Posts

Showing posts from October, 2011

How to Make Mobile Communication Safe

Image
In our days people rely on mobile devices to access the web, look for different information and keep in touch with family and friends. That’s why it is so important to know how to behave online, how to manage your Internet reputations and how to put your personal safety on the first place when communicating on a mobile device. First of all, think twice before sharing a thought or a picture. Think about your colleagues, grandmother, or teacher receiving them. Are you sure that what you’re sharing is suitable for anyone to see? Then it is highly recommended to protect your personal data. So, when you send something like emails, messages, pictures or instant messages to someone who isn’t a trusted friend or a member of your family, never disclose any personal data that may be used either to figure out your physical location or to exploit you. It is also recommended to control negativity and think twice about who deserves to communicate with and who doesn’t. A number of Internet services a...

Norton Overestimated Cyber Crime Figures

Norton, the consumer division of Symantec, was noticed to overestimate some online security figures. For example, for the last month the net saw the stories that claimed digital crimes costs society $388 billion per year. These figures are tagged onto to stories about cyber crimes. These figures can be found in a Norton survey report asking around 20,000 people in two dozen countries about their experience with digital crime. The survey asked the respondents to evaluate both direct and indirect losses they think were caused by cyber crime. Norton concluded that punters lost $114 billion per year, including consumer losses that were reimbursed – the most widespread case of such kind of crime is credit card fraud. However, the company seemed to fudge things a little: for example, it decided that online harassment was also a cyber crime, as well as being approached on the Internet by sexual predators. Moreover, the term “fraud” was defined so widely that it would have covered all credit c...

Russian Hacker Made $3,000,000 with Botnet

Image
According to the latest media reports, it has been recently uncovered how far one of the online criminal’s reach went. An individual in his 20s, somewhere in the Russian Federation, used a bunch of criminal toolkits to help him earn money, which resulted in attacking more than 90 countries and stealing $3.2 million in only six months. The security experts believe that Soldier employed a network of money mules, as well as had an accomplice presumably residing in the states. Overall, since this past January, the hacker has been pocketing $17,000 per day. This is what threat researcher Loucif Kharouni pointed out in his research, describing the antics of some Russian hacker known online as Soldier. The hacker was using SpyEye and ZeuS binaries and blackhat SEO in his illegal activity across the Internet. He allegedly traded in traffic with a number of other hackers online, employing various malware to extract money from multiple accounts (most of them located in the United States) and ste...

Twitter Will Allow Advertising in Timeline

Image
The worldwide-known micro-blogging service Twitter will now let brands to advertise in users’ timelines, even if the users don’t follow the advertiser. Back in July this year, Twitter introduced promoted tweets as its unique form of advertising in users’ timelines. The users of the service could see some sponsored messages in their timelines, but all those messages were from brands and outfits they already followed. Earlier, promoted tweets could only be seen in search results or on the top of the Twitter trends lists. However, according to the new announced system, the users of the service are now able to be served advertisements from brands in their personal timelines, regardless of whether they even follow them or not. Apparently, this will be the first time that Twitter users are exposed to advertisements in their timelines from the companies they don’t even follow. The company’s representative claimed that it would make such feature available to a single-digit percentage of its gl...

Facebook Patented Tracking Method

Image
Although the social networking service Facebook has previously denied that it was interested in what its members do on other online locations, the news is that some evidence has been found that Facebook had developed its own technology to do just that. One of the Australian bloggers has found a patent that was dated October 2011. According to the information the patent contained, Facebook has described there a method to monitor information about the activities of the social network’s members while on another domain. The blogger explained that tracking cookies are able to monitor Facebook users whenever they surf any online services having an integrated Facebook “like” button. One of the Illinois residents has already filed a lawsuit over such tracking on behalf of Facebook users in the United States, so he is currently seeking class action status. As for the most popular social network in the world, it previously claimed that cookies were tracking users by mistake. However, the latest ...