Social networking sites have created avenues through which people can communicate with friends, colleagues and family around the world.
Some of the web – based technologies include social networks ( Facebook and Myspace ), blogging sites ( wordpress and typepad ), wikis ( Wikipedia, Wikia etc. ) and business / technical networks ( Linkedln among others ).
Back in the early 2000s when the first social networks MySpace and Facebook appeared online, users were much more open with their personal information.
Social networking has attracted millions of users globally and the numbers continue to grow as more people gain access to computers, mobile phones and the internet.
Even when you have deleted your accounts, you can still be profiled based on personal information online derived from your friends ‘posts.
Key things to consider for online privacy!
Adjust your privacy settings — make your accounts private so that only friends you know face – to – face can see what you post.
Limit your friend list — don’t’ friend ‘random people or allow people you don’t know to ‘follow’ your social media accounts.
Discuss readjusting privacy settings on Facebook after a privacy violation to gain control over the access others have to her information.
A privacy scanner can scan your social media accounts for weak privacy settings on Facebook, LinkedIn, Google+, and Twitter, and identify risky settings on different browsers.
Friends are sharing personal information about you, even if you are doing everything possible to protect your social media privacy (even to the extent of deleting your Facebook account or restricting access to personal data in other ways).
On the other, this widespread use has been accompanied by rising user concerns about privacy and social media firms ‘capacity to protect their data. Social media users are also taking other proactive measures against data privacy, and 9 % have taken the most drastic action of stopping using a social media platform altogether.
So, we know that many have privacy concerns and that many are changing their settings, but what other actions have users taken on social media in the last 6 months to protect their privacy?
The paradox is that people use social media platforms even as they express great concern about the privacy implications of doing so – and the social woes they encounter. Almost 1 in 5 say they have different privacy settings across social media platforms, and a similar proportion says they do so because they trust some platforms more than others.
Some web – oriented marketing – research organizations may use this practice legitimately, for example: in order to construct profiles of ‘typical Internet users ‘.
Such profiles, which describe average trends of large groups of Internet users rather than of actual individuals, can then prove useful for market analysis and it’s also particularly troubling for social media privacy advocates that some of the biggest tech companies, including Facebook, appear to be collecting “shadow profiles” of non – user.
What this means is that Facebook is not only collecting data on its own users (which most people realize), but also that is creating profiles of non – users simply by capturing all the ambient data that flows through the social network on a daily basis.
However, this poses a serious security and privacy threat to citizens if such information falls into the hands of oppressive regimes.
Social Networking Sites which has the privacy security setting discusses the tools which available to make the account more secure.
Although there will always be some new cyber threat to contend with, staying vigilant and educated about cyber security can help reduce the occurrence of data breaches and keep company and customer information safe and secure.
Whether the cyber security is for a social media service provider, a company looking to safeguard its information from external threats or really, any other entity in need of online protection, a cyber security professional is needed.
Cyber security predictions for 2022 include an increase in social media – oriented security threats such as malware attacks targeting monetary and non – monetary information, targeting both the individual users and online businesses.
Profiling becomes a more contentious privacy issue when data – matching associates the profile of an individual with personally – identifiable information of the individual.
In that case, they may try to achieve Internet anonymity to ensure privacy — use of the Internet without giving any third parties the ability to link the Internet activities to personally – identifiable information of the Internet user.
Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Internet.
Communicate essential information to convey the nature of the compromise, for example:
An account is compromised;
An administrator cannot access an account;
A username and/or password for an account is compromised;
Information on the account is unauthorized.
However, most of the information that is contained within a social media account is not even required of the account holder.
If you purchased anything through social media outlets your credit card information is likely stored, which means hackers can confiscate this information, too.
For the information that is required, it’s just as easy to provide “decoy information” that is used strictly for social media accounts and security questions and can easily be remembered but would not be useful to a hacker if said information was compromised.
There are several ways advertisers can invade your social media privacy, take advantage of your data and make you a target for their ads.
All it takes is checking a few boxes, the thinking goes, and you can immediately move from “weak” social media privacy to “strong” social media privacy.
Because of the very nature of social media, maintaining privacy on social media platforms is not an easy thing to achieve.
And there’s another element to the research study on social media privacy that is perhaps more subtle, and that is the fact that social media privacy is not necessarily an individual choice.
The conventional wisdom is that the easiest way to stop social media companies like Facebook and Twitter from tracking and profiling you is simply by deleting your social media accounts.
Social media refers to online and mobile communication technologies that are used by people to engage in interactive.
This new paradigm shift involves the use of social media as a cost effective, convenient and efficient means of conducting business now and in future.
Where the Trojan in web pages asks the user to click on the malicious link, and a malware is planted onto the system.
And when a user clicks on the link it scans all the files on the user’s system and steals the important information.
The security and privacy of these sites mainly focuses on malware detection as it appears to come from a trusted contact, users are more likely to click on the link.
In their e – mail inbox, threats include email scams and attachments that get them to install malware and disclose personal information
Users should be skeptical of accounts or messages that seem outside of the norm, as they are likely a scam or a phishing attempt.
Phishing Scams and Attack Techniques
The attackers make fake web pages that look like the legitimate ones and ask users to enter their credentials and the user gets in trouble when the user enters the credentials.
How others interact with the user:
This helps the user to manage how other people’s activity affects the user’s profile.
Tracking Users: It can cause physical security concerns for the user, as the third parties may access the roaming information of the user by collecting the real – time update on the user’s location.
This is common in Facebook with the name like jacking that is when a user likes a page, a picture or a video the user is trapped by the attackers. The setting allows the user to get a notification when anyone logs into their account from an unrecognized device or browser.
Once securing your other accounts, release pre – approved initial messages alerting your communities that an incident is occurring and that steps are underway in order to recover cyber – vandalized accounts.
Initial responses to the cyber – security stakeholder team and the public should be within minutes of recovering control of your accounts.
Agencies should plan and train prior to an incident and prepare approved processes and material for the recovery and response to cyber – vandalism. If the social media cyber – security stakeholder team or responsible manager determines an incident is in progress, remember that minutes and even seconds count.
To test out that hypothesis, the researchers were able to sub – divide the 13,905 Twitter accounts into 927 “ego – networks” consisting of 1 Twitter user and 15 other accounts that interacted with that individual most frequently.
This research study, which was published in the journal Nature Human Behavior, analyzed 30.8 million Twitter messages from 13,905 Twitter accounts to see whether it might be possible to profile an individual simply by examining the profiles and interactions with his or her friends.
In fact, say the researchers, this was the first – ever study that analyzed how much information about an individual is encoded in interactions with friends.
All they needed was tweets from 8 – 9 accounts (i.e. the “friends” of the user), and they could start to create some startlingly accurate profiles. However, the Flash player browser plugin can be disabled or uninstalled, and Flash cookies can be disabled on a per – site or global basis.
Interested in Cookies – Well not the one you think of-
Since cookies are advertisers ‘main way of targeting potential customers, and some customers are deleting cookies, some advertisers started to use persistent Flash cookies and zombie cookies, but modern browsers and anti – malware software can now block or detect and remove such cookies.
They exhibit a similar privacy risk as normal cookies, but are not as easily blocked, meaning that the option in most browsers to not accept cookies does not affect Flash cookies.
Flash cookies, also known as Local Shared Objects, work the same ways as normal cookies and are used by the Adobe Flash Player to store information at the user’s computer. Some participants were unable to recall a privacy violation or were unconcerned that their privacy could be violated, whereas others were more certain about what had happened and what it meant to maintain privacy.
Acknowledging that this was a loose friend, the participant transferred some of the blame onto the friend and has not spoken to the friend since.
Participants ‘usual response on experiencing, or becoming aware of, a privacy violation was to change their relationship with the violator, on one occasion even when the violator was clearly an innocent bystander.
Participants spoke of the different things they enjoy with some friends and the implicit links between the type of friend and the expectancies associated with it.
The interviews highlighted a variety of issues relating to what friendship meant to each participant and what constituted a privacy violation.
A good thing about Calendar is that it allows you to sync up with other calendars you use such as Apple Calendar and Google Calendar. Along with the basic functions, this program comes with support for Google Calendar, Outlook, and includes some unique and interesting features. Apart from its ordinary information storing function, this application can be a special cloud service, allowing you to synchronize calendars, schedules, and task lists on multiple devices.
Taking into account it functionality, a Calendar is a reliable calendar application that has an easy – to – navigate interface with three display options.