SlideShare a Scribd company logo
1 of 49
Copyright © 2014 CyberSecurity Malaysia
Internet and Computer Security Awareness
Facebook Security
Facebook Statistics
3
55%
45%
32.9%
31.6%
Facebook’s Privacy Policy
Copyright © 2014 CyberSecurity Malaysia
Facebook’s Terms & Policies
Copyright © 2014 CyberSecurity Malaysia
Facebook’s Terms of Service
Copyright © 2014 CyberSecurity Malaysia
Security Setting
Copyright © 2014 CyberSecurity Malaysia
Privacy Setting
Copyright © 2014 CyberSecurity Malaysia
Timeline & Tagging Setting
Copyright © 2014 CyberSecurity Malaysia
Some Stuff About Facebook
Some Stuff About Facebook User
Some Stuff About Facebook User #1
Some Stuff About Facebook User #2
Some Stuff About Facebook User #3
Some Stuff About Facebook User #4
Some Stuff About Facebook User #5
Track Your Phone & Laptop
Track Your Apple Computer
(02) Rogue Application
If you're one of the millions of teenybopper fans of Justin Bieber, then you may
be tempted into clicking onto the link to find out more…
Bieberflirting - Facebook App
Are you looking for this software called “007 Facebook hack
v1.0″ also known as “James bond’s Facebook hack” that can
hack your friends Facebook password in minutes?
Facebook Hacking Software
F’acebook Antivirus Software
Copyright © 2011 CyberSecurity Malaysia
Do not install F’acebook Antivirus. It is a deceptive rogue
application that, as soon as you install it, will tag every single one of
your friends in a photo in batches of about 20. It then posts that
photo to your wall.
Keylogging - For hacking Facebook account
Keylogging (keylogger) is the simplest and the most effective way of hacking
Facebook passwords. You need not be an expert to use it. Anyone with basic
knowledge of computer can install and use it with ease.
Copyright © 2014 CyberSecurity Malaysia
Keylogging - For hacking Facebook account
Keylogging (keylogger) is the simplest and the most effective way of hacking
Facebook passwords. You need not be an expert to use it. Anyone with basic
knowledge of computer can install and use it with ease.
Copyright © 2014 CyberSecurity Malaysia
(03) Facebook Gold Member Account
The latest hoaxing craze circulating Facebook is groups and fan
pages claiming to Facebook offering free or limited time upgrades
to a supposed Gold account. There is no Facebook Gold Account.
Copyright © 2011 CyberSecurity Malaysia 26
(04) “GET A FREE Facebook T-SHIRT” Scam
Copyright © 2011 CyberSecurity Malaysia 27
(05) “My total Facebook profile views” - Survey Scam
28
(06) “Koobface” spreading through FB Message
Koobface is a computer worm that targets Facebook and other social networking
websites. It spreads on Facebook by posting spammy messages on behalf of
people.
29
The Koobface Virus
30
Facebook now has a dislike button!
Click 'Enable Dislike Button' to turn on the new feature!
(07) Facebook ‘Dislike’ Button
31
(08) VERIFYING YOUR ACCOUNT
32
if you happen see a message like the following posted on your
wall by one of your Facebook friend’s, don’t click on the link.
(09) JavaScriptJacking Scam
33
JAVA Script of “Revolving Images” Spam
Copy the Script and Paste it in the address bar (where you enter the website
address) and Hit Enter. This piece of code pulls off all the images from your web
page and rotates them in a circle. If you look carefully in the above code, its
rotating the HTML “img” tag.
34
JAVA Script of “Revolving Images” Spam
35
JAVA Script of “Revolving Images” Spam
36
(10) Beware of Hot Girls
Copyright © 2011 CyberSecurity MalaysiaCopyright © 2014 CyberSecurity Malaysia
Copyright © 2011 CyberSecurity MalaysiaCopyright © 2014 CyberSecurity Malaysia
Facebook Safety Center
Copyright © 2011 CyberSecurity MalaysiaCopyright © 2014 CyberSecurity Malaysia
Facebook Safety Page
Facebook Security Page
Copyright © 2014 CyberSecurity Malaysia
Copyright © 2011 CyberSecurity MalaysiaCopyright © 2011 CyberSecurity Malaysia
Facebook Help Center
Copyright © 2011 CyberSecurity MalaysiaCopyright © 2011 CyberSecurity Malaysia
Report a Deceased Person’s Profile
Report a Violation
Copyright © 2014 CyberSecurity Malaysia
Copyright © 2011 CyberSecurity MalaysiaCopyright © 2011 CyberSecurity Malaysia
Report Compromised Account
How do I permanently delete my account?
Copyright © 2014 CyberSecurity Malaysia
BitDefender Safego
Copyright © 2014 CyberSecurity Malaysia
AVG LinkScanner
Copyright © 2014 CyberSecurity Malaysia
Copyright © 2011 CyberSecurity MalaysiaCopyright © 2011 CyberSecurity Malaysia
Norton Safe Web for Facebook
Copyright © 2013 CyberSecurity Malaysia 49

More Related Content

What's hot

Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeAdeel Rasheed
 
Benefits of investing in network security for it business
Benefits of investing in network security for it businessBenefits of investing in network security for it business
Benefits of investing in network security for it businessVijilan IT Security solutions
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
 
Ransomware attacks reveton
Ransomware attacks revetonRansomware attacks reveton
Ransomware attacks revetonMumbere Joab
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!TalhaMTZ
 
Information Security: Fundamental
Information Security: FundamentalInformation Security: Fundamental
Information Security: FundamentalICT Watch
 
Cryptojacking
CryptojackingCryptojacking
CryptojackingXnews
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!aimane
 
It's not about you: Mobile security in 2016
It's not about you: Mobile security in 2016It's not about you: Mobile security in 2016
It's not about you: Mobile security in 2016NowSecure
 
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network SecurityPatten John
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attacki-engage
 

What's hot (19)

Ransomware
RansomwareRansomware
Ransomware
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Benefits of investing in network security for it business
Benefits of investing in network security for it businessBenefits of investing in network security for it business
Benefits of investing in network security for it business
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Ransomware attacks reveton
Ransomware attacks revetonRansomware attacks reveton
Ransomware attacks reveton
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information Security: Fundamental
Information Security: FundamentalInformation Security: Fundamental
Information Security: Fundamental
 
Cryptojacking
CryptojackingCryptojacking
Cryptojacking
 
Ransomware - Friend or Foe
Ransomware - Friend or FoeRansomware - Friend or Foe
Ransomware - Friend or Foe
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
 
Aiman
AimanAiman
Aiman
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
It's not about you: Mobile security in 2016
It's not about you: Mobile security in 2016It's not about you: Mobile security in 2016
It's not about you: Mobile security in 2016
 
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attack
 
ICT ~Hacking~
ICT ~Hacking~ICT ~Hacking~
ICT ~Hacking~
 

Viewers also liked

How to disable SSLv3 in Chrome Firefox IE
How to disable SSLv3 in Chrome Firefox IEHow to disable SSLv3 in Chrome Firefox IE
How to disable SSLv3 in Chrome Firefox IECheapSSLsecurity
 
Facebook privacy presentation
Facebook privacy presentationFacebook privacy presentation
Facebook privacy presentationDianne McKenzie
 
ADAB OF DIGITAL AWARENESS
ADAB OF DIGITAL AWARENESSADAB OF DIGITAL AWARENESS
ADAB OF DIGITAL AWARENESSapplephye
 
Digital awareness tutor day
Digital awareness tutor dayDigital awareness tutor day
Digital awareness tutor daySimon Conlin
 
Spywares & Keyloggers
Spywares & KeyloggersSpywares & Keyloggers
Spywares & KeyloggersJithin James
 
Facebook Privacy Issues
Facebook Privacy IssuesFacebook Privacy Issues
Facebook Privacy IssuesBusinessOnline
 
Building Brand Awareness in a digital world - 18th March 2013
Building Brand Awareness in a digital world - 18th March 2013Building Brand Awareness in a digital world - 18th March 2013
Building Brand Awareness in a digital world - 18th March 2013Precedent
 
OWASP Ireland June Chapter Meeting - Paul Mooney on ARMOR & CSRF
OWASP Ireland June Chapter Meeting - Paul Mooney on ARMOR & CSRFOWASP Ireland June Chapter Meeting - Paul Mooney on ARMOR & CSRF
OWASP Ireland June Chapter Meeting - Paul Mooney on ARMOR & CSRFPaul Mooney
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
Threat Modeling And Analysis
Threat Modeling And AnalysisThreat Modeling And Analysis
Threat Modeling And AnalysisLalit Kale
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpointmyra14
 

Viewers also liked (19)

How to disable SSLv3 in Chrome Firefox IE
How to disable SSLv3 in Chrome Firefox IEHow to disable SSLv3 in Chrome Firefox IE
How to disable SSLv3 in Chrome Firefox IE
 
Facebook privacy presentation
Facebook privacy presentationFacebook privacy presentation
Facebook privacy presentation
 
Hacking with a keylogger.
Hacking with a keylogger.Hacking with a keylogger.
Hacking with a keylogger.
 
ADAB OF DIGITAL AWARENESS
ADAB OF DIGITAL AWARENESSADAB OF DIGITAL AWARENESS
ADAB OF DIGITAL AWARENESS
 
Digital awareness tutor day
Digital awareness tutor dayDigital awareness tutor day
Digital awareness tutor day
 
Spywares & Keyloggers
Spywares & KeyloggersSpywares & Keyloggers
Spywares & Keyloggers
 
Facebook Privacy Issues
Facebook Privacy IssuesFacebook Privacy Issues
Facebook Privacy Issues
 
05 wi fi network security
05 wi fi network security05 wi fi network security
05 wi fi network security
 
Building Brand Awareness in a digital world - 18th March 2013
Building Brand Awareness in a digital world - 18th March 2013Building Brand Awareness in a digital world - 18th March 2013
Building Brand Awareness in a digital world - 18th March 2013
 
OWASP Ireland June Chapter Meeting - Paul Mooney on ARMOR & CSRF
OWASP Ireland June Chapter Meeting - Paul Mooney on ARMOR & CSRFOWASP Ireland June Chapter Meeting - Paul Mooney on ARMOR & CSRF
OWASP Ireland June Chapter Meeting - Paul Mooney on ARMOR & CSRF
 
IT Security Awareness
IT Security AwarenessIT Security Awareness
IT Security Awareness
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Threat Modeling And Analysis
Threat Modeling And AnalysisThreat Modeling And Analysis
Threat Modeling And Analysis
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Facebook privacy and security
Facebook privacy and securityFacebook privacy and security
Facebook privacy and security
 
Facebook ppt
Facebook pptFacebook ppt
Facebook ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpoint
 

Similar to 06 facebook security

obtain additional security
obtain additional security 
obtain additional security
obtain additional security offbeatnominee633
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security snobbishmishap958
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdfhmooodes115
 
Black Hat Protection - SEO Campixx 2011
Black Hat Protection - SEO Campixx 2011Black Hat Protection - SEO Campixx 2011
Black Hat Protection - SEO Campixx 2011Andre Alpar
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrSurajGurushetti
 
1_3_Cyber_Defense_Principle.pptx
1_3_Cyber_Defense_Principle.pptx1_3_Cyber_Defense_Principle.pptx
1_3_Cyber_Defense_Principle.pptxRicaElaineLubasan
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing AttacksPECB
 
How to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfHow to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfvenkatprasadvadla1
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfInfosec Train
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetAbhinav Mishra
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
Check your network security
Check your network securityCheck your network security
Check your network securityYour Virtual CTO
 
Security presentation
Security presentationSecurity presentation
Security presentationSmart Mirror
 

Similar to 06 facebook security (20)

obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
Data breach
Data breachData breach
Data breach
 
Blogging today
Blogging todayBlogging today
Blogging today
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdf
 
Click or Not to Click (Cyber Security Awareness )
Click or Not to Click (Cyber Security Awareness )Click or Not to Click (Cyber Security Awareness )
Click or Not to Click (Cyber Security Awareness )
 
Avoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile WebAvoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile Web
 
Black Hat Protection - SEO Campixx 2011
Black Hat Protection - SEO Campixx 2011Black Hat Protection - SEO Campixx 2011
Black Hat Protection - SEO Campixx 2011
 
kiran.ppt
kiran.pptkiran.ppt
kiran.ppt
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
 
1_3_Cyber_Defense_Principle.pptx
1_3_Cyber_Defense_Principle.pptx1_3_Cyber_Defense_Principle.pptx
1_3_Cyber_Defense_Principle.pptx
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
 
How to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfHow to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdf
 
Cybersecurity Basics.pptx
Cybersecurity Basics.pptxCybersecurity Basics.pptx
Cybersecurity Basics.pptx
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Check your network security
Check your network securityCheck your network security
Check your network security
 
Security presentation
Security presentationSecurity presentation
Security presentation
 

More from Ministry of Education Malaysia

More from Ministry of Education Malaysia (20)

Borang permohonan guru cemerlang 2014
Borang permohonan guru cemerlang 2014Borang permohonan guru cemerlang 2014
Borang permohonan guru cemerlang 2014
 
Fail Meja - Panduan Penyediaan
Fail Meja - Panduan PenyediaanFail Meja - Panduan Penyediaan
Fail Meja - Panduan Penyediaan
 
Fail Meja - Panduan Penyediaan
Fail Meja - Panduan PenyediaanFail Meja - Panduan Penyediaan
Fail Meja - Panduan Penyediaan
 
Fail Meja Ketua Panitia TMK
Fail Meja Ketua Panitia TMKFail Meja Ketua Panitia TMK
Fail Meja Ketua Panitia TMK
 
Panduan Fail Meja
Panduan Fail MejaPanduan Fail Meja
Panduan Fail Meja
 
Modul 1 Scratch
Modul 1 ScratchModul 1 Scratch
Modul 1 Scratch
 
00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program
 
00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program
 
04 secure the human
04 secure the human04 secure the human
04 secure the human
 
02 power search using google
02 power search using google02 power search using google
02 power search using google
 
01 Cyber Safe Malaysia Website Fundamentals
01 Cyber Safe Malaysia Website Fundamentals 01 Cyber Safe Malaysia Website Fundamentals
01 Cyber Safe Malaysia Website Fundamentals
 
Manual Panduan Membina Laman FROG VLE
Manual Panduan Membina Laman FROG VLEManual Panduan Membina Laman FROG VLE
Manual Panduan Membina Laman FROG VLE
 
Mtg v5.0 full pdf bm
Mtg v5.0 full pdf bmMtg v5.0 full pdf bm
Mtg v5.0 full pdf bm
 
Takwim Penggal Persekolahan 2014
Takwim Penggal Persekolahan 2014 Takwim Penggal Persekolahan 2014
Takwim Penggal Persekolahan 2014
 
Hari ke-4: Pembentangan Kumpulan 7
Hari ke-4: Pembentangan Kumpulan 7Hari ke-4: Pembentangan Kumpulan 7
Hari ke-4: Pembentangan Kumpulan 7
 
Pembentangan TMK
Pembentangan TMKPembentangan TMK
Pembentangan TMK
 
Makna "PLuG TMK"...
Makna "PLuG TMK"...Makna "PLuG TMK"...
Makna "PLuG TMK"...
 
Kumpulan 6
Kumpulan 6Kumpulan 6
Kumpulan 6
 
Kumpulan 3
Kumpulan 3Kumpulan 3
Kumpulan 3
 
Kumpulan 4: Geng Bahagi 4
Kumpulan 4: Geng Bahagi 4Kumpulan 4: Geng Bahagi 4
Kumpulan 4: Geng Bahagi 4
 

Recently uploaded

Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 

Recently uploaded (20)

Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 

06 facebook security

Editor's Notes

  1. Facebook is one of the phenomena now a days especially for youth. While we are having fun online through Facebook, we should also think about our security. Today will we share with you the ways on how cyber criminal can sneak in or knowing our personal information through Facebook. Participants should remember this is more focusing on our personal Facebook account. Activity: All participant should have their own Facebook account If they don’t have any, need to give them time to sign up with Facebook to make them familiar and go through each setting in the Facebook itself.
  2. As usual, this the interface of Facebook. It consist of Login and Sign up area…….. For those who already be a member….please login to your account For those who haven’t got one, please sign up…….. To sign up, please use valid email address or maybe you can create your new email id just for this purpose and it may use for your knowledge sharing session in the future
  3. This is the privacy policy statement from Facebook. The policy statement will be reviewed periodically and latest update on 23rd Sept 2011. We should read the policy statement so that we know how Facebook share the information and other things. It covers: Information we receive and how it is used Sharing and finding you on Facebook Sharing with other websites and applications How advertising works Minor and safety Some other thing you need to know Activity: Make them familiar with the policy statement 2. Participants need to explore the policy statement with in 3-5 minutes
  4. Facebook Terms of Service - consist of statement of rights and responsibilities Statement Rights and Responsibilities - This Statement of Rights and Responsibilities (Statement) derives from the Facebook Principles, and governs our relationship with users and others who interact with Facebook. By using or accessing Facebook, you agree to this Statement. One thing have to stress on, Facebook not allow any user under 13 years old to sign up with them Activity: Make them familiar with the terms of service 2. Participants need to explore the Terms of Service with in 3-5 minutes
  5. Facebook Terms of Service - consist of statement of rights and responsibilities Statement Rights and Responsibilities - This Statement of Rights and Responsibilities (Statement) derives from the Facebook Principles, and governs our relationship with users and others who interact with Facebook. By using or accessing Facebook, you agree to this Statement. One thing have to stress on, Facebook not allow any user under 13 years old to sign up with them Activity: Make them familiar with the terms of service 2. Participants need to explore the Terms of Service with in 3-5 minutes
  6. Facebook Privacy Setting This is the previous privacy setting before Facebook change the look of the privacy setting. If you/Facebook user didn’t change the setting, it will show exactly like the slide. This means your profile is open to public where every Facebook user can find and open your profile, information in the Facebook and also can explore your pic. Recommended that user need to change their privacy setting at least once and make it to “Only Friends” setting. Activity: Participants need to login to their Facebook account Participants need to go and explore the Privacy Setting
  7. This is the new interface for the Facebook Privacy Setting. Much more simple and easy to read and understand. Each of the option have the explanation for it and this is easy for the Facebok user to know and understand what is all about for each option. These two option; Control Privacy When You Post and Control Your Default Privacy, basically you can control whose going to read you post and who can view your profile. We may explore more on the next slide. Activity: Participants need to login to their Facebook account Participants need to go and explore the Privacy Setting
  8. This is another additional option for Facebook Privacy Setting How You Connect – control how you connect with people you know How Tags Work – control what happens when friends tag you or your content App and Website – control what gets shared with apps, games and websites Limit the Audience for Past posts – Limit the audience for posts you shared with more than friends Block People and Apps – manage the people and apps you’ve blocked Activity: Participants need to login to their Facebook account Participants need to go and explore the Privacy Setting
  9. Some stuff about Facebook that we can get from the internet It shows the funny thing about status update, comment, chatting etc. mostly from Facebook page. You can find it from: Lamebook : www.lamebook.com (The Original - Funny Facebook Statuses, Fails, LOLs and More) Failbook : www.failbook.failblog.org (Funny Facebook Status Messages)
  10. Sample one of the chatting and picture that being posted in the lamebook site In a cyber world, as a internet user we also need to know the way on how teenagers communicate among them…..
  11. This slide consist of 2 story: Juliana – this is the sample of typo error which is the word anal on the status is supposedly written as Anna Jess – updated his status saying that he just answer “ACDC” down to the whole page……and he’s got 87% for that test This is two sample that we took from the site, there’s a lot of screen capture you can refer and make it as a sample in your presentation
  12. This is the story regarding Kyle Doyle which found absent on 21st August. HR request for medical certificate as a proof for the leave. Kyle argument, in the contract stated that employee are allowed to take one day leave without any proof due to any reason. HR did mention that, due to report that has been made by his boss, his leave is not due for medical reason and HR cannot process the leave. Kyle hold on his stand and ask HR to process the leave accordingly. Finally HR came out with this screen capture where he/she get from Kyle’s Facebbok page. This is what HR can do now a days……that is why we have to really be carefull whenever we wan to post something on our Facebook page. Anything posted on the internet will remain forever…..this include comments, picture and our personal information. Do remember, we can deny everything but, everybody eg: friends, cousin, colleague and other family members, they can update, tag and do post something about us on the internet.
  13. This is another sample from our local tabloid………..Harian Metro. Where the wife run away to be with her ex boyfriend. This was happened after they meet each other in Facebook and finally the lady ran away with her ex. The wife also took her kids together and as for a divorce.
  14. Another quote from the local tabloids about the savage Facebook. A boarding school student accused to hack his friend Facebook account. As a result, the student was beaten and received a treatment at the hospital due to injuries on his eyes and forehead.
  15. Another news from the tabloids…… Fraud that happened in the cyber world………now a days they are going to use social media as one of the platform to get a thousand of ringgit. Do remember, this is one of the way how they can get the money. So as a Facebook user, we have to aware of this and make sure that we are not in the statistic of a fraud or cyber criminal victims.
  16. This is an application that we can install in our laptop and smart phone. This apps called PREY. Prey lets you keep track of your phone or laptop at all times, and will help you find it if it ever gets lost or stolen. It's lightweight, open source software, and free for anyone to use. And it just works. It runs in Windows, Android, Linux, Ubuntu and Mac OS and iOS More info : http://preyproject.com/
  17. Protect your Mac with Hidden When your Mac is lost or stolen, Hidden will show you where it is and who has it. Hidden will kick into action and locate it anywhere, collect photos of the thief and screen shots of the computer in use. More info: http://hiddenapp.com/ What does Hidden do? Hidden is a small application which sits idle on your computer until you need it. When your computer gets stolen simply login to your online Tracking Control Panel and mark your computer as stolen. Hidden will kick into action and locate your stolen computer anywhere on the planet, collect photos of the thief and screen shots of the computer in use.
  18. Justin Bieber trying to flirt links are the latest bait being used to entice his fans to download a rogue Facebook application. By clicking a tiny.cc link next to a post which reads: "OMG Justin Bieber trying to flirt, check it out" directs memers to an application called Bieberflirting. This application asks permission to access your basic information as well as post to your Facebook wall and access your data at any time before you can carry on to watch Justin Bieber's flirting attempts.
  19. This is the sample of the interface when you click the tiny.cc link
  20. Are you looking for this software called “007 facebook hack v1.0″ also known as “James bond’s facebook hack” that can hack your friends facebook password in minutes? According to this software, you just need to fill in your friend’s profile id and the email id he has used on his facebook profile. Once you feed these two things in the dedicated feild, it will automatically reveal the password of your friend. First let me ask you something, Are you sure that you can cheat facebook’s login using this software? Are you so confident that this software called 007 facebook hack v1.0 will hack any facebook password within minutes? Read more: http://www.hacker9.com/hacking-fb-accounts-using-007-facebook-hack-v1-0-the-truth.html#ixzz1hz8UJYIK
  21. Do not install F’acebook Antivirus. It is a deceptive rogue application that, as soon as you install it, will tag every single one of your friends in a photo in batches of about 20. It then posts that photo to your wall. This little scam is brand new and hopefully will be deleted quickly by Facebook, but we can certainly help slow down the spread of it while we wait. Apart from the wall spamming, another obvious indication that this is a fake application itself, is the url: http://apps.facebook.com/kxetyegpgkxdwfy/ A valid application is not going to have a URL with a bunch of jumbled letters at the end.
  22. Keylogging (keylogger) is the simplest and the most effective way of hacking Facebook passwords. Anyone with basic knowledge of computer can install and use it easily. This method yields the best outcome when you have physical access to your victims PC. Basically keyloggers are used to capture the keyboard strokes entered by any person. So the fact that, it can capture keyboard strokes, it can also capture or record usernames and passwords entered by a person. There are 2 types of keyloggers, hardware and software. #1. Software Keylogger Software keylogger is a program that records each & every keystroke that a user types on his/her keyboard. Once you install this program on the target computer, it will automatically load from the start-up and start capturing every keystroke typed on that computer including usernames and passwords. A keylogger software runs in a complete stealth mode and thus remains undetected. In order to use keylogger software, you don’t need to have any special knowledge of hacking. Anyone with a basic knowledge of computer, will be able to install and use this software easily Read more: http://www.hacker9.com/how-facebook-hacking-carried-out-password-methods.html#ixzz1i00hLp9u
  23. #2. Hardware Keylogger Just like Software Keyloggers Hardware keyloggers also captures keyboard keystrokes but requires Physical access to victims PC. A Hardware keylogger is a small hardware just like USB pen-drive with internal memory. These are available in 2 types: PS2 and USB. Recommended: Keycobra – Best Hardware keyloggers PS2 keylogger is plugged inline between a computer keyboard and a computer. They log all keyboard activity to their internal memory. Whereas USB keylogger is just a USB Stick that can capture everything a user does on the System Read more: http://www.hacker9.com/how-facebook-hacking-carried-out-password-methods.html#ixzz1i017Kubc
  24. There is no such thing as a Facebook Gold Account. All messages and groups that claim to provide instructions for upgrading to a Facebook Gold account are bogus and in no way officially endorsed by Facebook management. Thus, Facebook users should ignore any invitations that claim they can upgrade to a Facebook Gold account. Do not join any Facebook Gold groups or install any apps that supposedly upgrade your account to Facebook Gold. Once again, there is no such thing as a Facebook Gold account and any messages or groups that claim you can get such an account are entirely fraudulent.
  25. Facebook user, if you come across any Post on Facebook that says “GET A FREE facebook T-SHIRT”, please ignore it. This is not a like jacking type of SPAM, but the Pure and Simple social engineering example to capture user data. The Scammers have created an external web page, whose look and feel closely matches with facebook’s user interface. Though looking at that page you can easily make out that its a scam, Still Some people will get tempted and will Register their email and home address there. Read more: http://www.hacker9.com/get-a-free-facebook-t-shirt-new-facebook-scam.html#ixzz1i03twzr0
  26. Another new scam that appeals to both our egos and instinct for voyeurism is spreading like wildfire on Facebook. An app going by various names, including ProfileSpy and Pro Check, claims it will offer insight into how many people have viewed your Facebook profile if you fill out a short survey and grant the app permission to access your information. The scam has been making its way around the social network via status updates, which include a link to the suspicious service and text that reads, "My total facebook views are: 1245 Find out your total profile views."
  27. Koobface - Koobface is a computer worm that targets Facebook and other social networking websites. It spreads on Facebook by posting spam messages on behalf of people. These messages contain a link, which will prompt you to download a “HOT” videos or install a newer version of certain application. However, this download actually contains a malicious file that, once opened, uses Facebook account to continue posting this malicious link on your behalf, thus spreading the virus to our Facebook contact. For more info, you can read it from Facebook Help Center
  28. As a Facebook user, you may ask the Facebook Help Center to get more info about Koobface….the search result covers:
  29. This is another sample of Facebook scam, and it’s taking advantage of a non-existent Facebook feature many users crave: the dislike button. There is no such thing as an official Facebook dislike button. It’s possible that Facebook will implement a similar feature in the future, but right now it simply doesn’t exist. So, if you see a status update containing the message “I just got the Dislike button, so now I can dislike all of your dumb posts lol!!” or “Get the official DISLIKE button now” followed by a link, you should know that it’s another one of many scams that aim to extract your personal data.
  30. CLICK HERE TO VERIFY - Don't fall for this fake Facebook Security Warning. "Clicking on the link is not advisable. However, this dialog box is requesting permissions for a rogue application - clicking “ALLOW" will permit the app to post the message to your wall as well, spreading the link virally to your Facebook contacts." This Facebook virus will post itself on your friends walls, with this comment:   “Facebook Deleting all acounts that are not verified before may 6th.So soon Verify your account before it gets deleted )"   When Facebook has an issue with your account, they will post the information at the top of your page.  Never click on shared pages like the one above without checking it out first.
  31. Just observe the screenshot above. If you happen to see a message like the following posted on your wall by one of your Facebook friend’s, don’t click on the link. If you do make the mistake of clicking on the link, you will be redirected to a page that claims you are about to find out who spends excessive time with your photos, reading your old post, etc. They will ask you to run some script on your Facebook Homepage. Once you run the Java Script, the devil will start his work and within minutes it will flood your friends wall and your wall with the same spam. This is typical JavaScriptJacking Scam. Read more: http://www.hacker9.com/find-your-stalker-new-facebook-scam-javascript.html#ixzz1i0BxoTxj
  32. Facebook spams us by sending Emails a hell lot more than required and then people spam Facebook (and hence you) by making a single click on the mouse to be turned on and create havock.  This new spam being named “Revolving images”. The problem with the script is that not only does it start an irritating image revolving thing it promised (which can be thankfully stopped by refreshing the page) it posts the following message on some of the users’ friends’ walls’ Read more: http://pulkit.me/2010/11/23/newest-facebook-spam-revolving-images/#ixzz1i0Ew3if7
  33. Sample of JAVA Script of “Revolving Images”
  34. Sample of JAVA Script of “Revolving Images”
  35. This another way how cyber criminal can get our information. Please not to believe this type of scam…… This girl will ask for help to be her accompany while she were on holiday. In the first place, she will chat or message the user through Facebook and ask for user email address to ease the communication among them…… In the email communication, she will ask about user personal information and this is one of the way how they get our information. Do remember, never once used our company email id in our email communication when it going to be personal related activity.
  36. This page is intentionally left blank
  37. Facebook did provide us with their privacy policy, term of service and privacy setting which is easy to understand and use to keep us safe while we keep in touch with our new and old friends. Not only that, Facebook also provide us with their Family Safety Center. We can access it from https://www.facebook.com/safety Facebook Safety Center It consist of:
  38. Facebook Safety Page : This is the URL (https://www.facebook.com/fbsafety) About : to get updates and give feedback on Safety issues. Description : Nothing is more important to Facebook than the safety of the people that use it. Mission : To provide Facebook user with the updates and information to help and keep the user safe while using Facebook or surfing on the Internet.
  39. Facebook Security Page: The URL is (https://www.facebook.com/security) About : Like this Page to receive updates about how to protect your information both on and off Facebook. Mission : To provide you with the information you need to protect your information both on and off Facebook. Facebook also provide a test for Facebook user. The quiz can be accessed at https://www.facebook.com/security?sk=app_152078551499478
  40. Facebook Help Center - http://www.facebook.com/help/?ref=pf Facebook user may ask their query on Facebook Help Center if they want to know anything pertaining Facebook threat, viruses, scam, spam, account setting, privacy setting, etc….. By clicking the option given, user easily know how to find the answer or just type in the searching field, Facebook will return with the search result which relates to the query. On the right hand side, Facebook also provide Facebook Help Feed. Activity: 5 minutes will be given to the participants to explore the Facebook Help Center Participants also need to answer the Facebook Security Quiz
  41. Facebook also provide a form to report the deceased person’s profile or they call it as memorializing the account. URL: http://www.facebook.com/help/contact.php?show_form=deceased Memorializing the account: It is Facebook policy to memorialize all deceased users' accounts on the site. Memorializing the account set privacy so that only confirmed friends can see the profile (timeline) or locate it in Search. The profile (timeline) will also no longer appear in the Suggestions section of the Home page. Friends and family can leave posts in remembrance. In order to protect the privacy of the deceased user, we cannot provide login information for the account to anyone. However, once the account has been memorialized, it is completely secure and cannot be accessed or altered by anyone.
  42. If user facing a problem like a violation of a policy, account, information and pictures, user may report the violation through Facebook itself. Open up the Facebook Help Center, and Facebook will guide us how to make a report. Just select the option to report a violation. Once user click on this link; http://www.facebook.com/report/ it will shows a few options under the Report Abuse or Policy Violations Activity: 5 minutes will be given to the participants to explore the Facebook – Report Abuse and policy Violation option
  43. If you believe your account has been compromised by another person or a virus, please click the "My Account Is Compromised" button. We'll help you log back into your account so that you can regain control. URL: http://www.facebook.com/hacked
  44. Maybe there’s a question among Facebook user, “Can we permanently delete our Facebook account” Basically, Facebook not allowed us to delete our Facebook account. The only thing we can do is DEACTIVATED the account. Unless if you do not think you will use Facebook again and would like your account deleted, keep in mind that you will not be able to reactivate your account or retrieve any of the content or information you have added. If you would like your account permanently deleted with no option for recovery, log in to your account and then submit your request to Facebook. This is because each one of the Facebook user will give or provide a valuable information about themselves, their family, friends, contact details, email, etc……
  45. One of the application available on Facebook – BitDefender Safego Online social interaction usually consist of posts on your wall, comments from friends, status updates. But don’t forget that our online social life relies on a crucial ingredient: your friends’ trust in you. Using in-the-cloud scanning, Bitdefender Safego protects our social network account from all sorts of e-trouble: scams, spam, malware and private data exposure. But, most importantly, Safego keeps our online friends safe and …close. More info: http://apps.facebook.com/bd-safego/
  46. Another tools that introduce by AVG – Online Link Scanner URL : http://linkscanner.explabs.com/linkscanner/AVG/default.aspx If you'd rather be safe than sorry, enter the URL of the site or web page you want to visit in the box and click the scan button. The LinkScanner Online service will visit and inspect the URL in real-time for whether it is hiding any exploit code and, if so, what exploit. Use LinkScanner Online to inspect: Links forwarded by friends Web sites displayed on search results Any link with suspicious characters or web site you have never visited
  47. Another tools that may protect user account from online threats……. More Info : https://www.facebook.com/apps/application.php?id=310877173418 Description: Safeguard against malicious URLs by scanning your feed using Norton Safe Web. Protect your friends by advising them of malicious URLs you might have in your feed