{"id":4440,"date":"2012-02-09T19:10:28","date_gmt":"2012-02-10T00:10:28","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2022-08-19T16:25:50","modified_gmt":"2022-08-19T20:25:50","slug":"social-network-safety-tips","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/social-network-safety-tips\/","title":{"rendered":"Social Network Safety Tips"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-98417\" title=\"Social Network Safety Tips\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Social-Media-Collage-5.jpg?resize=143%2C110&#038;ssl=1\" alt=\"Social Network Safety Tips\" width=\"143\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Social-Media-Collage-5.jpg?resize=150%2C115&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Social-Media-Collage-5.jpg?resize=75%2C58&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Social-Media-Collage-5.jpg?w=250&amp;ssl=1 250w\" sizes=\"auto, (max-width: 143px) 100vw, 143px\" \/>In case you have lived under a rock, <a title=\"Social network\" href=\"http:\/\/en.wikipedia.org\/wiki\/Social_network\" rel=\"wikipedia\">social networking<\/a> sites are very popular. <a title=\"LinkedIn\" href=\"https:\/\/www.linkedin.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a> (<a title=\"NYSE : LNKD\" href=\"https:\/\/www.investopedia.com\/news\/linkedin-delist-nyse-dec-19-lnkd-msft\/\" target=\"_blank\" rel=\"noopener noreferrer\">LNKD<\/a>) has over 100 million users; <a title=\"blog.kissmetrics.com\" href=\"https:\/\/web.archive.org\/web\/20150906075257\/https:\/\/blog.kissmetrics.com\/twitter-statistics\/\" target=\"_blank\" rel=\"noopener noreferrer\">1 billion tweets<\/a> are posted on <a title=\"Twitter\" href=\"https:\/\/twitter.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Twitter<\/a> each week and <a title=\"Facebook\" href=\"https:\/\/facebook.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Facebook<\/a> is approaching <a title=\"mashable.com\" href=\"https:\/\/web.archive.org\/web\/20200805072050\/https:\/\/mashable.com\/2012\/01\/12\/facebook-1-billion-users\/\" target=\"_blank\" rel=\"noopener noreferrer\">1 billion users<\/a>. Despite these numbers, they also open users up to more computer viruses and online threats according to a <a title=\"www.net-security\" href=\"https:\/\/web.archive.org\/web\/20110224203142\/http:\/\/www.net-security.org:80\/secworld.php?id=10231\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a> from <a title=\"WebRoot\" href=\"http:\/\/www.webroot.com\/En_US\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Webroot<\/a>. A <em>Help Net Security<\/em> article details a few of the threats social network users face. They include:<\/p>\n<p><strong><a href=\"http:\/\/nakedsecurity.sophos.com\/2012\/01\/17\/how-koobface-malware-gang-unmasked\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-13881 \" title=\"social_networking_malware\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/01\/social_networking_malware.jpg?resize=85%2C85&#038;ssl=1\" alt=\"Social networking malware\" width=\"85\" height=\"85\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/01\/social_networking_malware.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/01\/social_networking_malware.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/01\/social_networking_malware.jpg?w=170&amp;ssl=1 170w\" sizes=\"auto, (max-width: 85px) 100vw, 85px\" \/><\/a>Bogus e-mails from &#8220;friends&#8221;:<\/strong> The blog warns that hackers lure users into taking actions they shouldn&#8217;t. They do this by making it seem as if a friend within their social network has sent them an in-network e-mail. Only the e-mail is from a hacker who&#8217;s hijacked the friend&#8217;s account.<\/p>\n<p><strong>Malicious links or bait:<\/strong> This type of scam involves personal messages to users. The messages encourage victims to click on a link. Doing so can do a number of things including sending users to a fake website. There they are prompted to download and install an executable file that turns out to be a virus that infects the user&#8217;s PC explains the author.<\/p>\n<p><strong><a href=\"http:\/\/news.ucsc.edu\/2009\/10\/3278.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-13803 \" title=\"ID_theft\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/01\/ID_theft-e1563848947222-150x126.jpg?resize=100%2C84&#038;ssl=1\" alt=\"Identity theft\" width=\"100\" height=\"84\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/01\/ID_theft-e1563848947222.jpg?resize=150%2C126&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/01\/ID_theft-e1563848947222.jpg?resize=75%2C63&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/01\/ID_theft-e1563848947222.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>Identity theft:<\/strong> Social network users who share personal information with their entire network of friends leave themselves vulnerable to hackers. Oversharing details like birth dates, addresses, pets&#8217; names, and other details make it easier for attackers to guess your password and access Yout profile based on the personal information shared reports <em>Help Net Security.<\/em><\/p>\n<p>To help increase your PC protection, Webroot advises users to install updatable Internet security software and keep a\u00a0few simple rules in mind, such as:<\/p>\n<p><strong>Be skeptical<\/strong> \u2013 E-mails, friend requests, Web site links, and other items from sources you do not know could be malware.<\/p>\n<p><strong><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-13879 \" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"social_networking_privacy\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/01\/social_networking_privacy.jpg?resize=106%2C81&#038;ssl=1\" alt=\"Social networking privacy\" width=\"106\" height=\"81\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/01\/social_networking_privacy.jpg?resize=150%2C114&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/01\/social_networking_privacy.jpg?resize=75%2C57&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/01\/social_networking_privacy.jpg?w=398&amp;ssl=1 398w\" sizes=\"auto, (max-width: 106px) 100vw, 106px\" \/>Use privacy settings<\/strong> \u2013 <a title=\"Social networking service\" href=\"http:\/\/en.wikipedia.org\/wiki\/Social_networking_service\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Social Networking sites<\/a>, such as Facebook and Twitter, offer privacy settings that let you control who sees your posts and personal information. Use them to control who access to your page, contact information, etc.<\/p>\n<p><strong>Protect your password<\/strong> \u2013 Choose your passwords wisely, incorporate numbers, letters, and special characters, and never use the same password at more than one site.<\/p>\n<p>For those who may need new internet security software, you should select a program that has a multi-level security program to:<\/p>\n<ul>\n<li>Block viruses, spyware, spam, Trojans, worms, rootkits, and keyloggers;<\/li>\n<li>Make your PC invisible to hackers;<\/li>\n<li>Encrypt passwords and remember them for you;<\/li>\n<li>Offer multi-layer identity protection;<\/li>\n<li>Provide firewall security.<\/li>\n<\/ul>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20120702063843\/http:\/\/www.pcworld.com:80\/businesscenter\/article\/247744\/avira_teams_with_secureme_for_facebook_security.html\" target=\"_blank\" rel=\"noopener noreferrer\">Avira Teams with secure.me for Facebook Security<\/a> (pcworld.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social network safety tips Use privacy settings on FB TWTR passwords with numbers letters security software to Block malware viruses spam<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2197,104,1096,1087,317,696,685,4,564,60,1063],"class_list":["post-4440","post","type-post","status-publish","format-standard","hentry","category-security","tag-2197","tag-facebook","tag-fb","tag-internet-security","tag-linkedin","tag-lnkd","tag-myspace","tag-security","tag-social-media","tag-twitter","tag-webroot"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/4440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=4440"}],"version-history":[{"count":17,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/4440\/revisions"}],"predecessor-version":[{"id":130419,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/4440\/revisions\/130419"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=4440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=4440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=4440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}