SlideShare a Scribd company logo
Security on Social Media
Deborah Salmi @deborahsalmi
Julia Szymanska @Dzulaya
Social Media Team AVAST Software
#AVASTuni
We are social
Fifty shades of grey.. hat hacking
Tinkerer
Hacktivist
Black hat hackers
Cybercrooks
Flash forward
Crouching Tiger, Hidden…Malware
You’ve got mail
Gone phishing
Money for nothin’ and chicks for free
Sex, Lies and Videotape
Sex, Lies and Videotape
Sex, Lies, and Videotape
Clone wars
iLike, iClick, iShare, iSpam
One trick pony
Like-farming scam
Facebook Graph Search vs privacy
Beware what you share
Feel free to stalk on me
“Passwords are like underwear:
you don’t let people see it, you should change it very often, and you
shouldn’t share it with strangers.” ~ Chris Pirillo
avast! be free
avast! Easy pass
avast! BackUp
avast! SecureLine VPN

avast! Free Antivirus
Let’s get social

@avast_antivirus
@deborahsalmi
@dzulaya

More Related Content

Viewers also liked

20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_Light20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_Light
Vincent Lebunetel
 
Sertifikat Digital
Sertifikat DigitalSertifikat Digital
Sertifikat Digital
pingkan lumongdong
 
SSL, X.509, HTTPS - How to configure your HTTPS server
SSL, X.509, HTTPS - How to configure your HTTPS serverSSL, X.509, HTTPS - How to configure your HTTPS server
SSL, X.509, HTTPS - How to configure your HTTPS server
hannob
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mazhar Nazik
 
SSL TSL;& SET
SSL TSL;& SETSSL TSL;& SET
SSL TSL;& SET
Ramesh Ogania
 
Social networks security
Social networks securitySocial networks security
Social networks security
Roman Osidach
 
Marco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overviewMarco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overview
Information Security Awareness Group
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
Tannistho Ghosh
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
Devyani Vaidya
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
60ml
 
x.509-Directory Authentication Service
x.509-Directory Authentication Servicex.509-Directory Authentication Service
x.509-Directory Authentication Service
Swathy T
 
E payment system
E payment systemE payment system
E payment system
Sanaya_36890
 
SSL Certificates and Operations
SSL Certificates and OperationsSSL Certificates and Operations
SSL Certificates and Operations
Nisheed KM
 
Towards cashless economy
Towards cashless economyTowards cashless economy
Towards cashless economy
Jithin Parakka
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
Subhash Gupta
 
How Privacy in the Cloud Affects Organizations
How Privacy in the Cloud Affects OrganizationsHow Privacy in the Cloud Affects Organizations
How Privacy in the Cloud Affects Organizations
WSO2
 

Viewers also liked (16)

20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_Light20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_Light
 
Sertifikat Digital
Sertifikat DigitalSertifikat Digital
Sertifikat Digital
 
SSL, X.509, HTTPS - How to configure your HTTPS server
SSL, X.509, HTTPS - How to configure your HTTPS serverSSL, X.509, HTTPS - How to configure your HTTPS server
SSL, X.509, HTTPS - How to configure your HTTPS server
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
SSL TSL;& SET
SSL TSL;& SETSSL TSL;& SET
SSL TSL;& SET
 
Social networks security
Social networks securitySocial networks security
Social networks security
 
Marco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overviewMarco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overview
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
 
x.509-Directory Authentication Service
x.509-Directory Authentication Servicex.509-Directory Authentication Service
x.509-Directory Authentication Service
 
E payment system
E payment systemE payment system
E payment system
 
SSL Certificates and Operations
SSL Certificates and OperationsSSL Certificates and Operations
SSL Certificates and Operations
 
Towards cashless economy
Towards cashless economyTowards cashless economy
Towards cashless economy
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
 
How Privacy in the Cloud Affects Organizations
How Privacy in the Cloud Affects OrganizationsHow Privacy in the Cloud Affects Organizations
How Privacy in the Cloud Affects Organizations
 

Similar to Security on social networks AVAST

5c Digital Citizenship
5c Digital Citizenship5c Digital Citizenship
5c Digital Citizenship
Anja Junginger
 
How To Write A Scientific Essay
How To Write A Scientific EssayHow To Write A Scientific Essay
How To Write A Scientific Essay
Kristen Lee
 
CTO Cybersecurity Forum 2013 Augusta Epuli Anjoh
CTO Cybersecurity Forum 2013 Augusta Epuli AnjohCTO Cybersecurity Forum 2013 Augusta Epuli Anjoh
CTO Cybersecurity Forum 2013 Augusta Epuli Anjoh
Commonwealth Telecommunications Organisation
 
2018 Ambassador Leaders Community Action Plan - Cyber Spiders
2018 Ambassador Leaders Community Action Plan - Cyber Spiders2018 Ambassador Leaders Community Action Plan - Cyber Spiders
2018 Ambassador Leaders Community Action Plan - Cyber Spiders
Ambassador Leaders
 
Reveal & Reduce the threat of Deep Fake Technology
Reveal & Reduce the threat of Deep Fake TechnologyReveal & Reduce the threat of Deep Fake Technology
Reveal & Reduce the threat of Deep Fake Technology
stuwilson.co.uk
 
How To Write A College Diversity Essay - Example
How To Write A College Diversity Essay - ExampleHow To Write A College Diversity Essay - Example
How To Write A College Diversity Essay - Example
Angela Dominguez
 
Be Open To All Feedback For Maximum Results
Be Open To All Feedback For Maximum ResultsBe Open To All Feedback For Maximum Results
Be Open To All Feedback For Maximum Results
George Hutton
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)
forensicsnation
 
Hugh Hefner, Sherlock Holmes & Indiana Jones: Making the Case for Mobile Inte...
Hugh Hefner, Sherlock Holmes & Indiana Jones: Making the Case for Mobile Inte...Hugh Hefner, Sherlock Holmes & Indiana Jones: Making the Case for Mobile Inte...
Hugh Hefner, Sherlock Holmes & Indiana Jones: Making the Case for Mobile Inte...
Mark Fidelman
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
Iwith.org
 
Digital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide CompilationDigital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide Compilation
Alec Couros
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
Samantha Culshaw-Robinson
 
Cyber Sense and Nonsense
Cyber Sense and NonsenseCyber Sense and Nonsense
Cyber Sense and Nonsense
- Mark - Fullbright
 
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
Sysvoot Antivirus
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
forensicsnation
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
forensicsnation
 
Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)
triciaayco
 
27.3 mb
27.3 mb27.3 mb
27.3 mb
PM_slideshare
 
27.3 mb
27.3 mb27.3 mb
27.3 mb
rrrrtrrr
 
27.3 Mb
27.3 Mb27.3 Mb
27.3 Mb
guru100
 

Similar to Security on social networks AVAST (20)

5c Digital Citizenship
5c Digital Citizenship5c Digital Citizenship
5c Digital Citizenship
 
How To Write A Scientific Essay
How To Write A Scientific EssayHow To Write A Scientific Essay
How To Write A Scientific Essay
 
CTO Cybersecurity Forum 2013 Augusta Epuli Anjoh
CTO Cybersecurity Forum 2013 Augusta Epuli AnjohCTO Cybersecurity Forum 2013 Augusta Epuli Anjoh
CTO Cybersecurity Forum 2013 Augusta Epuli Anjoh
 
2018 Ambassador Leaders Community Action Plan - Cyber Spiders
2018 Ambassador Leaders Community Action Plan - Cyber Spiders2018 Ambassador Leaders Community Action Plan - Cyber Spiders
2018 Ambassador Leaders Community Action Plan - Cyber Spiders
 
Reveal & Reduce the threat of Deep Fake Technology
Reveal & Reduce the threat of Deep Fake TechnologyReveal & Reduce the threat of Deep Fake Technology
Reveal & Reduce the threat of Deep Fake Technology
 
How To Write A College Diversity Essay - Example
How To Write A College Diversity Essay - ExampleHow To Write A College Diversity Essay - Example
How To Write A College Diversity Essay - Example
 
Be Open To All Feedback For Maximum Results
Be Open To All Feedback For Maximum ResultsBe Open To All Feedback For Maximum Results
Be Open To All Feedback For Maximum Results
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)
 
Hugh Hefner, Sherlock Holmes & Indiana Jones: Making the Case for Mobile Inte...
Hugh Hefner, Sherlock Holmes & Indiana Jones: Making the Case for Mobile Inte...Hugh Hefner, Sherlock Holmes & Indiana Jones: Making the Case for Mobile Inte...
Hugh Hefner, Sherlock Holmes & Indiana Jones: Making the Case for Mobile Inte...
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
 
Digital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide CompilationDigital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide Compilation
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Cyber Sense and Nonsense
Cyber Sense and NonsenseCyber Sense and Nonsense
Cyber Sense and Nonsense
 
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)
 
27.3 mb
27.3 mb27.3 mb
27.3 mb
 
27.3 mb
27.3 mb27.3 mb
27.3 mb
 
27.3 Mb
27.3 Mb27.3 Mb
27.3 Mb
 

More from Julia Szymańska

Bezpecnost na socialnich sitich verze pro profesionaly
Bezpecnost na socialnich sitich verze pro profesionalyBezpecnost na socialnich sitich verze pro profesionaly
Bezpecnost na socialnich sitich verze pro profesionaly
Julia Szymańska
 
Communities and user experience.
Communities and user experience.Communities and user experience.
Communities and user experience.
Julia Szymańska
 
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJSOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
Julia Szymańska
 
#CFMW, Creative fashion marketing: Sociální sítě pro módní návrháře a jejich ...
#CFMW, Creative fashion marketing: Sociální sítě pro módní návrháře a jejich ...#CFMW, Creative fashion marketing: Sociální sítě pro módní návrháře a jejich ...
#CFMW, Creative fashion marketing: Sociální sítě pro módní návrháře a jejich ...Julia Szymańska
 
Trzy Fazy rozwoju mediów społecznościowych w AVAST Software
Trzy Fazy rozwoju mediów społecznościowych w AVAST SoftwareTrzy Fazy rozwoju mediów społecznościowych w AVAST Software
Trzy Fazy rozwoju mediów społecznościowych w AVAST Software
Julia Szymańska
 
Social Media for B2B: introduction
Social Media for B2B: introduction Social Media for B2B: introduction
Social Media for B2B: introduction
Julia Szymańska
 
Social media team v avastu
Social media team v avastuSocial media team v avastu
Social media team v avastuJulia Szymańska
 
3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST Software3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST Software
Julia Szymańska
 

More from Julia Szymańska (8)

Bezpecnost na socialnich sitich verze pro profesionaly
Bezpecnost na socialnich sitich verze pro profesionalyBezpecnost na socialnich sitich verze pro profesionaly
Bezpecnost na socialnich sitich verze pro profesionaly
 
Communities and user experience.
Communities and user experience.Communities and user experience.
Communities and user experience.
 
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJSOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
SOCIÁLNÍ SÍTĚ JAKO KOMPLEXNÍ HR NÁSTROJ
 
#CFMW, Creative fashion marketing: Sociální sítě pro módní návrháře a jejich ...
#CFMW, Creative fashion marketing: Sociální sítě pro módní návrháře a jejich ...#CFMW, Creative fashion marketing: Sociální sítě pro módní návrháře a jejich ...
#CFMW, Creative fashion marketing: Sociální sítě pro módní návrháře a jejich ...
 
Trzy Fazy rozwoju mediów społecznościowych w AVAST Software
Trzy Fazy rozwoju mediów społecznościowych w AVAST SoftwareTrzy Fazy rozwoju mediów społecznościowych w AVAST Software
Trzy Fazy rozwoju mediów społecznościowych w AVAST Software
 
Social Media for B2B: introduction
Social Media for B2B: introduction Social Media for B2B: introduction
Social Media for B2B: introduction
 
Social media team v avastu
Social media team v avastuSocial media team v avastu
Social media team v avastu
 
3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST Software3 million fans. Whats next?! Social Media by AVAST Software
3 million fans. Whats next?! Social Media by AVAST Software
 

Recently uploaded

Using Playlists to Increase YouTube Watch Time
Using Playlists to Increase YouTube Watch TimeUsing Playlists to Increase YouTube Watch Time
Using Playlists to Increase YouTube Watch Time
SocioCosmos
 
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
exqfuhe
 
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
wozek1
 
ChatGPT 4o for social media step by step Guide.pdf
ChatGPT 4o for social media step by step Guide.pdfChatGPT 4o for social media step by step Guide.pdf
ChatGPT 4o for social media step by step Guide.pdf
almutabbil
 
SOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and serviceSOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and service
viralbusinessmarketi
 
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
9u4xjk4w
 
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
anubug
 
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
AJHSSR Journal
 
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdfUR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
urbhattiacademy
 
Top Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's PerformanceTop Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's Performance
Elysian Digital Services Pvt. Ltd.
 
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
AJHSSR Journal
 

Recently uploaded (11)

Using Playlists to Increase YouTube Watch Time
Using Playlists to Increase YouTube Watch TimeUsing Playlists to Increase YouTube Watch Time
Using Playlists to Increase YouTube Watch Time
 
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
 
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
 
ChatGPT 4o for social media step by step Guide.pdf
ChatGPT 4o for social media step by step Guide.pdfChatGPT 4o for social media step by step Guide.pdf
ChatGPT 4o for social media step by step Guide.pdf
 
SOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and serviceSOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and service
 
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
 
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
 
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
 
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdfUR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
 
Top Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's PerformanceTop Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's Performance
 
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
 

Security on social networks AVAST