Translate

Wednesday, May 8, 2013

The Biggest Security Threat:

Facebook And You

 

Forget those phishing emails that attempt to get your credit card or bank sign-in information. When crooks want to know how to get into your bank account, they post a message on Facebook. These messages appear so innocuous and so appropriate in the Facebook setting that you are likely to not only get conned, but pass on the scam. Facebook is the “now new frontier for fraud,” says Tom Clare, head of product marketing at Blue Coat, an Internet security company that does annual reports on web threats. In just this past year social networks have soared to 4th from 17th most treacherous web terrain — behind porn and software-sharing sites, which you probably know to avoid.

What makes Facebook so treacherous? Us. It starts with the fact that we are inundated with requests to set up passwords to get into our work computers, our online bank accounts, Facebook and every other web-based subscription. So what do we do? We use the same password.

“Crooks understand that most users use the same password for everything,” says Clare. “If they can get your user credentials for your Facebook account, there’s a good chance that they have the password for your bank account.”

If you are smart enough to have separate passwords for Facebook and your financial accounts, crooks get at you through a variety phishing attempts that you might think are Facebook games and widgets. But look closely and you’ll realize that they deliver answers to all of your bank’s security questions–and possibly clues to your passwords — right into the hands of the crooks.

Think it couldn’t happen to you? Let’s see if you recognize any of these 15 recent Facebook messages that jeopardize your security. All of these came from my Facebook friends in just the past few weeks:

1. Who knows you best?
The message reads: Can you do this? My middle name, My age , My favorite soda , My birthday, Whose the love of my life, My best friend , My favorite color, My eye color, My hair color , My favorite food and my mom’s name. Put this as your status and see who knows you best. ♥

How many of these are the same facts your bank asks to verify your identity? Put this as your status and everybody — including all the people who want to hijack your bank account and credit cards — will know you well enough to make a viable attempt.

2. Your friend [Name here] just answered a question about you!
Was it possible that an old friend answered a question about me that I needed to “unlock”? Absolutely. But when you click on the link, the next screen should give you pause: 21 Questions is requesting permission to…(a) access your name, profile picture, gender, networks, user ID, friends and any other information shared with everyone…(b) send you email…(c) post to your wall…and…(d) access your data any time…regardless of whether or not you’re using their application.

Can you take that access back — ever? It sure doesn’t look like it. There’s no reference to how you can stop them from future access to your data in their “terms and conditions.” Worse, it appears that to “unlock” the answer in your friend’s post, you need to answer a bunch of questions about your other friends and violate their privacy too. I didn’t give 21 Questions access to my information, but the roughly 2550 people who joined “People Who Hate 21 Questions on Facebook” apparently have and can give you insight into just how pernicious this program can be.

3. LOL. Look at the video I found of you!
This is the most dangerous of all the spam messages and it comes in a variety of forms, says Clare. It’s actually a bid to “surreptitiously” install malware on your computer. This malware can track your computer keystrokes and record your sign-in and password information with all of your online accounts.

How does it work? When you click on the link, it says that you need to upgrade your video player to see the clip. If you hit the “upgrade” button, it opens your computer to the crooks, who ship in their software. You may be completely unaware of it until you start seeing strange charges hit your credit cards or bank account. Up-to-date security software should stop the download. If you don’t have that, watch out.

Better yet, if you really think some friend is sending you a video clip, double-check with the friend to be sure before you click on the link. When a friend of mine reported that he had been messaged, he asked the sender an old high-school classmate if she’d really sent him this, she was horrified. Her Facebook account had been hijacked and anyone who clicked through was likely to have their account hijacked too. That’s how this virus spreads virtually in hyper-space.

4. HELP! We’re stuck!
It started out as an email scam, but now the “We’re stuck in [Europe/Asia/Canada] and need money” scam has moved to instant messages on Facebook, where it can be more effective. Most people have learned not to react to the email, but instant messages help crooks by forcing you to react emotionally — They’re right there. They need help, now. A friend got one of these messages a few weeks ago from the parents of a close friend. Her reaction was the perfect way to deal with it: She immediately called her friend and said “Have you talked to your parents lately?” The response: “Yeah. They’re right here.”

Facebook has launched a security system to combat account hijacking that allows crooks to send messages and posts through your account. You can get updates on what they’re doing at Facebook’s security page, where they’ve also got a nice little security quiz that’s definitely worth taking.

5. Share this story.
I pay an astounding amount of money to subscribe to the New York Times and the Washington Post because they’re one of the few papers that invests enough money in its staff to support incredibly robust investigative reporting. As someone who believes that democracy relies on that type of journalism, I’m willing to shell out the more than $1200 a year for these two daily subscriptions.

But I will not and flatly refuse to share their stories on Facebook.

Why? When I try, up pops the ubiquitous Facebook “Request for Permission” that says they want my name, gender, email, friends, likes, music, movies, books, quotes, interests….and the list goes on. To their credit, the New York Times privacy policy is prominently posted and clear. And now the Washington Post is following suit. But they want more privacy than I’m willing to give up. Also to their credit, they allow you to rescind access later. But I’m not convinced that privacy once given up can ever be regained.

To quote Nancy Reagan, when someone asks “permission” to violate your privacy: “Just say no.”  Your security and your information is a private matter not to be taken lightly! I cannot force you to change your method of thinking, but I can give you the information needed to make an informed decision, just don't make rash decisions, or ones that need immediate answers – Right Now! These types pf decisions can lead you to a life of torment, where someone else is living out your dream life for you. -Birdy

No comments:

Post a Comment

Please be considerate of others, and please do not post any comment that has profane language. Please Do Not post Spam. Thank you.

Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)