Social networks

Social Zombies Revisited: Your Friends Want to Eat Your Brains
Tom Eston | | api, Browser Zombies, Cybersecurity, Data Privacy, DEF CON, DEFCON 17, DEFCON Hacking Conference, Digital Privacy, Episodes, facebook, Geocities, Information Security, Infosec, Kevin Johnson, Meta, myspace, Online Tracking, Podcast, Privacy, privacy settings, security, social media, Social networks, Social Zombies, technology, Third-Party Application, Tom Eston, Twitter, web application, Weekly Edition, zombies
On this week’s episode, We’re excited to bring you a classic conference talk that Tom Eston gave with co-host Kevin Johnson back in 2009 at DEF CON 17 in Las Vegas. The ...

Uber Hacked by 18 Year Old, Morgan Stanley Hard Drives Got Auctioned, Deleting Your Data is Hard
Tom Eston | | Cybersecurity, Data breach, Data Privacy, Data Removal, Digital Privacy, Episodes, facebook, Hacking, Hard Drives, Information Security, Infosec, Morgan Stanley, Podcast, Privacy, security, sensitive data, social media, Social networks, technology, Twitter, Uber, Weekly Edition
Uber got hacked by an 18 year old using social engineering and a multi-factor authentication fatigue attack, Morgan Stanley has been auctioning off hard drives holding sensitive client data since 2015, and ...
The Social Dilemma
Tom Eston | | Cybersecurity, Digital Privacy, Documentary, Episodes, facebook, google, Instagram, netflix, pinterest, Podcast, Privacy, Social Dilemma, social media, Social networks, Twitter, Weekly Edition
In episode 142 for October 12th 2020: My conversation about the pros and cons of the Netflix documentary “The Social Dilemma” with frequent guest, Kevin Johnson. The Social Dilemma is a popular ...

Hackers Hijack Indian PM Narendra Modi Twitter Account
Graham Cluley | | cryptocurrency scam, Industry News, nerendra hack, nerendra modi, Social networks, Twitter account hacked
Twitter account used to spread cryptocurrency scam Hackers deny that they have hacked Paytm Mall, India’s leading online shopping app A Twitter account posting tweets on behalf of the Indian Prime Minister’s ...
OSINT – Using Threat Intelligence to Secure Your Organisation
Tripwire Guest Authors | | business intelligence, Connecting Security to the Business, OSINT, Social networks, Threat analysis
In my first article on Cyber Security Threat Intelligence Analysts, (CTI analysts) we covered what a CTI analyst is and discussed how they can bridge the gaps between IT, Security, and the ...
Everyone’s Creating Fake Social Media Accounts, Including Homeland Security
Ebbe Kernel | | facebook, fake social media, Instagram, linkedin, social engineering, Social networks, Twitter
Over the last few years, we have all had to accept that social media platforms can and will be used by nefarious actors to achieve their ends. In fact, in many cases, ...

Lawsuit alleges TikTok sends user videos to Chinese servers for surveillance
A college student from Palo Alto, California is suing video-sharing service TikTok for allegedly using surveillance software designed to harvest personally identifiable information, including biometric data, and send it to China for ...

Russia Wants Access to Tinder Photos and Conversations
Russian intelligence wants to take a closer look at your Tinder photos and conversations. After Tinder and 175 other companies agreed to comply with Russian legislation asking companies to store data on ...

Applicants Must Give Up Social Media Privacy for US Visa Approval
Luana Pascu | | Data Privacy, Industry News, social media surveillance, Social networks, Terrorism, US visa
Be cautious with your digital presence as you might now have to share it with the US State Department. As of Friday, millions of US immigrant and non-immigrant visa seekers will have ...

Snapchat workers snooped on users with internal tool
Snapchat’s 186 million users may be in for a rude awakening today after revelation that multiple employees of the social media giant were able to abuse their power and snoop on members ...