This presentation provides an inside view of how the Social media presence could harm any individual if no proper vigilance is kept while being active on various social platforms.
This is a presentation Bill gave at the May 2009 NAISG meeting on the security dangers of such social networking entities as Facebook, LinkedIn and Twitter.
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
I spent the last few months doing research on various social networks specifically MySpace, Facebook, LinkedIn. Many of us either use these sites or know others that do. Users of these sites have been increasing at a dramatic rate for several years. For example, MySpace was the most visited website in the US with more than 114 million global visitors in 2007, and Facebook increased its global unique visitor numbers by 270% last year alone. With this massive increase in social network usage, online social networking is now becoming the fastest growing area of privacy concerns and security threats.
There is no argument about the popularity of the social platforms such as Facebook, YouTube, twitter, etc. These platforms can be used to stay in touch with your friends, increase sales revenues for organizations and as a collaboration tool to stay connected with the public. However, each of these benefits comes at a cost, putting your private information at a risk/ exposed. We aim to discuss the common security risks associated with usage of these platforms including risk mitigation strategies.
Intro Video : https://www.youtube.com/watch?v=zxpa4dNVd3c
Presentation for Computer Society of Sri Lanka on 24 Feb 2015
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
This presentation provides an inside view of how the Social media presence could harm any individual if no proper vigilance is kept while being active on various social platforms.
This is a presentation Bill gave at the May 2009 NAISG meeting on the security dangers of such social networking entities as Facebook, LinkedIn and Twitter.
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
I spent the last few months doing research on various social networks specifically MySpace, Facebook, LinkedIn. Many of us either use these sites or know others that do. Users of these sites have been increasing at a dramatic rate for several years. For example, MySpace was the most visited website in the US with more than 114 million global visitors in 2007, and Facebook increased its global unique visitor numbers by 270% last year alone. With this massive increase in social network usage, online social networking is now becoming the fastest growing area of privacy concerns and security threats.
There is no argument about the popularity of the social platforms such as Facebook, YouTube, twitter, etc. These platforms can be used to stay in touch with your friends, increase sales revenues for organizations and as a collaboration tool to stay connected with the public. However, each of these benefits comes at a cost, putting your private information at a risk/ exposed. We aim to discuss the common security risks associated with usage of these platforms including risk mitigation strategies.
Intro Video : https://www.youtube.com/watch?v=zxpa4dNVd3c
Presentation for Computer Society of Sri Lanka on 24 Feb 2015
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
Social Network Privacy, Security and Reputation Management.
What are the threats on social networks?
How can you help your customers manage their online identity?
Basic tips for staying safe and protecting personal privacy on popular social media sites, including Facebook, Twitter, and Instagram. Designed for casual users of social media.
When it comes to social media, most of us expect that we are in control of what we share about ourselves, and who we share with. In this hands-on workshop, we will dispel common myths and misconception about social media privacy as well as discuss step-by-step instructions for securing out social media selves.
When web 2.0 sneezes, everyone gets sickStefan Tanase
Web 2.0 applications have become increasingly popular among Internet users in the past few years. This trend is very unlikely to come to an end soon. More and more 'classic' websites are shifting towards web 2.0 concepts, start-ups are all about web 2.0 and new users are adopting the web 2.0 lifestyle every day.
This paper aims to address the following questions:
What exactly is web 2.0?
What are the concepts and technologies that make web 2.0 what it is?
Why does web 2.0 attract malware authors?
How did malware spread over the Internet before web 2.0?
What are the new attack vectors created by web 2.0 technologies?
What social engineering tactics emerge over the web 2.0 concepts?
How dangerous is the combination of human & technological vulnerabilities?
Are web 2.0 attacks more efficient?
How difficult is it to protect ourselves?
How are web 2.0 threats going to evolve?
Web 2.0 applications are not only being used at home, but also in the corporate environment. The new attack vectors are raising the stakes, both for malware authors and security professionals. The user is somewhere in between the two sides, unwittingly helping the attackers while also suffering from the attacks.
Volume 7, Issue 2 (2014) of the Journal of Physical Security, a peer-reviewed journal devoted to research, development, modeling, testing, experimentation, and analysis of physical security. Includes both technical and social science approaches.
This issue has papers about security evaluations of Egyptian nuclear facilities, a probabilistic model for quantifying the odds of interrupting an attack, a security evaluation for an oil refinery in Nigeria, access control for small nuclear facilities, and entropy as a driver of security failures.
For more information about JPS, to download individual papers from this or earlier issues, or to get on the email notification list, see http://jps.anl.gov
Social Network Privacy, Security and Reputation Management.
What are the threats on social networks?
How can you help your customers manage their online identity?
Basic tips for staying safe and protecting personal privacy on popular social media sites, including Facebook, Twitter, and Instagram. Designed for casual users of social media.
When it comes to social media, most of us expect that we are in control of what we share about ourselves, and who we share with. In this hands-on workshop, we will dispel common myths and misconception about social media privacy as well as discuss step-by-step instructions for securing out social media selves.
When web 2.0 sneezes, everyone gets sickStefan Tanase
Web 2.0 applications have become increasingly popular among Internet users in the past few years. This trend is very unlikely to come to an end soon. More and more 'classic' websites are shifting towards web 2.0 concepts, start-ups are all about web 2.0 and new users are adopting the web 2.0 lifestyle every day.
This paper aims to address the following questions:
What exactly is web 2.0?
What are the concepts and technologies that make web 2.0 what it is?
Why does web 2.0 attract malware authors?
How did malware spread over the Internet before web 2.0?
What are the new attack vectors created by web 2.0 technologies?
What social engineering tactics emerge over the web 2.0 concepts?
How dangerous is the combination of human & technological vulnerabilities?
Are web 2.0 attacks more efficient?
How difficult is it to protect ourselves?
How are web 2.0 threats going to evolve?
Web 2.0 applications are not only being used at home, but also in the corporate environment. The new attack vectors are raising the stakes, both for malware authors and security professionals. The user is somewhere in between the two sides, unwittingly helping the attackers while also suffering from the attacks.
Volume 7, Issue 2 (2014) of the Journal of Physical Security, a peer-reviewed journal devoted to research, development, modeling, testing, experimentation, and analysis of physical security. Includes both technical and social science approaches.
This issue has papers about security evaluations of Egyptian nuclear facilities, a probabilistic model for quantifying the odds of interrupting an attack, a security evaluation for an oil refinery in Nigeria, access control for small nuclear facilities, and entropy as a driver of security failures.
For more information about JPS, to download individual papers from this or earlier issues, or to get on the email notification list, see http://jps.anl.gov
La siguiente línea de tiempo muestra los temas de los órganos sensoriales que se van a trabajar con los estudiantes y describe brevemente cada uno de ellos.
Maschinelle Übersetzung mit SDL BeGlobal bietet mehr als Übersetzung auf Knopfdruck. Es gibt zahlreiche Features und Einstellungen, die die SDL-Software zum professionellen Einsatz im Übersetzungsprozess auszeichnen.
In diesen Folien erfahren Sie, wie Sie TouchPoints und TrustScore sinnvoll einsetzen, wie maschinelle Übersetzung aus MS-Office-Programmen heraus funktioniert und in die eigene IT eingebunden werden kann.
Das Video können Sie sich hier ansehen: http://www.youtube.com/watch?v=EupF534QMEA
Crisis y modelo de desarrollo en Canarias-Faustino
Presentación multimedia en la Intervención de Faustino García Márquez en la mesa redonda Crisis y modelo de desarrollo en Canarias, en la Asamblea Federal 2010.
Síguenos en Facebook
Consultoría de Recursos Humanos y Marketing.
Advantia Consultores
www.advantiaconsultores.es
www.facebook.com/advantiaconsultores info@advantiaconsultores.es
Social Media and Privacy - Education Across the Nation - Australian Computer ...Mining Oil and Gas Jobs
Developed for the Australian Computer Society's Education Across the Nation series - First quarter, 2012
Social media is firmly entrenched in our society, both in our professional and personal lives. The way we communicate with each other has changed because of these tools. Understanding what content to share and how the information flows through your network is a critical step in addressing privacy concerns. Old privacy concerns are no longer valid and you may be unintentionally exposing yourself, your family and friends.
This presentation is designed to provide information and frank discussion about the privacy issues surrounding social media. In addition, recommendations for corporate social media policies and the role of IT in social media will be addressed.
Social Media and Privacy - Education Across the Nation - Australian Computer ...Typeset
Social media is firmly entrenched in our society, both in our professional and personal lives. The way we communicate with each other has changed because of these tools. Understanding what content to share and how the information flows through your network is a critical step in addressing privacy concerns. Old privacy concerns are no longer valid and you may be unintentionally exposing yourself, your family and friends.
This presentation is designed to provide information and frank discussion about the privacy issues surrounding social media. In addition, recommendations for corporate social media policies and the role of IT in social media will be addressed.
Presented in first quarter 2012 as the Education Across the Nation (EDxN) series for the Australian Computer Society.
Presentation (now includes audio) on the future of social networks, with the core idea that "Social networks will be like air". Details user experiences that will incorporate user identity, contacts, and activities, as well as new business models.
Cybersafety talk given to parents at William Clark College:
How can I be sure my child will be safe when using the Internet?
What are the new social networking sites?
How can I learn more about protecting my child? Internet Safety - Parent A wareness Evening
Come to an interactive workshop where these issues will be addressed to help you learn how to best protect your children when using the Internet. The evening will include a 30 minute demonstration session followed by Q&A. All are welcome to attend free of charge; tea/coffee will be available.
Facilitator: Suresh Sood (Researcher with the School of Marketing in the Faculty of Business, University of Technology Sydney)
Monday 22" , March 2010, 7 pm William Clarke College, Library Conference Room
Enquiries: Liz Nix Ph 8882 2100 (extension 182) efn@wcc.nsw.edu.au
l highly recommend this workshop to all College parents and encourage you to attend and invite others who may be interested: David Raphael
Social media privacy threats that you need to keep an eye on in 2021Impulse Digital
Social media users' interests about information protection have seen a sharp ascent throughout the most recent couple of years. Cybercriminals have developed the ability to deceive social based media users into sharing touchy individual data and information.
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearBob Wall
Presentation at the 2016 Big Sky Developers' Conference.
Overview of the dismal state of security on the Web, some suggestions for better app development processes to mitigate problems.
Education is the Key to Fighting Cyber CrimeBlue Coat
Cyber crime has become one of the most prominent forms of crime throughout the United States, and the world. How can you protect yourself from becoming the latest victim of a cyber attack? Education.
Why Your Mobile Device Isn’t As Secure As You ThinkBlue Coat
Most people have the illusion that phones are somehow impervious to viruses and that you are safe browsing virtually anything online. Not so. Mobile usage is growing fast, and it is only going to get bigger in 2014 and beyond.
Are you a hacker’s target? How do they get your information? In the world of network security, cybercrime and information warfare, it’s important to protect yourself. Check out the infographic below and let us know: how have you been a hacker’s target?
Find out out how easily detect and stop a hidden spammer. These methods will protect you and your company from spam and will keep you from getting flagged as a spammer.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
4. AVERAGE MINUTES PER VISITOR PER MONTH
FACEBOOK
6.75HOURS
1.5HOURS
PINTERESTTWITTER
21MINUTES
LINKEDIN
17MINUTES
GOOGLE +
3MINUTES
STUMBLE UPON
1.5HOURS
5. SOCIAL MEDIA PRIVACY SCORES
based off of 260 metrics from data-collection to privacy policies.
1
.9
.8
.7
.6
.5
.4
.3
.2
.1
LINKEDIN
CLASSMATES.COM
FACEBOOK
TWITTER
MYSPACE
HI5
FRIENDSTER
PRIVACYSCORE
(weak)
(average)
(strong)
6. SOCIAL NETWORKING WORMS
Enlist more machines into its botnet, and hijack more accounts to
send more spam to enlist more machines. All the while making
money with the usual botnet business, including scareware and
Russian dating services.
Multiple worm attacks. Mikeyy
worm started to spread via
Twitter posts by encouraging
you to click on a link.
1/6/2013TWITTER
TOP 10 THREATS
7. PHISHING BAIT
The e-mail that lured you to sign into Facebook, hoping you don't
pick up on the fbaction.net URL in the browser.
Phishing attacks designed to
gain passwords for profit.FACEBOOK 5/18/2013
TROJANS
URL Zone is a similar banking Trojan, but even smarter, it can
calculate the value of the victim's accounts to help decide the
priority for the thief.
8. SHORTENED LINKS
URL shortening services (e.g., Bit.ly and Tinyurl) to fit long URLs
into tight spaces. They also do a nice job of obfuscating the link so
it isn't immediately apparent to victims that they're clicking on a
malware install.
DATA LEAKS
Users share a bit too much about the organization -- projects,
products, financials, organizational changes, scandals, or other
sensitive information.
Passwords have been stolen.
6 million were compromised.LINKEDIN 6/6/2012
9. ADVANCED PERSISTENT THREATS
(APT) is the gathering of intelligence about persons of interest
(e.g., executives, officers, high-net-worth individuals), for which
social networks can be a treasure trove of data.
BOTNETS
Twitter accounts being used as a command and control channel for
a few botnets. The standard command and control channel is IRC,
but some have used other applications -- P2P file sharing in the
case of Storm -- and now, cleverly, Twitter.
!
10. CROSS-SITE REQUEST FORGERY (CSRF)
CSRF attacks exploit the trust a social networking application has
in a logged-in user's browser. So as long as the social network
application isn't checking the referrer header, it's easy for an attack
to "share" an image in a user's event stream that other users might
click on to catch/spread the attack.
IMPERSONATION
Several impersonators have gathered hundreds and thousands of
followers on Twitter -- and then embarrassed the folks they
impersonate.
TRUST
Like e-mail, when it hit the mainstream, or instant messaging when
it became ubiquitous, people trust links, pictures, videos and
executables when they come from "friends".
11. 87%of small to medium-sized
businesses do not have formal,
written internet security policies.
70%of these businesses lack
policies for employees’ use of
social media, despite the fact that
they are increasingly favored by
cybercriminals for phishing attacks.
12. Once an attacker gains access to their account, they
can easily find a way to mine more information and to
use this to access their other accounts. The same is
true for corporate accounts, which are publicly
available on sites, like LinkedIn.
!
13. 90% of sites don’t require a full name or date of
birth for permission to join.
80%of users failed to use standard encryption
protocols to protect sensitive user data from hackers.
71%of websites reserve the right to share user
data with third parties in their privacy policies.
14. CLICK TO SEE THE FULL INFOGRAPHIC HERE:
RESOURCES
http://preibusch.de/publications/Bonneau_Preibusch__Privacy_Jungle__2009-05-26.pdf
http://www.hula-hub.com/2012/03/21/top-social-media-statistics-infographic-2012/
http://www.marketingprofs.com/charts/2010/3596/social-networks-influential-not-always-trusted
http://www.digitaladvocate.net/?p=504
http://mashable.com/2012/11/28/social-media-time/
http://www.networkworld.com/news/2010/010710-social-networking-hacks.html?page=2
http://detroit.cbslocal.com/2012/06/06/report-linkedin-networking-site-hacked/
http://blog.ussignalcom.com/blog-1/bid/278223/Cyber-Attacks-2013-Hackers-Exploit-Social-Media
http://about-threats.trendmicro.com/us/webattack/75/spam%20scams%20and%20other%20social%20media%20threats
http://www.computerweekly.com/news/1280090217/Privacy-rankings-LinkedIn-and-Bebo-high-Facebook-and-MySpace-average-Badoo-low