SlideShare a Scribd company logo
 
Twitter
Twitter ,[object Object],[object Object],[object Object],[object Object],In Feb 2009, the growth was of 1382% (feb 2008 – feb 2009, study by nielsen online)
Time on Site
Twitter Spam ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Imagine a malware URL from these guys
Is it hard to send spam on twitter?
Facebook
Facebook ,[object Object],[object Object]
Again, facebook
Facebook spam ,[object Object],[object Object],[object Object],[object Object]
Is it hard to send spam on facebook?
LinkedIn
LinkedIn ,[object Object]
LinkedIn Spam ,[object Object],[object Object],[object Object]
Blogs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Current Menaces ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
For Home Users ,[object Object],[object Object],[object Object],[object Object],[object Object]
For SMBs ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Security for javascript
Security for javascriptSecurity for javascript
Security for javascript
Hữu Đại
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guestc901160
 

What's hot (10)

Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Social media security challenges
Social media security challengesSocial media security challenges
Social media security challenges
 
Social Media Content Categories
Social Media Content CategoriesSocial Media Content Categories
Social Media Content Categories
 
Twitter Prez
Twitter PrezTwitter Prez
Twitter Prez
 
Security for javascript
Security for javascriptSecurity for javascript
Security for javascript
 
Let’s get social tm speech presentation
Let’s get social tm speech presentationLet’s get social tm speech presentation
Let’s get social tm speech presentation
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
2016 Social Engineering Training
2016 Social Engineering Training2016 Social Engineering Training
2016 Social Engineering Training
 
An Introduction To Twitter For Marketers
An Introduction To Twitter For MarketersAn Introduction To Twitter For Marketers
An Introduction To Twitter For Marketers
 
Twitter For Business - Enterprising Mom's Network Conference
Twitter For Business - Enterprising Mom's Network ConferenceTwitter For Business - Enterprising Mom's Network Conference
Twitter For Business - Enterprising Mom's Network Conference
 

Viewers also liked

Trojan.fake alert.patch
Trojan.fake alert.patchTrojan.fake alert.patch
Trojan.fake alert.patch
Catalin Cosoi
 
Strategic planningforthetourismindustry
Strategic planningforthetourismindustryStrategic planningforthetourismindustry
Strategic planningforthetourismindustry
Alpa Agarwal
 
Congreso Misiones
Congreso MisionesCongreso Misiones
Congreso Misiones
cjcamposale
 
Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010
Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010
Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010
Alpa Agarwal
 
Job search skills rock, paper, scissors, internet
Job search skills rock, paper, scissors, internetJob search skills rock, paper, scissors, internet
Job search skills rock, paper, scissors, internet
TinaHolt
 
Sell online alpa agarwal 7 26-12 mayaco conference
Sell online alpa agarwal 7 26-12 mayaco conferenceSell online alpa agarwal 7 26-12 mayaco conference
Sell online alpa agarwal 7 26-12 mayaco conference
Alpa Agarwal
 
Social networks threats
Social networks threatsSocial networks threats
Social networks threats
Catalin Cosoi
 
Successful_Product_Roadmapping_2013_Alpa_Agarwal
Successful_Product_Roadmapping_2013_Alpa_AgarwalSuccessful_Product_Roadmapping_2013_Alpa_Agarwal
Successful_Product_Roadmapping_2013_Alpa_Agarwal
Alpa Agarwal
 
545 presentación doctor-illia
545 presentación doctor-illia545 presentación doctor-illia
545 presentación doctor-illia
cjcamposale
 
Lista de Capacitadores y sedes de la Red CCR TIC
Lista de Capacitadores y sedes de la Red CCR TICLista de Capacitadores y sedes de la Red CCR TIC
Lista de Capacitadores y sedes de la Red CCR TIC
cjcamposale
 

Viewers also liked (18)

Trojan.fake alert.patch
Trojan.fake alert.patchTrojan.fake alert.patch
Trojan.fake alert.patch
 
Strategic planningforthetourismindustry
Strategic planningforthetourismindustryStrategic planningforthetourismindustry
Strategic planningforthetourismindustry
 
Get It Loud Records Presentation
Get It Loud Records PresentationGet It Loud Records Presentation
Get It Loud Records Presentation
 
Congreso Misiones
Congreso MisionesCongreso Misiones
Congreso Misiones
 
Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010
Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010
Extraordinary customerexperiencesalpaagarwalmicrosoftjuly2010
 
Job search skills rock, paper, scissors, internet
Job search skills rock, paper, scissors, internetJob search skills rock, paper, scissors, internet
Job search skills rock, paper, scissors, internet
 
Interviewing Skills for any Economy
Interviewing Skills for any EconomyInterviewing Skills for any Economy
Interviewing Skills for any Economy
 
Sell online alpa agarwal 7 26-12 mayaco conference
Sell online alpa agarwal 7 26-12 mayaco conferenceSell online alpa agarwal 7 26-12 mayaco conference
Sell online alpa agarwal 7 26-12 mayaco conference
 
Social networks threats
Social networks threatsSocial networks threats
Social networks threats
 
Sara's life
Sara's lifeSara's life
Sara's life
 
Flyer
FlyerFlyer
Flyer
 
Professionalism appearance part i
Professionalism   appearance part iProfessionalism   appearance part i
Professionalism appearance part i
 
Successful_Product_Roadmapping_2013_Alpa_Agarwal
Successful_Product_Roadmapping_2013_Alpa_AgarwalSuccessful_Product_Roadmapping_2013_Alpa_Agarwal
Successful_Product_Roadmapping_2013_Alpa_Agarwal
 
Corea del sud 2003
Corea del sud 2003Corea del sud 2003
Corea del sud 2003
 
NLP
NLPNLP
NLP
 
545 presentación doctor-illia
545 presentación doctor-illia545 presentación doctor-illia
545 presentación doctor-illia
 
Lista de Capacitadores y sedes de la Red CCR TIC
Lista de Capacitadores y sedes de la Red CCR TICLista de Capacitadores y sedes de la Red CCR TIC
Lista de Capacitadores y sedes de la Red CCR TIC
 
Fracturas y luxaciones
Fracturas y luxacionesFracturas y luxaciones
Fracturas y luxaciones
 

Similar to Security Challenges Today

Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
Zoaib Mirza
 
Web design premium
Web design premiumWeb design premium
Web design premium
jeannined_1
 
Multimedia01
Multimedia01Multimedia01
Multimedia01
Les Davy
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
Rozell Sneede
 
Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)
Marco Balduzzi
 

Similar to Security Challenges Today (20)

Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Understanding SaaS Concepts
Understanding SaaS ConceptsUnderstanding SaaS Concepts
Understanding SaaS Concepts
 
Web design premium
Web design premiumWeb design premium
Web design premium
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Utilizing social media to sustain your club - Soroptimist edition
Utilizing social media to sustain your club - Soroptimist editionUtilizing social media to sustain your club - Soroptimist edition
Utilizing social media to sustain your club - Soroptimist edition
 
C 7
C 7C 7
C 7
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag Sciences
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Cybersecurity in communication
Cybersecurity in communicationCybersecurity in communication
Cybersecurity in communication
 
Multimedia01
Multimedia01Multimedia01
Multimedia01
 
Utilizing social media to build your program
Utilizing social media to build your programUtilizing social media to build your program
Utilizing social media to build your program
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics Webinar
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 

Security Challenges Today

Editor's Notes

  1. Who am I and what I am going to talk about
  2. Types of twitter spam Personal twitter spam received
  3. Facebook growth Facebook user profile (age)
  4. Just for fun: male vs. female facebook usage