Social networking has changed the way we communicate and connect across the globe. But sharing our personal lives online can also create new opportunities for identity theft and account hacking. This infographic highlights six ways to protect your account and your identity when using social media.
Big data is currently the big thing in the digital age and it has caused a significant issue regarding privacy. With the big data revolution, it is possible to collect massive information using internet technology.
A long-standing security flaw with Instagram is now easily exploitable thanks to the InstaSheep program. You can protect your business Instagram account by following the advice laid out in this article. Failing to do so could see your account hacked and taken over for nefarious purposes.
The idea behind the concept of social WiFi is pretty simple: merchants offer free WiFi service to customers who visit their stores in exchange for customers logging into their network using their Facebook or LinkedIn accounts or by giving the merchant their email address. Once the consumer gets access to the WiFi network, they are asked to like the merchant’s Facebook page, or subscribe to a mailing list. But what you (the consumer) may or may not understand is this: by logging into the merchant’s social WiFi network, you are implicitly entering into a business arrangement with the merchant, which allows them to gather your data for marketing purposes.
As 2012 draws to a close, it’s a good time to look back and take stock of what we’ve learned over the past year in terms of online security and social media. Pinterest came on strong to turn social media on its head by introducing a new paradigm that sent social media marketers scrambling to capitalize on, competitors to learn and copy from and attackers to find new targets with.
"While you’re getting into the spirit of holiday giving, remember that’s when cybercriminals are planning to take you to the cleaners. Consumers need to understand that their online personal information can be stolen in a variety of different ways. And it’s important to know how to spot all of them."