Articles on Social Networking
Below are my perspectives on Social Networking, drawn from my work as a security leader and practitioner.
- Social Networking Scammers Prescreen Victims for Tech Support Scams via Twitter and Phone Tech support scammers use Twitter bots to respond to public messages containing words like "virus" and "malware," inviting potential victims to call phone numbers where automated systems profile...
- Malware Researching Scams Helps Understand Human Vulnerabilities Online scammers exploit predictable human vulnerabilities: starting scams in the physical world, customizing messages with victims' locations, appealing to vanity and self-interest, posing as...
- Social Networking What Anomalies Trigger The LinkedIn Sign-In Verification Challenge? LinkedIn presents security challenges when detecting logins from unfamiliar locations, new countries, extended absences, or suspicious activity patterns. The verification process involves email links...
- Communication Tips for Troubleshooting Human Communications Effective communication requires empathy, acknowledging different perspectives, and phrasing arguments using the other person's terminology and objectives. Key tips cover email best practices,...
- Career Hiring Strong Candidates for Information Security Roles
- Authentication Anticipating The Future of User Account Access Sharing Roughly one in three teens share passwords as expressions of trust, much like giving out school locker combinations. Adults also share credentials for practical reasons—Netflix accounts, admin...