/members/streetwise/files/download+Premium-coaching/A4-Link-Hygiene-August-2010-2.pdf">HERE</a>.  This lesson includes a discussion of the various ways in which hackers  and spammers try to trick you into going to malicious sites or entering  sensitive information into fake forms.<br /></span></p>
<hr />
<p><em>I am now offering monthly briefings, tailored to organizations that want to build and sustain security awareness for staff. Just because your security team is too busy to do its own training and awareness doesn't mean you can't have an economical way to address human security risks. Please call or email me at the coordinates below...</em><em></em></p>
<p><em><strong>Scott Wright</strong></em></p>
<p><span style="font-size: x-small">The Streetwise Security Coach</span></p>
<p>Join the Streetwise Security Zone at:<a title="Join the Streetwise  Security Zone" href="http://www.streetwise-security-zone.com/join.html"><br />http://www.streetwise-security-zone.com/join.html</a></p>
<p>Phone: 1-613-693-0997<br />Email: scott@streetwise-security-zone.com<br />Twitter ID: <a href="http://www.twitter.com/streetsec">http://www.twitter.com/streetsec</a></p>
<p><span style="font-size: x-small"><span style="font-family: times new roman,times">To receive weekly security tips and other notices about helpful content available on this site, please make sure you are on my list by clicking <a title="Free Weekly Streetwise Security Tips Newsletter Signup" href="http://www.streetwise-security-zone.com/members/streetwise/adminpages/weeklytips-signup">HERE</a>, and entering your name and email address.</span></span></p>
<p>&#160;</p>
<p>&#160;</p>
<p><!-- Site Meter --> <a href="http://s49.sitemeter.com/stats.asp?site=s49sw4sw" target="_top"> <img src="http://s49.sitemeter.com/meter.asp?site=s49sw4sw" alt="Site Meter" border="0" /></a> <!-- Copyright (c)2006 Site Meter --></p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2010/09/05/link-hygiene-the-same-old-risks-apply-to-newly-launched-services-like-ping-for-itunes/">Link Hygiene &#8211; the same old risks apply to newly launched services like Ping for iTunes</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p><img src="http://www.streetwise-security-zone.com/l1/streetwise/appdata/blog/00000171.jpg" border=0 vspace=5 hspace=5 align=left> </p>
<p style="text-align: justify;"><span style="font-size: small;">As  each major player in today&#8217;s technology and Web-connected world makes a  move to get a bigger piece of the social networking pie, they take on  new risks they haven&#8217;t seen before. But if they only looked around,  they&#8217;d be able to see and learn from the mistakes of others.</p>
<p></span><span style="font-size: small;">This  week Apple launched &#8220;Ping&#8221;, a new social network that serves the iTunes  community. But they don&#8217;t seem to have learned much from those that  have ventured into this space before them. The Ping forums are being  bombarded with spam posts containing phishing links. As blogger <em>Chester Wisniewski</em>, from antivirus maker Sophos points out, &#8220;Did they not see this coming?&#8221; (click <a title="Chester Wisniewski of Sophos on iTunes Ping spam problems" href="http://www.sophos.com/blogs/chetw/g/2010/09/02/apple-pingd-comment-spam-coming/">HERE</a>).</p>
<p></span><span style="font-size: small;">While  Apple should have anticipated the problems, and tried a bit harder to  protect legitimate users from this unwanted content, my advice to users  is the same as for any social network: <em><strong>Use good link hygiene</strong></em>.<strong></p>
<p>What is Good Link Hygiene?</strong><br /></span></p>
<p style="text-align: justify;"><span style="font-size: small;">Link  hygiene is something we all need to practice on a daily basis, whether  it&#8217;s while we&#8217;re reading Email or browsing social networks. It&#8217;s about  avoiding the risks associated with malicious sites and content, as well  as malicious file attachments.</span></p>
<p style="text-align: justify;"><span style="font-size: small;">There   are many different ways in which hackers and scammers can trick you  into  giving them access to valuable information and computer resources.</span></p>
<p style="text-align: justify;"><span style="font-size: small;">Here  are four of the nine items I teach people to check for when it comes to  link hygiene which can reduce the risks of becoming a victim from  malicious content in Email and websites:</span></p>
<p style="padding-left: 30px;"><span style="font-size: small;">1)	Are your Email configuration options set to disable previewing of content or loading of images?</span></p>
<p style="padding-left: 30px;"><span style="font-size: small;">2)	Is your computer&rsquo;s operating system and application software (e.g. browser, Adobe Reader) up to date?</span></p>
<p style="padding-left: 30px;"><span style="font-size: small;">3)	Do you have a reputable anti-malware product with up to date patches and virus signatures on your computer?</span></p>
<p style="padding-left: 30px;"><span style="font-size: small;">4)	Do you know what your anti-malware product&rsquo;s alerts look like, so you can recognize most fake virus alerts?</span></p>
<p><span style="font-size: x-small;"><span style="font-size: small;">&nbsp;So,  Apple &#8211; as well as other social networks &#8211; should take some blame for  allowing their social network to become polluted with malicious content. </span></span><span style="font-size: x-small;"><span style="font-size: small;">However, it&#8217;s almost impossible for sites to eliminate these risks entirely. I</span></span><span style="font-size: x-small;"><span style="font-size: small;">t&#8217;s up to us, the users, to stay vigilant, and know how to avoid becoming a victim. </span><br /></span></p>
<hr />
<p><span style="font-size: x-small;">If  you&#8217;re a Business Premium member of the Streetwise Security Zone, you  can download the PDF version of this month&#8217;s coaching content on Link  Hygiene by clicking <a href="http://www.streetwise-security-zone.com/members/streetwise/files/download+Premium-coaching/A4-Link-Hygiene-August-2010-2.pdf">HERE</a>.  This lesson includes a discussion of the various ways in which hackers  and spammers try to trick you into going to malicious sites or entering  sensitive information into fake forms.<br /></span></p>
<hr />
<p><em>I am now offering monthly briefings, tailored to organizations that want to build and sustain security awareness for staff. Just because your security team is too busy to do its own training and awareness doesn&#8217;t mean you can&#8217;t have an economical way to address human security risks. Please call or email me at the coordinates below&#8230;</em><em></em></p>
<p><em><strong>Scott Wright</strong></em></p>
<p><span style="font-size: x-small;">The Streetwise Security Coach</span></p>
<p>Join the Streetwise Security Zone at:<a title="Join the Streetwise  Security Zone" href="http://www.streetwise-security-zone.com/join.html"><br />http://www.streetwise-security-zone.com/join.html</a></p>
<p>Phone: 1-613-693-0997<br />Email: scott@streetwise-security-zone.com<br />Twitter ID: <a href="http://www.twitter.com/streetsec">http://www.twitter.com/streetsec</a></p>
<p><span style="font-size: x-small;"><span style="font-family: times new roman,times;">To receive weekly security tips and other notices about helpful content available on this site, please make sure you are on my list by clicking <a title="Free Weekly Streetwise Security Tips Newsletter Signup" href="http://www.streetwise-security-zone.com/members/streetwise/adminpages/weeklytips-signup">HERE</a>, and entering your name and email address.</span></span></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><!-- Site Meter --> <a href="http://s49.sitemeter.com/stats.asp?site=s49sw4sw" > <img src="http://s49.sitemeter.com/meter.asp?site=s49sw4sw" alt="Site Meter" border="0" /></a> <!-- Copyright (c)2006 Site Meter --></p>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F09%2F05%2Flink-hygiene-the-same-old-risks-apply-to-newly-launched-services-like-ping-for-itunes%2F&amp;t=Link+Hygiene+%E2%80%93+the+same+old+risks+apply+to+newly+launched+services+like+Ping+for+iTunes" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Link+Hygiene+%E2%80%93+the+same+old+risks+apply+to+newly+launched+services+like+Ping+for+iTunes%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F09%2F05%2Flink-hygiene-the-same-old-risks-apply-to-newly-launched-services-like-ping-for-itunes%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F09%2F05%2Flink-hygiene-the-same-old-risks-apply-to-newly-launched-services-like-ping-for-itunes%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F09%2F05%2Flink-hygiene-the-same-old-risks-apply-to-newly-launched-services-like-ping-for-itunes%2F&amp;title=Link+Hygiene+%E2%80%93+the+same+old+risks+apply+to+newly+launched+services+like+Ping+for+iTunes&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=As++each+major+player+in+today%27s+technology+and+Web-connected+world+makes+a++move+to+get+a+bigger+piece+of+the+social+networking+pie%2C+they+take+on++new+risks+they+haven%27t+seen+before.+But+if+they+only+looked+around%2C++they%27d+be+able+to+see+and+learn+from+the+mistakes+of+others.This++week+Apple+launched+%22Ping%22%2C+a+new+social+network+that+serves+the+iTunes++community.+But+they+don%27t+seem+to+have+learned+much+from+those+that++have+ventured+into+this+space+before+them.+The+Ping+forums+are+being++bombarded+with+spam+posts+containing+phishing+links.+As+blogger+Chester+Wisniewski%2C+from+antivirus+maker+Sophos+points+out%2C+%22Did+they+not+see+this+coming%3F%22+%28click+HERE%29.While++Apple+should+have+anticipated+the+problems%2C+and+tried+a+bit+harder+to++protect+legitimate+users+from+this+unwanted+content%2C+my+advice+to+users++is+the+same+as+for+any+social+network%3A+Use+good+link+hygiene.What+is+Good+Link+Hygiene%3F%0ALink++hygiene+is+something+we+all+need+to+practice+on+a+daily+basis%2C+whether++it%27s+while+we%27re+reading+Email+or+browsing+social+networks.+It%27s+about++avoiding+the+risks+associated+with+malicious+sites+and+content%2C+as+well++as+malicious+file+attachments.%0AThere+++are+many+different+ways+in+which+hackers+and+scammers+can+trick+you++into++giving+them+access+to+valuable+information+and+computer+resources.%0AHere++are+four+of+the+nine+items+I+teach+people+to+check+for+when+it+comes+to++link+hygiene+which+can+reduce+the+risks+of+becoming+a+victim+from++malicious+content+in+Email+and+websites%3A%0A1%29%09Are+your+Email+configuration+options+set+to+disable+previewing+of+content+or+loading+of+images%3F%0A2%29%09Is+your+computer%26rsquo%3Bs+operating+system+and+application+software+%28e.g.+browser%2C+Adobe+Reader%29+up+to+date%3F%0A3%29%09Do+you+have+a+reputable+anti-malware+product+with+up+to+date+patches+and+virus+signatures+on+your+computer%3F%0A4%29%09Do+you+know+what+your+anti-malware+product%26rsquo%3Bs+alerts+look+like%2C+so+you+can+recognize+most+fake+virus+alerts%3F%0A%26nbsp%3BSo%2C++Apple+-+as+well+as+other+social+networks+-+should+take+some+blame+for++allowing+their+social+network+to+become+polluted+with+malicious+content.+However%2C+it%27s+almost+impossible+for+sites+to+eliminate+these+risks+entirely.+It%27s+up+to+us%2C+the+users%2C+to+stay+vigilant%2C+and+know+how+to+avoid+becoming+a+victim.+%0A%0AIf++you%27re+a+Business+Premium+member+of+the+Streetwise+Security+Zone%2C+you++can+download+the+PDF+version+of+this+month%27s+coaching+content+on+Link++Hygiene+by+clicking+HERE.++This+lesson+includes+a+discussion+of+the+various+ways+in+which+hackers++and+spammers+try+to+trick+you+into+going+to+malicious+sites+or+entering++sensitive+information+into+fake+forms.%0AI+am+now+offering+monthly+briefings%2C+tailored+to+organizations+that+want+to+build+and+sustain+security+awareness+for+staff.+Just+because+your+security+team+is+too+busy+to+do+its+own+training+and+awareness+doesn%27t+mean+you+can%27t+have+an+economical+way+to+address+human+security+risks.+Please+call+or+email+me+at+the+coordinates+below...%0AScott+Wright%0AThe+Streetwise+Security+Coach%0AJoin+the+Streetwise+Security+Zone+at%3Ahttp%3A%2F%2Fwww.streetwise-security-zone.com%2Fjoin.html%0APhone%3A+1-613-693-0997Email%3A+scott%40streetwise-security-zone.comTwitter+ID%3A+http%3A%2F%2Fwww.twitter.com%2Fstreetsec%0ATo+receive+weekly+security+tips+and+other+notices+about+helpful+content+available+on+this+site%2C+please+make+sure+you+are+on+my+list+by+clicking+HERE%2C+and+entering+your+name+and+email+address.%0A%26nbsp%3B%0A%26nbsp%3B" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F09%2F05%2Flink-hygiene-the-same-old-risks-apply-to-newly-launched-services-like-ping-for-itunes%2F&amp;title=Link+Hygiene+%E2%80%93+the+same+old+risks+apply+to+newly+launched+services+like+Ping+for+iTunes" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2010/09/05/link-hygiene-the-same-old-risks-apply-to-newly-launched-services-like-ping-for-itunes/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Link+Hygiene+%E2%80%93+the+same+old+risks+apply+to+newly+launched+services+like+Ping+for+iTunes&body=As++each+major+player+in+today%27s+technology+and+Web-connected+world+makes+a++move+to+get+a+bigger+piece+of+the+social+networking+pie%2C+they+take+on++new+risks+they+haven%27t+seen+before.+But+if+they+only+looked+around%2C++they%27d+be+able+to+see+and+learn+from+the+mistakes+of+others.This++week+Apple+launched+%22Ping%22%2C+a+new+social+network+that+serves+the+iTunes++community.+But+they+don%27t+seem+to+have+learned+much+from+those+that++have+ventured+into+this+space+before+them.+The+Ping+forums+are+being++bombarded+with+spam+posts+containing+phishing+links.+As+blogger+Chester+Wisniewski%2C+from+antivirus+maker+Sophos+points+out%2C+%22Did+they+not+see+this+coming%3F%22+%28click+HERE%29.While++Apple+should+have+anticipated+the+problems%2C+and+tried+a+bit+harder+to++protect+legitimate+users+from+this+unwanted+content%2C+my+advice+to+users++is+the+same+as+for+any+social+network%3A+Use+good+link+hygiene.What+is+Good+Link+Hygiene%3F%0ALink++hygiene+is+something+we+all+need+to+practice+on+a+daily+basis%2C+whether++it%27s+while+we%27re+reading+Email+or+browsing+social+networks.+It%27s+about++avoiding+the+risks+associated+with+malicious+sites+and+content%2C+as+well++as+malicious+file+attachments.%0AThere+++are+many+different+ways+in+which+hackers+and+scammers+can+trick+you++into++giving+them+access+to+valuable+information+and+computer+resources.%0AHere++are+four+of+the+nine+items+I+teach+people+to+check+for+when+it+comes+to++link+hygiene+which+can+reduce+the+risks+of+becoming+a+victim+from++malicious+content+in+Email+and+websites%3A%0A1%29%09Are+your+Email+configuration+options+set+to+disable+previewing+of+content+or+loading+of+images%3F%0A2%29%09Is+your+computer%26rsquo%3Bs+operating+system+and+application+software+%28e.g.+browser%2C+Adobe+Reader%29+up+to+date%3F%0A3%29%09Do+you+have+a+reputable+anti-malware+product+with+up+to+date+patches+and+virus+signatures+on+your+computer%3F%0A4%29%09Do+you+know+what+your+anti-malware+product%26rsquo%3Bs+alerts+look+like%2C+so+you+can+recognize+most+fake+virus+alerts%3F%0A%26nbsp%3BSo%2C++Apple+-+as+well+as+other+social+networks+-+should+take+some+blame+for++allowing+their+social+network+to+become+polluted+with+malicious+content.+However%2C+it%27s+almost+impossible+for+sites+to+eliminate+these+risks+entirely.+It%27s+up+to+us%2C+the+users%2C+to+stay+vigilant%2C+and+know+how+to+avoid+becoming+a+victim.+%0A%0AIf++you%27re+a+Business+Premium+member+of+the+Streetwise+Security+Zone%2C+you++can+download+the+PDF+version+of+this+month%27s+coaching+content+on+Link++Hygiene+by+clicking+HERE.++This+lesson+includes+a+discussion+of+the+various+ways+in+which+hackers++and+spammers+try+to+trick+you+into+going+to+malicious+sites+or+entering++sensitive+information+into+fake+forms.%0AI+am+now+offering+monthly+briefings%2C+tailored+to+organizations+that+want+to+build+and+sustain+security+awareness+for+staff.+Just+because+your+security+team+is+too+busy+to+do+its+own+training+and+awareness+doesn%27t+mean+you+can%27t+have+an+economical+way+to+address+human+security+risks.+Please+call+or+email+me+at+the+coordinates+below...%0AScott+Wright%0AThe+Streetwise+Security+Coach%0AJoin+the+Streetwise+Security+Zone+at%3Ahttp%3A%2F%2Fwww.streetwise-security-zone.com%2Fjoin.html%0APhone%3A+1-613-693-0997Email%3A+scott%40streetwise-security-zone.comTwitter+ID%3A+http%3A%2F%2Fwww.twitter.com%2Fstreetsec%0ATo+receive+weekly+security+tips+and+other+notices+about+helpful+content+available+on+this+site%2C+please+make+sure+you+are+on+my+list+by+clicking+HERE%2C+and+entering+your+name+and+email+address.%0A%26nbsp%3B%0A%26nbsp%3B%20-%20https://socialmediasecurity.com/2010/09/05/link-hygiene-the-same-old-risks-apply-to-newly-launched-services-like-ping-for-itunes/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2010/09/05/link-hygiene-the-same-old-risks-apply-to-newly-launched-services-like-ping-for-itunes/">Link Hygiene &#8211; the same old risks apply to newly launched services like Ping for iTunes</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
										<dc:creator>feedback@socialmediasecurity.com (Scott Wright's Security Views)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>As each major player in today's technology and Web-connected world makes a move to get a bigger piece of the social networking pie, they take on new risks they haven't seen before. But if they only looked around, they'd be able to see and learn from the mistakes of others. This week Apple launched "Ping", a new social network that serves the iTunes community. But they don't seem to have learned much from those that have ventured into this space before them. The Ping forums are being bombarded with spam posts containing phishing links. As blogger Chester Wisniewski, from antivirus maker Sophos points out, "Did they not see this coming?" (click HERE). While Apple should have anticipated the problems, and tried a bit harder to protect legitimate users from this unwanted content, my advice to users is the same as for any social network: Use good link hygiene. What is Good Link Hygiene? Link hygiene is something we all need to practice on a daily basis, whether it's while we're reading Email or browsing social networks. It's about avoiding the risks associated with malicious sites and content, as well as malicious file attachments. There are many different ways in which hackers and scammers can trick you into giving them access to valuable information and computer resources. Here are four of the nine items I teach people to check for when it comes to link hygiene which can reduce the risks of becoming a victim from malicious content in Email and websites: 1) Are your Email configuration options set to disable previewing of content or loading of images? 2) Is your computer&amp;#8217;s operating system and application software (e.g. browser, Adobe Reader) up to date? 3) Do you have a reputable anti-malware product with up to date patches and virus signatures on your computer? 4) Do you know what your anti-malware product&amp;#8217;s alerts look like, so you can recognize most fake virus alerts? &amp;#160;So, Apple - as well as other social networks - should take some blame for allowing their social network to become polluted with malicious content. However, it's almost impossible for sites to eliminate these risks entirely. It's up to us, the users, to stay vigilant, and know how to avoid becoming a victim. If you're a Business Premium member of the Streetwise Security Zone, you can download the PDF version of this month's coaching content on Link Hygiene by clicking HERE. This lesson includes a discussion of the various ways in which hackers and spammers try to trick you into going to malicious sites or entering sensitive information into fake forms. I am now offering monthly briefings, tailored to organizations that want to build and sustain security awareness for staff. Just because your security team is too busy to do its own training and awareness doesn't mean you can't have an economical way to address human security risks. Please call or email me at the coordinates below... Scott Wright The Streetwise Security Coach Join the Streetwise Security Zone at: http://www.streetwise-security-zone.com/join.html Phone: 1-613-693-0997 Email: scott@streetwise-security-zone.com Twitter ID: http://www.twitter.com/streetsec To receive weekly security tips and other notices about helpful content available on this site, please make sure you are on my list by clicking HERE, and entering your name and email address. &amp;#160; &amp;#160; The post Link Hygiene &amp;#8211; the same old risks apply to newly launched services like Ping for iTunes appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>As each major player in today's technology and Web-connected world makes a move to get a bigger piece of the social networking pie, they take on new risks they haven't seen before. But if they only looked around, they'd be able to see and learn from the mistakes of others. This week Apple launched "Ping", a new social network that serves the iTunes community. But they don't seem to have learned much from those that have ventured into this space before them. The Ping forums are being bombarded with spam posts containing phishing links. As blogger Chester Wisniewski, from antivirus maker Sophos points out, "Did they not see this coming?" (click HERE). While Apple should have anticipated the problems, and tried a bit harder to protect legitimate users from this unwanted content, my advice to users is the same as for any social network: Use good link hygiene. What is Good Link Hygiene? Link hygiene is something we all need to practice on a daily basis, whether it's while we're reading Email or browsing social networks. It's about avoiding the risks associated with malicious sites and content, as well as malicious file attachments. There are many different ways in which hackers and scammers can trick you into giving them access to valuable information and computer resources. Here are four of the nine items I teach people to check for when it comes to link hygiene which can reduce the risks of becoming a victim from malicious content in Email and websites: 1) Are your Email configuration options set to disable previewing of content or loading of images? 2) Is your computer&amp;#8217;s operating system and application software (e.g. browser, Adobe Reader) up to date? 3) Do you have a reputable anti-malware product with up to date patches and virus signatures on your computer? 4) Do you know what your anti-malware product&amp;#8217;s alerts look like, so you can recognize most fake virus alerts? &amp;#160;So, Apple - as well as other social networks - should take some blame for allowing their social network to become polluted with malicious content. However, it's almost impossible for sites to eliminate these risks entirely. It's up to us, the users, to stay vigilant, and know how to avoid becoming a victim. If you're a Business Premium member of the Streetwise Security Zone, you can download the PDF version of this month's coaching content on Link Hygiene by clicking HERE. This lesson includes a discussion of the various ways in which hackers and spammers try to trick you into going to malicious sites or entering sensitive information into fake forms. I am now offering monthly briefings, tailored to organizations that want to build and sustain security awareness for staff. Just because your security team is too busy to do its own training and awareness doesn't mean you can't have an economical way to address human security risks. Please call or email me at the coordinates below... Scott Wright The Streetwise Security Coach Join the Streetwise Security Zone at: http://www.streetwise-security-zone.com/join.html Phone: 1-613-693-0997 Email: scott@streetwise-security-zone.com Twitter ID: http://www.twitter.com/streetsec To receive weekly security tips and other notices about helpful content available on this site, please make sure you are on my list by clicking HERE, and entering your name and email address. &amp;#160; &amp;#160; The post Link Hygiene &amp;#8211; the same old risks apply to newly launched services like Ping for iTunes appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Hacking Your Location With Facebook Places</title>
		<link>https://socialmediasecurity.com/2010/08/24/hacking-your-location-with-facebook-places/</link>
				<pubDate>Tue, 24 Aug 2010 17:41:00 +0000</pubDate>
		
				<category><![CDATA[Contributors]]></category>
		<category><![CDATA[Social Networking]]></category>
		<category><![CDATA[socnetsec]]></category>

		<guid isPermaLink="false">http://www.spylogic.net/?p=520</guid>
				<description><![CDATA[<p>I just published a post over on the SecureState blog about how to hack your location using Facebook Places.  The post brings up some interesting questions about how social networks are going to have a problem with fake location check-in&#8217;s. In the meantime, it&#8217;s a way to have fun with your friends&#8230;:-)</p>
<h3>Share and Enjoy</h3>
<p><!-- Start WP Socializer - Social Buttons - Output --><br />
 &#8226; <a href="http://www.facebook.com/share.php?u=http%3A%2F%2Fwww.spylogic.net%2F2010%2F08%2Fhacking-your-location-with-facebook-places%2F&#38;t=Hacking+Your+Location+With+Facebook+Places" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &#8226; <a href="http://twitter.com/home?status=Hacking+Your+Location+With+Facebook+Places%20-%20http%3A%2F%2Fwww.spylogic.net%3Fp%3D520%20@agent0x0" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &#8226; <a href="http://delicious.com/post?url=http%3A%2F%2Fwww.spylogic.net%2F2010%2F08%2Fhacking-your-location-with-facebook-places%2F&#38;title=Hacking+Your+Location+With+Facebook+Places&#38;notes=I+just+published+a+post+over+on+the+SecureState+blog+about+how+to+hack+your+location+using+Facebook+Places.%C2%A0+The+post+brings+up+some+interesting+questions+about+how+social+networks+are+going+to+have+a+problem+with+fake+location+check-in%27s.+In+the+me" title="Post this on Delicious" target="_blank" rel="nofollow">Delicious</a> &#8226; <a href="http://digg.com/submit?phase=2&#38;url=http%3A%2F%2Fwww.spylogic.net%2F2010%2F08%2Fhacking-your-location-with-facebook-places%2F&#38;title=Hacking+Your+Location+With+Facebook+Places&#38;bodytext=I+just+published+a+post+over+on+the+SecureState+blog+about+how+to+hack+your+location+using+Facebook+Places.%C2%A0+The+post+brings+up+some+interesting+questions+about+how+social+networks+are+going+to+have+a+problem+with+fake+location+check-in%27s.+In+the+me" title="Submit this to Digg" target="_blank" rel="nofollow">Digg</a> &#8226; <a href="http://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.spylogic.net%2F2010%2F08%2Fhacking-your-location-with-facebook-places%2F&#38;title=Hacking+Your+Location+With+Facebook+Places" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &#8226; <a href="http://www.spylogic.net/2010/08/hacking-your-location-with-facebook-places/" title="Hacking Your Location With Facebook Places" target="_blank" rel="nofollow">Add to favorites</a> &#8226; <a href="mailto:tom@spylogic.net?subject=Hacking Your Location With Facebook Places&#38;body=I just published a post over on the SecureState blog about how to hack your location using Facebook Places.  The post brings up some interesting questions about how social networks are going to have a problem with fake location check-in's. In the me - http://www.spylogic.net/2010/08/hacking-your-location-with-facebook-places/" title="Email this" target="_blank" rel="nofollow">Email</a> &#8226; <a href="http://feeds2.feedburner.com/spylogic" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a><br />
<!-- End WP Socializer - Social Buttons - Output --></p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2010/08/24/hacking-your-location-with-facebook-places/">Hacking Your Location With Facebook Places</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>I just published a post over on the SecureState blog about how to <a href="http://securestate.blogspot.com/2010/08/hacking-your-location-with-facebook.html">hack your location using Facebook Places</a>.  The post brings up some interesting questions about how social networks are going to have a problem with fake location check-in&#8217;s. In the meantime, it&#8217;s a way to have fun with your friends&#8230;:-)</p>
<h3>Share and Enjoy</h3>
<p><!-- Start WP Socializer - Social Buttons - Output --><br />
 &bull; <a href="http://www.facebook.com/share.php?u=http%3A%2F%2Fwww.spylogic.net%2F2010%2F08%2Fhacking-your-location-with-facebook-places%2F&amp;t=Hacking+Your+Location+With+Facebook+Places" title="Share this on Facebook"  rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Hacking+Your+Location+With+Facebook+Places%20-%20http%3A%2F%2Fwww.spylogic.net%3Fp%3D520%20@agent0x0" title="Tweet this !"  rel="nofollow">Twitter</a> &bull; <a href="http://delicious.com/post?url=http%3A%2F%2Fwww.spylogic.net%2F2010%2F08%2Fhacking-your-location-with-facebook-places%2F&amp;title=Hacking+Your+Location+With+Facebook+Places&amp;notes=I+just+published+a+post+over+on+the+SecureState+blog+about+how+to+hack+your+location+using+Facebook+Places.%C2%A0+The+post+brings+up+some+interesting+questions+about+how+social+networks+are+going+to+have+a+problem+with+fake+location+check-in%27s.+In+the+me" title="Post this on Delicious"  rel="nofollow">Delicious</a> &bull; <a href="http://digg.com/submit?phase=2&amp;url=http%3A%2F%2Fwww.spylogic.net%2F2010%2F08%2Fhacking-your-location-with-facebook-places%2F&amp;title=Hacking+Your+Location+With+Facebook+Places&amp;bodytext=I+just+published+a+post+over+on+the+SecureState+blog+about+how+to+hack+your+location+using+Facebook+Places.%C2%A0+The+post+brings+up+some+interesting+questions+about+how+social+networks+are+going+to+have+a+problem+with+fake+location+check-in%27s.+In+the+me" title="Submit this to Digg"  rel="nofollow">Digg</a> &bull; <a href="http://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.spylogic.net%2F2010%2F08%2Fhacking-your-location-with-facebook-places%2F&amp;title=Hacking+Your+Location+With+Facebook+Places" title="Submit this to StumbleUpon"  rel="nofollow">StumbleUpon</a> &bull; <a href="http://www.spylogic.net/2010/08/hacking-your-location-with-facebook-places/" onclick="addBookmark(event);" title="Hacking Your Location With Facebook Places"  rel="nofollow">Add to favorites</a> &bull; <a href="mailto:tom@spylogic.net?subject=Hacking%20Your%20Location%20With%20Facebook%20Places&amp;body=I%20just%20published%20a%20post%20over%20on%20the%20SecureState%20blog%20about%20how%20to%20hack%20your%20location%20using%20Facebook%20Places.%20The%20post%20brings%20up%20some%20interesting%20questions%20about%20how%20social%20networks%20are%20going%20to%20have%20a%20problem%20with%20fake%20location%20check-in's.%20In%20the%20me%20-%20http://www.spylogic.net/2010/08/hacking-your-location-with-facebook-places/" title="Email this"  rel="nofollow">Email</a> &bull; <a href="http://feeds2.feedburner.com/spylogic" title="Subscribe to RSS"  rel="nofollow">RSS</a><br />
<!-- End WP Socializer - Social Buttons - Output --></p>
<p><a href="http://feedads.g.doubleclick.net/~a/7wecKrISZh5Q9So9OhdlFximJtw/0/da"><img src="http://feedads.g.doubleclick.net/~a/7wecKrISZh5Q9So9OhdlFximJtw/0/di" border="0" ismap="true"></img></a><br />
<a href="http://feedads.g.doubleclick.net/~a/7wecKrISZh5Q9So9OhdlFximJtw/1/da"><img src="http://feedads.g.doubleclick.net/~a/7wecKrISZh5Q9So9OhdlFximJtw/1/di" border="0" ismap="true"></img></a></p>
<div class="feedflare">
<a href="http://feeds.feedburner.com/~ff/spylogic?a=w1JdXG8IndQ:3m5-lg1Up48:V_sGLiPBpWU"><img src="http://feeds.feedburner.com/~ff/spylogic?i=w1JdXG8IndQ:3m5-lg1Up48:V_sGLiPBpWU" border="0"></img></a> <a href="http://feeds.feedburner.com/~ff/spylogic?a=w1JdXG8IndQ:3m5-lg1Up48:F7zBnMyn0Lo"><img src="http://feeds.feedburner.com/~ff/spylogic?i=w1JdXG8IndQ:3m5-lg1Up48:F7zBnMyn0Lo" border="0"></img></a> <a href="http://feeds.feedburner.com/~ff/spylogic?a=w1JdXG8IndQ:3m5-lg1Up48:gIN9vFwOqvQ"><img src="http://feeds.feedburner.com/~ff/spylogic?i=w1JdXG8IndQ:3m5-lg1Up48:gIN9vFwOqvQ" border="0"></img></a>
</div>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F08%2F24%2Fhacking-your-location-with-facebook-places%2F&amp;t=Hacking+Your+Location+With+Facebook+Places" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Hacking+Your+Location+With+Facebook+Places%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F08%2F24%2Fhacking-your-location-with-facebook-places%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F08%2F24%2Fhacking-your-location-with-facebook-places%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F08%2F24%2Fhacking-your-location-with-facebook-places%2F&amp;title=Hacking+Your+Location+With+Facebook+Places&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=I+just+published+a+post+over+on+the+SecureState+blog+about+how+to+hack+your+location+using+Facebook+Places.%C2%A0+The+post+brings+up+some+interesting+questions+about+how+social+networks+are+going+to+have+a+problem+with+fake+location+check-in%26%238217%3Bs.+In+the+meantime%2C+it%26%238217%3Bs+a+way+to+have+fun+with+your+friends%26%238230%3B%3A-%29Share+and+Enjoy%0A%0A%0A+%26bull%3B+Facebook+%26bull%3B+Twitter+%26bull%3B+Delicious+%26bull%3B+Digg+%26bull%3B+StumbleUpon+%26bull%3B+Add+to+favorites+%26bull%3B+Email+%26bull%3B+RSS" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F08%2F24%2Fhacking-your-location-with-facebook-places%2F&amp;title=Hacking+Your+Location+With+Facebook+Places" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2010/08/24/hacking-your-location-with-facebook-places/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Hacking+Your+Location+With+Facebook+Places&body=I+just+published+a+post+over+on+the+SecureState+blog+about+how+to+hack+your+location+using+Facebook+Places.%C2%A0+The+post+brings+up+some+interesting+questions+about+how+social+networks+are+going+to+have+a+problem+with+fake+location+check-in%26%238217%3Bs.+In+the+meantime%2C+it%26%238217%3Bs+a+way+to+have+fun+with+your+friends%26%238230%3B%3A-%29Share+and+Enjoy%0A%0A%0A+%26bull%3B+Facebook+%26bull%3B+Twitter+%26bull%3B+Delicious+%26bull%3B+Digg+%26bull%3B+StumbleUpon+%26bull%3B+Add+to+favorites+%26bull%3B+Email+%26bull%3B+RSS%20-%20https://socialmediasecurity.com/2010/08/24/hacking-your-location-with-facebook-places/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2010/08/24/hacking-your-location-with-facebook-places/">Hacking Your Location With Facebook Places</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
										<dc:creator>feedback@socialmediasecurity.com (Tom)</dc:creator><enclosure length="-1" type="application/rss+xml; charset=UTF-8" url="https://socialmediasecurity.com/feed/rss/"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>I just published a post over on the SecureState blog about how to hack your location using Facebook Places.  The post brings up some interesting questions about how social networks are going to have a problem with fake location check-in&amp;#8217;s. In the meantime, it&amp;#8217;s a way to have fun with your friends&amp;#8230;:-) Share and Enjoy &amp;#8226; Facebook &amp;#8226; Twitter &amp;#8226; Delicious &amp;#8226; Digg &amp;#8226; StumbleUpon &amp;#8226; Add to favorites &amp;#8226; Email &amp;#8226; RSS The post Hacking Your Location With Facebook Places appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>I just published a post over on the SecureState blog about how to hack your location using Facebook Places.  The post brings up some interesting questions about how social networks are going to have a problem with fake location check-in&amp;#8217;s. In the meantime, it&amp;#8217;s a way to have fun with your friends&amp;#8230;:-) Share and Enjoy &amp;#8226; Facebook &amp;#8226; Twitter &amp;#8226; Delicious &amp;#8226; Digg &amp;#8226; StumbleUpon &amp;#8226; Add to favorites &amp;#8226; Email &amp;#8226; RSS The post Hacking Your Location With Facebook Places appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
		<item>
		<title>Facebook Privacy &amp; Security Guide Updated to v2.3</title>
		<link>https://socialmediasecurity.com/2010/08/23/facebook-privacy-security-guide-updated-to-v2-3/</link>
				<comments>https://socialmediasecurity.com/2010/08/23/facebook-privacy-security-guide-updated-to-v2-3/#comments</comments>
				<pubDate>Mon, 23 Aug 2010 21:35:02 +0000</pubDate>
		
				<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Social Networking]]></category>
		<category><![CDATA[Geolocation]]></category>
		<category><![CDATA[guides]]></category>
		<category><![CDATA[places]]></category>
		<category><![CDATA[socnetsec]]></category>
		<category><![CDATA[tom]]></category>

		<guid isPermaLink="false">http://socialmediasecurity.com/?p=2486</guid>
				<description><![CDATA[<p>Just a quick post that I have updated the Facebook Privacy &#38; Security Guide to include information on configuring the privacy settings for Facebook Places.  You can find this on the first page under &#8220;Sharing on Facebook&#8221;.  Stay tuned for more information on Facebook Places in the next day or so! Download the updated Facebook [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2010/08/23/facebook-privacy-security-guide-updated-to-v2-3/">Facebook Privacy &#038; Security Guide Updated to v2.3</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>Just a quick post that I have updated the Facebook Privacy &amp; Security Guide to include information on configuring the privacy settings for Facebook Places.  You can find this on the first page under &#8220;Sharing on Facebook&#8221;.  Stay tuned for more information on Facebook Places in the next day or so!</p>
<p><a href="http://socialmediasecurity.com/downloads/Facebook_Privacy_and_Security_Guide.pdf">Download the updated Facebook Privacy &amp; Security Guide here (pdf download).</a></p>
<br>
<b>Share with your friends!</b>

<!-- Start WP Socializer - Social Buttons - Output -->
 &bull; <a href="http://www.facebook.com/share.php?u=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F08%2F23%2Ffacebook-privacy-security-guide-updated-to-v2-3%2F&amp;t=Facebook+Privacy+%26+Security+Guide+Updated+to+v2.3" title="Share this on Facebook" target="_blank" rel="nofollow">Facebook</a> &bull; <a href="http://twitter.com/home?status=Facebook+Privacy+%26+Security+Guide+Updated+to+v2.3%20-%20https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F08%2F23%2Ffacebook-privacy-security-guide-updated-to-v2-3%2F%20" title="Tweet this !" target="_blank" rel="nofollow">Twitter</a> &bull; <a href="https://plus.google.com/share?url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F08%2F23%2Ffacebook-privacy-security-guide-updated-to-v2-3%2F" title="Share this on Google Plus" target="_blank" rel="nofollow">Google Plus</a> &bull; <a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F08%2F23%2Ffacebook-privacy-security-guide-updated-to-v2-3%2F&amp;title=Facebook+Privacy+%26+Security+Guide+Updated+to+v2.3&amp;source=The+Social+Media+Security+Podcast+-+&amp;summary=Just+a+quick+post+that+I+have+updated+the+Facebook+Privacy+%26amp%3B+Security+Guide+to+include+information+on+configuring+the+privacy+settings+for+Facebook+Places.%C2%A0+You+can+find+this+on+the+first+page+under+%22Sharing+on+Facebook%22.%C2%A0+Stay+tuned+for+more+i" title="Share this on LinkedIn" target="_blank" rel="nofollow">LinkedIn</a> &bull; <a href="http://www.stumbleupon.com/submit?url=https%3A%2F%2Fsocialmediasecurity.com%2F2010%2F08%2F23%2Ffacebook-privacy-security-guide-updated-to-v2-3%2F&amp;title=Facebook+Privacy+%26+Security+Guide+Updated+to+v2.3" title="Submit this to StumbleUpon" target="_blank" rel="nofollow">StumbleUpon</a> &bull; <a href="https://socialmediasecurity.com/2010/08/23/facebook-privacy-security-guide-updated-to-v2-3/" onclick="addBookmark(event);" title="Add to favorites" target="_blank" rel="nofollow">Add to favorites</a> &bull; <a href="mailto:?to=&subject=Facebook+Privacy+%26+Security+Guide+Updated+to+v2.3&body=Just+a+quick+post+that+I+have+updated+the+Facebook+Privacy+%26amp%3B+Security+Guide+to+include+information+on+configuring+the+privacy+settings+for+Facebook+Places.%C2%A0+You+can+find+this+on+the+first+page+under+%22Sharing+on+Facebook%22.%C2%A0+Stay+tuned+for+more+i%20-%20https://socialmediasecurity.com/2010/08/23/facebook-privacy-security-guide-updated-to-v2-3/" title="Email this" target="_blank" rel="nofollow">Email</a> &bull; <a href="https://socialmediasecurity.com/feed/rss/" title="Subscribe to RSS" target="_blank" rel="nofollow">RSS</a>
<!-- End WP Socializer - Social Buttons - Output -->

<br><p>The post <a rel="nofollow" href="https://socialmediasecurity.com/2010/08/23/facebook-privacy-security-guide-updated-to-v2-3/">Facebook Privacy &#038; Security Guide Updated to v2.3</a> appeared first on <a rel="nofollow" href="https://socialmediasecurity.com">The Social Media Security Podcast</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://socialmediasecurity.com/2010/08/23/facebook-privacy-security-guide-updated-to-v2-3/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
							<dc:creator>feedback@socialmediasecurity.com (Tom)</dc:creator><enclosure length="92998" type="application/pdf" url="http://socialmediasecurity.com/downloads/Facebook_Privacy_and_Security_Guide.pdf"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Just a quick post that I have updated the Facebook Privacy &amp;#38; Security Guide to include information on configuring the privacy settings for Facebook Places.  You can find this on the first page under &amp;#8220;Sharing on Facebook&amp;#8221;.  Stay tuned for more information on Facebook Places in the next day or so! Download the updated Facebook [&amp;#8230;] The post Facebook Privacy &amp;#038; Security Guide Updated to v2.3 appeared first on The Social Media Security Podcast.</itunes:subtitle><itunes:summary>Just a quick post that I have updated the Facebook Privacy &amp;#38; Security Guide to include information on configuring the privacy settings for Facebook Places.  You can find this on the first page under &amp;#8220;Sharing on Facebook&amp;#8221;.  Stay tuned for more information on Facebook Places in the next day or so! Download the updated Facebook [&amp;#8230;] The post Facebook Privacy &amp;#038; Security Guide Updated to v2.3 appeared first on The Social Media Security Podcast.</itunes:summary><itunes:keywords>twitter,facebook,myspace,privacy,security,socialmedia,socialnetworking</itunes:keywords></item>
	</channel>
</rss>