I don’t know why I continue to be amazed at the stupidity of some people when it comes to posting online. Perhaps it is my own naivete. Regardless, over the past year or three a number of thieves have gotten themselves caught by posting about stealing, posting pictures of what they have stolen, or even […]
Facebook Timeline and The Map – Privacy Concerns and How to Fix Them
I am concerned about the new Facebook Timeline map feature and how it can be a serious security issue. This post looks at that issue and explains how to resolve it.
Modern Identity Theft – Social Media as Revenge
Identity theft isn’t a new concept. Seen the movie “Catch me if you can?” In essence, the protagonist, a real criminal who turned adviser to the FBI later in life, was stealing identities for money (and perhaps a more exciting life.) Of course, these days people steal identities so they can open credit card accounts, […]
Facebook Fooled Me!
So, I am, as you know, something of a Facebook privacy person. I am careful to keep track of my privacy settings, I teach people on privacy settings; you can count on it, I know how to use Facebook’s privacy settings. And yet, Facebook caught me out. Facebook, in its efforts to catch up to […]
Slides and outline for my presentation on social media research
Tomorrow I am teaching a seminar on social media research. A colleague of mine, Dan Siegel, is teaching the first two hours on traditional online research. I am covering the last hour on social media. I just finished my slides and if you are interested, feel free to see them here I am teaching in […]
Watch out for Phishing – Here is how to respond
In the past month I had two items occur that raised my phishing alert. Phishing is a form of social engineering. Crooks frequently take advantage of the fact that people (1) like to be helpful and (2) make assumptions when someone calls or emails them and seems to be in authority. Then the crooks ask […]
Does your new computer have malware on it before you even turn it on?
I have read several articles over the past few years reporting incidents in which new technology was infected with malware before the owner ever had a chance to use it. Normally the technology had been imported from over seas. When I first read these stories I shook my head and wondered, if you can’t trust […]
- « Previous Page
- 1
- …
- 5
- 6
- 7