SlideShare a Scribd company logo
Hosted by:
        Jeffrey Fox
        Technology Editor
Since 2004, Consumer Reports
   has published its annual
 State of the Net report
Some of this year’s findings …




   Where to find 2010 Consumer Reports State of the Net survey:
June 2010 issue of CONSUMER REPORTS or ConsumerReports.org
Key threat projections from the survey

* Cybercrime cost U.S. consumers $4.5 billion over the past two years

* 40 percent of households experienced at least one virus infection over the
past two years, a significant increase

* 2.1 million computers were replaced due to viruses and spyware during the
past two years

* 5.4 million online consumers submitted personal information to e-mail
(phishing) scammers during the past two years
Online identity theft
1.7 million online households identified an online source of ID theft in past year


                    Sources of online ID theft*
                                                                               Retail purchase

                                                  Financial transaction
                                     E-mail scam I responded
                                                to
                                Someone hacked into my
                                      computer
                       Social network site

                0           2             4            6            8     10       12
                                         % citing this source


          *Among respondents at least somewhat confident they knew source of theft




               Source: Consumer Reports 2010 State of the Net
                 Consumer Reports National Research Center
Social networks:
            Some common risky behaviors
* 52% of social network users disclose at least one piece of personal
information that could lead to identity theft or jeopardize their family
     38% post their full birth date (including the year)
     45% of those with children at home post photos of their children
     8% post their own street address

* Networks can be risky: 9 percent of online households experienced abuse
on a social network during the past year




                                           Projections from the 2010 survey
Abuse on social networks
• 5.1 million online households in the past year
                               Social network abuses*
                                                                                      Infected by malware from app
                                               Someone used my friends list to
                                                          spread virus
                                       Shared invitation with friends that
                                                  was a scam
                                     Shared app that infected friends
                                     Unauthorized use of log-in and
                                                identity
                                     I was harrassed or threatened
                      Someone solicted money in my
                                    name
            Submitted personal info to
               fraudulent "friend"
            Someone harmed my reputation

                                     Other

     0     5              10               15               20             25    30   35              40
                                           % reporting this type of abuse


                               *Among respondents reporting at least one abuse




           Source: Consumer Reports 2010 State of the Net
             Consumer Reports National Research Center
Social network privacy controls
                                                    Facebook

                                              MySpace

                                        Linked In

                              Twitter

                          Classmates

    0         20         40             60          80         100
 Percent of each service's users who have used privacy controls




    Source: Consumer Reports 2010 State of the Net
    Consumer Reports National Research Center
Social networks are becoming
         a new platform for cybercrime
Twitter spam

                                  Fake celebrity postings on
                                  “LinkedIn” leads users
                                   to malware




 Source: Personal e-mail In-box
This is not
                                             the first time
                                             that we’ve
                                             had to
                                             scrutinize
                                             Facebook’s
                                             policies



When our sister publication The
Consumerist disclosed the above
change in Facebook terms of service in
Feb 2009, it ignited a revolt and the site
was forced to back down (right)
Security and privacy on
          Projections from the 2010 survey
56% of Facebook users disclosed at least one piece of personal information that
could lead to identity theft or jeopardize their family

42% posted their birth date (including year)

7% posted their own street address

3% disclosed when they will be away from home

26% of Facebook users with children posted their children’s photos and names

23% of Facebook users didn’t use or didn’t know about the service’s privacy controls

18.4 million Facebook members used apps
    38% of app users were confident apps are secure--or haven’t thought about it

1.8 million computers were infected by apps obtained through one or another social
network in the past year
Facebook’s new instant personalization program:
How to block your friends from divulging info about you:




    1    2




                                     3




                                                           6




4
                            5
Thank you!
Jeffrey Fox, Technology Editor, foxjef@consumer.org




                Hosted by:

More Related Content

What's hot

Rpt repeating-history
Rpt repeating-historyRpt repeating-history
Rpt repeating-history
Anatoliy Tkachev
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
Tom Eston
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
Brian Honan
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
Patricia M Watson
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
n|u - The Open Security Community
 
Symantec Website Security Threat Report
Symantec Website Security Threat ReportSymantec Website Security Threat Report
Symantec Website Security Threat Report
cheinyeanlim
 
Lawyers Suing China For 2 2 Billion Us Dollars
Lawyers Suing China For 2 2 Billion Us DollarsLawyers Suing China For 2 2 Billion Us Dollars
Lawyers Suing China For 2 2 Billion Us Dollars
MaximumHit Ltd
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revista
the_ro0t
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
ArrayShield Technologies Private Limited
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
BillBrenner70
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
Instant Checkmate
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
Symantec
 
Sanchez & Andaya - Etech
Sanchez & Andaya - EtechSanchez & Andaya - Etech
Sanchez & Andaya - Etech
jeysi1
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
Katie_Waters
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Kushal Mondal
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Jason Hong
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Jason Hong
 
My presentation
My presentationMy presentation
My presentation
Devashri Balinge
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
digitalworld12
 

What's hot (20)

Rpt repeating-history
Rpt repeating-historyRpt repeating-history
Rpt repeating-history
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
Symantec Website Security Threat Report
Symantec Website Security Threat ReportSymantec Website Security Threat Report
Symantec Website Security Threat Report
 
Lawyers Suing China For 2 2 Billion Us Dollars
Lawyers Suing China For 2 2 Billion Us DollarsLawyers Suing China For 2 2 Billion Us Dollars
Lawyers Suing China For 2 2 Billion Us Dollars
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revista
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
Sanchez & Andaya - Etech
Sanchez & Andaya - EtechSanchez & Andaya - Etech
Sanchez & Andaya - Etech
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
 
My presentation
My presentationMy presentation
My presentation
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 

Similar to Social Insecurity Panel, Jeff Fox, Consumer Reports

Spam identification fake profile
Spam identification fake profileSpam identification fake profile
Users and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityUsers and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & Security
Dr. V Vorvoreanu
 
Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpna
delamm2
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
Users and Behaviors- Social Internet
Users and Behaviors- Social InternetUsers and Behaviors- Social Internet
Users and Behaviors- Social Internet
Kenie Moses
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
Dominic Karunesudas
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
Ray Brannon
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Arindam Sarkar
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
Parag Deodhar
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
Gerard1990
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Abhishek Baranwal
 
Increasing Vulnerability of the user Data at Cyberspace
Increasing Vulnerability of the user Data at CyberspaceIncreasing Vulnerability of the user Data at Cyberspace
Increasing Vulnerability of the user Data at Cyberspace
ijtsrd
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
LifeLockBusinessSolutions
 
Darkside
DarksideDarkside
Darkside
Kenie Moses
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Debayon Saha
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
Impulse Digital
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
IRJET Journal
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
todd521
 
Facebook
FacebookFacebook
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
scstatelibrary
 

Similar to Social Insecurity Panel, Jeff Fox, Consumer Reports (20)

Spam identification fake profile
Spam identification fake profileSpam identification fake profile
Spam identification fake profile
 
Users and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityUsers and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & Security
 
Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpna
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Users and Behaviors- Social Internet
Users and Behaviors- Social InternetUsers and Behaviors- Social Internet
Users and Behaviors- Social Internet
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Increasing Vulnerability of the user Data at Cyberspace
Increasing Vulnerability of the user Data at CyberspaceIncreasing Vulnerability of the user Data at Cyberspace
Increasing Vulnerability of the user Data at Cyberspace
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Darkside
DarksideDarkside
Darkside
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
Facebook
FacebookFacebook
Facebook
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

Social Insecurity Panel, Jeff Fox, Consumer Reports

  • 1. Hosted by: Jeffrey Fox Technology Editor
  • 2. Since 2004, Consumer Reports has published its annual State of the Net report
  • 3. Some of this year’s findings … Where to find 2010 Consumer Reports State of the Net survey: June 2010 issue of CONSUMER REPORTS or ConsumerReports.org
  • 4. Key threat projections from the survey * Cybercrime cost U.S. consumers $4.5 billion over the past two years * 40 percent of households experienced at least one virus infection over the past two years, a significant increase * 2.1 million computers were replaced due to viruses and spyware during the past two years * 5.4 million online consumers submitted personal information to e-mail (phishing) scammers during the past two years
  • 5. Online identity theft 1.7 million online households identified an online source of ID theft in past year Sources of online ID theft* Retail purchase Financial transaction E-mail scam I responded to Someone hacked into my computer Social network site 0 2 4 6 8 10 12 % citing this source *Among respondents at least somewhat confident they knew source of theft Source: Consumer Reports 2010 State of the Net Consumer Reports National Research Center
  • 6. Social networks: Some common risky behaviors * 52% of social network users disclose at least one piece of personal information that could lead to identity theft or jeopardize their family 38% post their full birth date (including the year) 45% of those with children at home post photos of their children 8% post their own street address * Networks can be risky: 9 percent of online households experienced abuse on a social network during the past year Projections from the 2010 survey
  • 7. Abuse on social networks • 5.1 million online households in the past year Social network abuses* Infected by malware from app Someone used my friends list to spread virus Shared invitation with friends that was a scam Shared app that infected friends Unauthorized use of log-in and identity I was harrassed or threatened Someone solicted money in my name Submitted personal info to fraudulent "friend" Someone harmed my reputation Other 0 5 10 15 20 25 30 35 40 % reporting this type of abuse *Among respondents reporting at least one abuse Source: Consumer Reports 2010 State of the Net Consumer Reports National Research Center
  • 8. Social network privacy controls Facebook MySpace Linked In Twitter Classmates 0 20 40 60 80 100 Percent of each service's users who have used privacy controls Source: Consumer Reports 2010 State of the Net Consumer Reports National Research Center
  • 9. Social networks are becoming a new platform for cybercrime Twitter spam Fake celebrity postings on “LinkedIn” leads users to malware Source: Personal e-mail In-box
  • 10. This is not the first time that we’ve had to scrutinize Facebook’s policies When our sister publication The Consumerist disclosed the above change in Facebook terms of service in Feb 2009, it ignited a revolt and the site was forced to back down (right)
  • 11. Security and privacy on Projections from the 2010 survey 56% of Facebook users disclosed at least one piece of personal information that could lead to identity theft or jeopardize their family 42% posted their birth date (including year) 7% posted their own street address 3% disclosed when they will be away from home 26% of Facebook users with children posted their children’s photos and names 23% of Facebook users didn’t use or didn’t know about the service’s privacy controls 18.4 million Facebook members used apps 38% of app users were confident apps are secure--or haven’t thought about it 1.8 million computers were infected by apps obtained through one or another social network in the past year
  • 12. Facebook’s new instant personalization program: How to block your friends from divulging info about you: 1 2 3 6 4 5
  • 13. Thank you! Jeffrey Fox, Technology Editor, foxjef@consumer.org Hosted by: