Beware of Google+ security threats
July 25, 2011 by admin
Filed under Lingerie Events
With over three million Indian users on Google+, the site is fast becoming the new rage with the social networking crowd. However, Beware! Security solutions provider, Kaspersky Lab has warned Internet users of targeted attacks on the social networking site.
Even Experian data suggest that social media in India reaches out to 60 per cent of the online Indian audience and with Google+ still in its beta phase it is fast becoming a hunting ground for cybercriminals.
Also Read
Related Stories
News Now
Also Read
Related Stories
News Now
-
Lacklustre trade continues
-
Environment regulator soon, won’t allow permit raj: PM
-
Low internet literacy even in urban India: report
-
CSIR keen to revive sick PSU Bengal pharma cos
-
Telecom sector revenue up by 7% to Rs 2,83,000 cr
More
Fabio Assolini, malware researcher, Global Research and Analysis Team at Kaspersky Lab says: “Kaspersky Labs have identified Brazilian cybercriminals who have already started sending fake invites (to open Goggle+ accounts) with malicious links pointing to malware, specifically Trojan bankers.”
The fake invites contain infected links that redirect the user to a very common Brazilian Trojan banker file hosted at Dropbox (file sharing site). The most interesting thing to note in this message, however, is another link pointing to a form hosted at Google Docs, a free online Office suite.
The message shows the link as “send the invitation to your friends” but it is actually a fake form created to collect names and e-mail addresses of new victims. Kaspersky Lab has reported this malicious file and the fake web form to Google.
Within weeks of the launch, Google+ has reached about 20 million users, according to ComScore data. While Google+, say company executives, is still being tested with a closed group of users, some of its built-in features like Circles (where user segregates friends and followers) have serious privacy flaws.
“One of the main features of Google+ is Circles, the possibility to easily share the right content with the right people. However, once the content has been shared to a Circle, anyone can share it by default to other Circles. It boils down to the fact that the tagging feature can be bypassed by using the reshare option,” says George Lucian Petre of security software provider BitDefender.
“Let’s say user “A” shares a picture only with their “Close Friends” circle, and disables resharing. All it takes is for someone from that “Close friend” circle to tag a person from outside this circle in the picture. Once this has been done, that person can share the picture with anyone, in any way.”
Once someone has access to a picture they can save it and redistribute it, the underlying concern here is that Google+ is promoting Circles as a way to be selective about how you share content, yet sharing with other Circles is too easy.
The introduction of new social networking sites creates a haven for cybercriminals. Symantec observed that while the attacks on Facebook declined in the last two months, there was a rise in attacks on Twitter that gradually waned out, followed by a surge of attacks on YouTube. “The average life span of each social network spam attack is between 15 and 20 days,” say experts at Symantec.
Facebook has been a favourite for spammers. The newest security scare on Facebook centers on a fake application called “Google+ Direct Access”. It prompts users to visit a page on the site that they need to “like” in order to see. When they do that, they are handing over personal information to unknown developers of the dodgy app. Users are then offered a fake invitation to try out Google+ — a way to spam their friends with invites to try out the app.
According to the BitDefender team, 23 per cent of Facebook users have had a friend who has been infected with some type of social spam. The sentiments are echoed by internet security firm, Sophos. “You should also exercise great caution about what third-party apps you allow to access your Facebook records, especially when they are demanding the ability to post to your wall and grab personal information,” says Graham Cluley, senior technology consultant at Sophos.
Kaspersky’s Assolini advises that those interested in joining Google+ should explores the social media site on a secure computer for the first time, while being cautious at all times of pop-up blocks and links that insist you to re-direct to a new page. Kaspersky Lab also urges users to not believe in “official-looking” invites received via e-mails.
The worrying news is the rising use of social networks from unsecured mobile devices. Security firm Symantec has observed a 43 per cent increase in mobile vulnerabilities in 2010, according to the latest Internet Security Threat Report.
Shantanu Ghosh, VP (India Product Operations), Symantec says: “Malicious authors have taken a variety of popular free apps from the OS market and bundled them with malware capable of rooting the phone, harvesting data or opening a backdoor. Symantec has been seeing a lot of this lately — threats in which authors release them on unofficial Android marketplaces. As mobile security becomes a growing concern, consumers should look at securing devices and confidential data on them.”
<!–
<!–
google_ad_client = “pub-1723933259695999″;
/* Company_468_storypage 468×60, created 9/26/08 */
google_ad_slot = “7874149741″;
google_ad_width = 468;
google_ad_height = 60;
–>
Other Stories
-
Lacklustre trade continues
-
Environment regulator soon, won’t allow permit raj: PM
-
Low internet literacy even in urban India: report
-
CSIR keen to revive sick PSU Bengal pharma cos
-
Telecom sector revenue up by 7% to Rs 2,83,000 cr
<!–
More
rr –>
Advertisements
Win a Business Class ticket to the US on the A380…
One of the highest concentration of ICT activity and employment
An accelerated entry into CIMA for CAs. Know more.
Experience the best of business luxury…
Technology that’s got everyone talking. Click here
Enjoy a family vacation in Goa like never before…
Now MBAs can fast-track into CIMA. Find out how.
Shortcut to CIMA for ICWAI members/finalists.
Discover More With Cloud Power Click here to know more
Experience the joy of rains on the mountains…
Cheapest big car with 3 years warranty!
We integrate Security with your business. Click here
Steel lending Strength to the nations’s defence. Click here
Are you ready for the trip of your life ?
Enhance business productivity with cutting-edge technologies….
CFA Institute, Enroll Before 24th August.
To us your health comes first. Know More.
Giftwithlove.com: Anniversary/ B’day/ Midnight Flowers cakes delivery in India
When we heal the earth, we heal ourselves.
Share and Enjoy
That Tweet Just Doomed Your Wall Street Career: William D. Cohan
July 25, 2011 by admin
Filed under Lingerie Events
As if it weren’t difficult enough to
find a job in this still-struggling economy, prospective
employees have a new hurdle to overcome: the dreaded — and
highly sophisticated — social-media background check.
Thanks to an increasingly popular service provided by
Social Intelligence Corp., a year-old company in Santa Barbara,
California, an applicant’s every faux pas, every bit of perverse
logic, every bit of a tongue-in-cheek comment that falls flat –
to say nothing of overt or implied prejudice and lewd personal
photographs — can now be easily scraped off Internet networking
sites including Facebook, Tumblr, Twitter and LinkedIn, and
compiled in an attractive dossier that can easily be used to
zotz you from any potential job.
We have heard warnings for years, of course, about how
seemingly innocuous, or highly personal, utterances shared with
friends on social networking websites can live on forever and
potentially doom a budding professional career. And we were all
recently treated to the jarring spectacle of Congressman Anthony
Weiner’s well-deserved self-immolation — in 140 characters or
less.
No Buried Secrets
But these days, thanks to Social Intelligence, whatever
challenges employers once faced by having to search site after
site to find information about prospective employees has been
solved by — and outsourced to — the company’s algorithms, an
inevitable consequence of the power of search engines in the
Internet Age.
“We are not detectives,” Max Drucker, the chief executive
officer of Social Intelligence, told the New York Times in a
much discussed article. “All we assemble is what is publicly
available on the Internet today.” A sobering observation for
sure.
If the message were not already crystalline, there is no
longer any doubt that extreme vigilance with regard to social
networking is no longer an option — it is a necessity. Who
knows how many budding presidents of the U.S. or CEO’s of
Goldman Sachs have already been nipped in the bud by Drucker’s
handiwork? He told the Times that he found one prospective
employee searching for OxyContin on Craigslist, and other
background checks found damning evidence of racist and anti-
Semitic remarks.
Good Old Days
Once upon a time, before the Internet, such sleuthing would
have been nearly impossible, meaning that many people happily
and productively employed in the highest ranks of corporate
America no doubt have committed inchoate acts of foolishness
that today would be punished early and often.
Can this be considered progress or evidence that Big
Brother is very much a part of daily life? To help people begin
to grapple with the implications of this kind of digital
monitoring, a review of a few of the more insightful online
comments about the Times story is instructive.
Basic Internet Hygiene
A “John Doe,” in New York City, wrote that he thought
schools should teach “basic internet hygiene,” including to
“assume that everything you post under your true name will
forever be in the public domain, because, well, it will be” and
to “never post a photo of yourself online unless it is bland and
you can absolutely control access to it.”
“Doe” has little use for social networking. “In general,
the less of yourself that appears online, the better off you
will be,” he wrote. “Facebook? No thanks.” He also wrote that he
expected legislators to do little to protect us from the more
heinous aspects — mistaken identity, for instance — of Social
Intelligence’s dossiers. “If they get it wrong,” he wrote of
Social Intelligence, it could destroy “a person’s life with no
possibility of appeal. Naturally, our leaders in Congress can be
expected to do nothing about this. After all, we are not wealthy
bankers.”
Very Slippery Slope
Others commenters simply see this new service as the
beginning of a very slippery slope. “This is us, giving up a
little essential liberty — one photo, one text, one post, one
status update, one Tweet at a time,” “K. Johnson” wrote. Added
“DCS”: “I’ve never said or done anything online that anyone
could possibly take offense to. I just hope I don’t have to
interview with the one person who takes offense at people who
have never said or done anything offensive online.”
“John,” in Northern California, worries that the new
dossiers will be used, and candidates rejected, but no
fingerprints will ever be left behind. “They won’t tell you
that’s why they aren’t hiring you,” he wrote. “You’ll just be
skipped over, the same way people or groups routinely are now if
they don’t fit a certain ethnic, racial or physical (fat, thin)
profile. They won’t admit this, however, and you can’t prove
it.”
A Private Diary
Then there is the slightly perverse but well-taken logic
that “Gramercy” displayed in a comment. “I actually applaud
this,” it read. “It may be because I consider myself as an adult
who uses social media just to keep in touch or because I am
getting older, but I am actually glad to see that indiscretions
and bad judgment exhibited online can and will be held against
those pinheads who use the Internet as their private diary. And
while I am at it, we should set standards: anyone who has seen a
full episode of Jersey Shore or the Housewives of whatever, or
can identify the names of the Kardashians should not be allowed
to hold a real job or to drive for that matter.”
Given the existence of companies like Social Intelligence,
it just makes common sense not to put anything in an e-mail or
social networking post that you wouldn’t be proud to see on the
front page of the New York Times.
(William D. Cohan, a former investment banker and the
author of “Money and Power: How Goldman Sachs Came to Rule the
World,” is a Bloomberg View columnist. The opinions expressed
are his own.)
Read more Bloomberg View columns.
To contact the writer of this column:
William D. Cohan at wdcohan@yahoo.com.
To contact the editor responsible for this column:
Tobin Harshaw at
tharshaw@bloomberg.net.
Please enable JavaScript to view the comments powered by Disqus.