- Social Networking How Clickjacking Attacks Work
Clickjacking tricks users into clicking invisible elements from other sites—commonly used to propagate Facebook links. Advanced variations can de-anonymize visitors by capturing their identity when...
- Social Networking Security Implications of the "Web" Becoming the "Social Web"
The web is becoming the social web—instant communication, public archives, mobile access, weak relationships. Security implications: business interactions occur outside corporate networks, data leaks...
- Social Networking When Bots Use Social Media for Command and Control
Malware authors use social media for command and control because HTTP traffic rarely gets blocked and blends into normal browsing. Examples include banking trojans retrieving instructions from...
- Malware A Delusive Sense of Security in Walled Gardens
Walled gardens like Facebook, corporate networks, and smartphone app stores encourage users to lower their guard, creating false security assumptions that scammers exploit. People click more readily...
- Privacy Learn the Future of Privacy and Social Interactions from Teens
Adults see privacy as controlling what's made public—private by default. Teens think about what to exclude from being public—public by default. Understanding these emerging norms and teenagers'...
- Risk Management Understand the Risks of Email Search Add-Ons and Services
Cloud email search tools like Greplin and Xobni index messages and contacts across services, creating attractive targets for attackers. Most vendors provide little detail about security measures....