Posts Tagged ‘Twitter’

Amanda Rieth

Above is an old photo of the 7 year old daughter of Amanda Rieth who at the time was battling Stage IV neuroblastoma, this beautiful little girl is now 13 and has shown no signs of the cancer since 2007.

But this photo is still circulating around social networks without the Rieth family’s consent and being used by scammers to tug on your heartstrings. And it works. Requests to like and share this photo and to pray for this little girl are met with a strong response from good-hearted people.

This isn’t the only scam campaign designed to harvest Facebook likes and shares. (more…)

Internet PrivacyThe internet is a great place to share your thoughts or photos of special events and celebrations. Many of us regularly upload personal details and images that we are willing to share with our friends using various social media outlets such as Facebook and Twitter.

The level of personal data and information that we provide through the internet is used in a variety of ways, some of which we are comfortable with such as providing personal details for account verification or setting up an online account, but there are also legitimate concerns that some of this data is collected and used against our wishes, and this is beginning to make a growing number of us feel more than a little uncomfortable.

Personal financial information should still quite rightly remain off-limits but the details held about you on sites like Facebook are marketing gold, allowing companies who gain access to this data to target people with adverts and offers that match your personal likes and interests. (more…)

Twitter hackedImmediately after the two-step authentication on the Twitter site specialists noticed a strange procedure to activate it.

Enough to provide a phone number on the site – and click “OK”. That is not even necessary to enter the code, which came on the phone to confirm the correctness of the introduction of the telephone number. The same procedure applies when removing services.

Sean Sullivan of F-Secure has published an article describing the two-step authentication Twitter vulnerabilities and possible attack scenarios. (more…)

Doctor WebThe company “Dr Web” found a previously unknown functionality in the new malicious program for Facebook.

Trojan.Facebook.311 can not only publish the name of the new user’s status, join groups, post comments, but spamming social networks Twitter and Google Plus.

Trojan Trojan.Facebook.311 is written in JavaScript language for popular web browsers Google Chrome and Mozilla Firefox. Attackers are spreading Trojan using social engineering techniques – unwanted programs to access the system using a special application installer that masquerades as a “security update for watching videos.” It is noteworthy that the installer is digitally signed by the company Updates LTD, owned by Comodo. Add-ins are called Chrome Service Pack and Mozilla Service Pack respectively. In order to spread malicious Trojan created a special page on the Portuguese language, focused, most likely, on the Brazilian users of Facebook. (more…)

Twitter hackedThe attack can be achieved by the introduction of Javascript code in your account page in the social network.

In one of the most popular social networks Twitter world was discovered malware aimed at social network users. This was reported by Tanya Shafir,  Trusteer’s researcher.

As declare in the company, the malicious software carries out MitB-attacks, using the web browser of the infected computers thanks to what get access to the account to Twitter from which the attackers and spread malicious entries. (more…)

Twitter hackedUnidentified attackers carried out a number of successful attacks on Twitter.

February 1 resource administration Twitter issued a statement about finding security incident related to the attacks on the servers of popular platforms.

“This week, we found a number of unusual access attempts, which allowed us to identify attempts to gain unauthorized access to user data Twitter. We found one active attack and managed to stop it almost immediately. However, our investigation revealed that the attackers were able to gain access to restricted user data, 250,000 users: user names, email addresses, session tokens and encrypted passwords, “– said in a statement.

This is not the first hacker attack on the most popular networks and resources of the United States. Recall that this week it became known compromised computers publications New York Times and Wall Street Journal. These developments have not gone unnoticed U.S. authorities. According to the administration of U.S. President Barack Obama (Barack Obama), discussions between senior officials of the U.S. and China on the issue of the large number of hacker attacks on U.S. companies and government agencies have not yielded the expected results. In connection with this controller began to consider possible sanctions, which the Government will respond to such incidents of information security. (more…)

Twitter spamMessage contains a link to a fake life, the transition to which the victim’s computer becomes a participant in a botnet.

Tags: Twitter, spam, Facebook

As the expert of GFI Labs Chris Boyd, in Twitter discovered a new spam campaign, distributing links to malicious resources under the guise of placing notices in the social network Facebook video file, which allegedly depicted the user to be notified. (more…)

McAfee logoIn the second quarter of 2012, the company’s specialists McAfee was found on 1.5 million more malware than in the first quarter of 2012, number of malicious programs has grown at a rate of approximately 100 thousand samples per day – such data is presented in the report on threats to McAfee. “This increase in the number of detected malware has not been seen for four years,” – the company said.

“Over the last quarter we have often found good examples of malware threatening ordinary consumers, businesses and critical infrastructure,” – said Vincent Weafer, senior vice president of McAfee Labs. – Some of the biggest attacks using malware in the second quarter of 2012 include Flashback, aimed at device Macintosh, and Flame, the object of which was the energy sector. This is a good illustration of the growing number of threats. ” (more…)