Tag Archive for Social media

Few Americans Have Changed Behavior post-Snowden

Few Americans Have Changed Behavior post-SnowdenEdward Snowden revealed the U.S. Government’s domestic spying program. The revelations changed the world. The data collection programs have impacted US businesses ‘ ability to sell abroad. Recent regulations introduced in China have knocked Apple (AAPL), Cisco (CSCO), McAfee, and Citrix (CTXS) out of growing markets.

U.S. Government's spying programsLisa Vaas, at Sophos’ Naked Security blog, points us to a recent  Pew Research Center survey that documents the impact of TLA spying and data collection on the home-front. Most Americans (87%) have heard about the National Security Agency’s (NSA) surveillance programs since Snowden began leaking documents nearly two years ago. The Pew research found that nearly one-third of American adults have taken steps to protect their information from government surveillance programs that monitor phone and digital communications.

Aware of the NSA’s surveillance programs

Out of those surveyed who are at least somewhat aware of the NSA’s surveillance programs (30% of adults),

  • 34% have taken at least one step to keep their information hidden or shielded from the government.
  • 25% are using more complex passwords
  • 17% changed their privacy settings on social media
  • 15% use social media less often
  • 15% have avoided certain apps
  • 14% say they speak more in person instead of communicating online or on the phone
  • 13% have uninstalled apps
  • 13% have avoided using certain terms in online communications

government surveillance programsWhen it comes to how well the courts are balancing the needs of law enforcement and intelligence agencies with citizens’ right to privacy:

  • 49% say courts and judges are not balancing those interests;
  • 48% say they are.

OK to spy on foreigners

The article says the public approves of monitoring plenty of people, including foreign citizens, foreign leaders, and American leaders:

  • 82% say it’s acceptable to monitor communications of suspected terrorists;
  • 60% believe it’s acceptable to monitor the communications of American leaders;
  • 60% think it’s OK to monitor the communications of foreign leaders;
  • 54% say it’s acceptable to monitor communications from foreign citizens;
  • 57% say that the monitoring of citizens’ communications is unacceptable;
  • 65% – think it’s OK to monitor people who pepper their communications with words such as “explosives” and “automatic weapons” in search engine queries;
  • 67% think it’s OK to monitor people who visit anti-American websites.

Social media privacyAmericans are split about just how much we should worry about surveillance – particularly when it comes to their own digital behavior.

  • 39% describe themselves as concerned about government monitoring of their activity on search engines.
  • 38% say they’re concerned about government monitoring of their activity on their email messages.
  • 37% express concern about government monitoring of their activity on their cell phone.
  • 31% are concerned about government monitoring of their activity on social media sites, such as Facebook or Twitter.
  • 29% say they’re concerned about government monitoring of their activity on their mobile apps.
Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Twesume is Resume on Twitter

Whats A TwesumeSean Weinberg, COO, and co-founder of RezScore, a free web application that reads, analyzes, and grades resumes instantly, says that a 140-character Twitter resume could land your next job.  He calls it a Twesume.

Just like it sounds, “Twesume” unifies Twitter and your resume. The RezScore COO explains that a Twesume is a short bio or resume condensed into 140 characters or less. Sometimes paired with the #twesume hashtag, the Twesume can be tweeted, messaged or emailed to potential employers.

Mr. Weinberg told Mashable the great thing about the Twesume is that it’s a completely flexible, living document. Did you get promoted? No problem, just tweet the addition to your resume. Relocate? Totally fine.

Twesumes help job seekers get noticed by companies who use social recruiting. With the Twesume, a job seeker can introduce himself and engage with an employer in less time (and space) than a traditional resume and cover letter could ever manage.

If you’re interested in jumping on the Twesume bandwagon, all you need is a Twitter account and something to say. Once you have your Twitter account squared away (be sure to have a picture, bio, and some followers/followees), write your very own Twesume. While the Twesume can be anything you like, try to include this information: what you do, an accomplishment, a goal, skills, and/or a link to a detailed profile or website.

Santa Claus: World traveler and toy expert. 300+ years of management experience. Looking for a position in the entertainment industry. http://tinyurl.com/c9ursdp #twesume

Tweet this to your followers, DM to a specific employer, or use it as your Twitter bio. It really is as simple as that.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Social Media – It’s All About Me

Social Media - It's All About MeSocial media sites such as Facebook (FB) and Twitter are a narcissist magnet, according to recent study from the University of Michigan. The U-M researchers published their results online in Computers in Human Behavior.

University of MichiganTechEye says the Michigan researchers found that college students and their adult counterparts use social media in differing ways to bolster their egos and control perceptions of others, the report suggests. Elliot Panek, a University of Michigan researcher said that social networking is about making your image, how you are seen, and also checking on how others respond to this image.

College-age students love using Twitter to make their opinions and views seem important. He told CBC News that college students social media tool of choice is the megaphone of Twitter. “Young people may over evaluate the importance of their own opinions,” Professor Panek said. “Through Twitter, they’re trying to broaden their social circles and broadcast their views about a wide range of topics and issues.”

TwitterAdults who show narcissism tend to prefer Facebook, which works in the same way. Middle-aged adults usually have already formed their social selves and they use social media to gain approval from those who are already in their social circles. According to Mr. Panek, Facebook serves narcissistic adults as a mirror. “It’s about curating your own image, how you are seen, and also checking on how others respond to this image,” he said.

So what’s wrong with being a little narcissistic? Plenty. The traits associated with the disorder can stunt the development of close, long-term relationships. What’s more, highly narcissistic people are more likely to react aggressively to criticism and to carry out actions that promote themselves at the expense of others. On the upside, narcissism also correlates with higher self-esteem and low anxiety

Facebook logoThose findings confirm the conventional wisdom that Twitter is the more youthful, millennial, me-centric social network. Facebook is the province of older people who like to showcase pictures of pasta dishes or post status updates about their kids. We’d hazard to say it’s a crutch for people who can’t get out of the house much, but still, seek validation from their peers. Incidentally, the median age of Facebook users has risen from 38 to 41 over the last few years, according to various social media studies. A recent spate of alarmist headlines suggested that teenagers may, in fact, be ditching Facebook.

rb-

Do you like me now?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

5 Steps to Reinvent Your Personal Brand

5 Steps to Reinvent Your Personal BrandDorie Clark of Clark Strategic Communications, recently posted an excellent article, How to Reinvent Your Personal Brand on the Harvard Business Review blog, The post offers a plan to follow if you want to reinvent yourself. I am on my third career iteration from teacher to techie to manager (I didn’t say it was for the better).

embrace your new brandIt happens all the time. Your path may make perfect sense to you, but how can you convince others to embrace your new brand, and take you seriously? Ms. Clark explains five steps to reinventing yourself for the business marketplace.

1. What’s Your Destination? The author says you need to develop a detailed understanding of where you want to go, and the knowledge and skills necessary to get there. If you’ve been a techie for the past decade, you may understand every new marketing toy out there, from Facebook (FB) to Foursquare. But can you effectively convey that knowledge to a non-technical audience? Learning the skills you need will help you gain the confidence necessary to start identifying (and publicizing) yourself in your new identity.

Your Unique Selling Proposition2. Leverage Your Points of Difference. In marketing, it’s called a USP, a “Unique Selling Proposition.” What makes you different from anyone else? That’s what people will remember, and you can use it to your advantage according to the article.

3. Develop a Narrative. Ms. Clark says it’s human nature to have many interests, to seek new experiences, and to want to develop new skills over the course of your life. Unfortunately, that makes you a dilettante. It’s unfair, but to protect your brand you need to develop a coherent narrative. This narrative should explain to people, in a nice, simple way so they can’t miss it, exactly how your past fits into the present. It’s like a job interview, you’re turning what could be perceived as a weakness into a compelling strength that people can remember (he’s got a different take on the industry because he has knowledge most other people don’t).

Reintroduce Yourself4. Reintroduce Yourself. The majority of people, regrettably, aren’t paying much attention to you the author says. That means their perceptions are probably a few years out of date, and it’s not their fault. With hundreds (or thousands) of Facebook friends and vague social connections, we can’t expect everyone to remember all the details of our lives. So we have to strategically re-educate our friends and acquaintances, because, especially if we’re launching a new business venture, they’re going to be our buyers and recommenders. That means a concerted effort to phone or email everyone on your list, individually, to let them know about your new direction and, where appropriate, ask for their help, advice, or business. (Blast emails are a start, but too often go unread.)

5. Prove Your Worth. Ms. Clarks says there’s a difference between knowing that you’ve launched a new business and trusting that you’ll do a good job. She explains that she may like you a lot, but unless she sees proof of your skills, she may hesitate to put her reputation on the line by sending you referrals. That’s where blogs, podcasts, videocasts, and other forms of social media come in. It’s critical to let potential customers see what you’re about and test drive your approach before they make a large commitment.

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Social Media Malware Launch Pads

Social Media Malware Launch PadsSocial networks’ role in the growth of the global virtual society has been well documented. What is not so well documented according to Help Net Security is the role social media has in spreading malware. The security and privacy mechanisms of social networking firms such as LinkedIn (LNKD), Twitter, and Facebook (FB) have proven insufficient to prevent exploitation.

Social networkThe article notes that “To Err is Human,” and human errors lead to exploitation and manipulation whether the social network is online or offline. Social media hold a plethora of personal information on the users that create the network. Individual connections between users collectively form a web of connections. To build each link between users an implicit trust is required between the two users and implicitly across the entire network. Any information provided by an individual user through chained connections becomes a part of the full network. When an attacker is able to exploit one user in the social network, they have the potential to be able to push malicious content into the network. The network’s connectivity enables the spread of exploitation. The blog explains that attackers exploit the weakest link in the chain.

The inability of users to determine the legitimacy of content flowing through the social media helps this exploitation process. Help Net Security says the biggest problem with online social networks is that they do not have built-in protection against malware. For example, current social networks do not scan the URLs and embedded content coming from third-party servers such as Content Delivery Networks. Therefore, there is no way to authenticate the URLs passed among the user objects in the social networks.

exploitation of human ignoranceThe infection process begins with the exploitation of human ignorance and followed by the spreading of the malware through the trust upon which the network is based.

The article further explains that to start the exploitation process, an attacker will pick an issue that affects human emotions to evoke a response so the social network user will do something the attacker wishes. Phishing and spam messages about weather calamities, politics, and financial transactions are used for starting infections. The author states that since social network exploitation begins by exploiting an individual’s ignorance common attack strategies have emerged.

FacebookOne of the simplest infection techniques is to put malicious URLs on a user’s Facebook message wall. When a user clicks on an illegitimate hyperlink it can result in the automatic download of malware through the browser. Some of the exploits used are:

  • Browser Exploit Packs (BEP) fingerprint the browser version and other software on the user machine. Based on this information, a suitable malware is served to the user which uses exploits for that particular browser.
  • Drive-by-Download attacks begin by visiting a malicious Malicious advertisementspage. They exploit vulnerabilities in browsers and plugins. Successful exploitation of the vulnerability causes a shellcode to run that in turn downloads the malware into the system.
  • Malicious advertisements (malvertisements) happen when an attacker injects a malicious link into a user’s Facebook wall to spread malware. The fake post is linked to a third-party website that has malicious advertisements embedded in it. These advertisements are linked to malicious JavaScripts which execute the malicious content in the browser.

Trojan horseHelp Net Security states that online social media is not harnessing the power of Safe Browsing API’s from Google (GOOG) or similar services to instantiate a verification procedure before posting a URL back to a user profile. Lack of such basic protections is a key factor in making the social networks vulnerable to exploitation.

Microsoft (MSFT) recently spotted a Facebook attack in the wild that exploited Facebook user’s trust in a social engineering campaign. The attack tries to trick Facebook users into installing a backdoor Trojan with keylogging capabilities according to the Help Net Security report.

MSFT says the Facebook Wall messages varied but they all lead to fake YouTube pages. Once there, the user is urged to download a new version of “Video Embed ActiveX Object” to play the video file. Unfortunately, the offered setup.exe file is the Caphaw Trojan.

The trojan bypasses firewalls, installs an FTP and a proxy server, and a key logger on the affected machine. Microsoft’s Mihai Calota says ” … has built-in remote desktop functionality based on the open-source VNC project.” MSFT says the Facebook attack can be used to steal money, “We received a report .. that money had been transferred from his bank account … The keylogging component, coupled with the remote desktop functionality, makes it entirely possible for this to have happened.

rb-

The articles correctly state that security and privacy mechanisms are indispensable for safe online social networking. Built-in security is necessary because attackers exploit the trust, curiosity, and ignorance of the social network customers to their own profit. Users should demand safe and secure transmission of the information and the user’s privacy. These should also be a focus of the social networking companies.

To protect themselves, users should:

  • What does thi do?Have up to date AV software running on their computers
  • Keep their browsers and operating systems fully patched
  • Change the passwords on all their sensitive accounts regularly
  • Warn friends and Facebook if an account seems to be hacked by using the Facebook “report/mark message as spam” option.
Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.