Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Managing the Security and Privacy Risks of Social Media Don Knox, CPP, CITRMS Global Security and Risk Analysis Manager Caterpillar (309)
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Social media threats. Warning! May contain mild peril.
Staying Safe How to Identify and Avoid Bad Things.
Staying Safe in Cyberspace. What do YOU do online? Send and receive Send and receive Shop Shop Research Research Instant messaging/chat.
Security Awareness: Security Tips for Protecting Ourselves Online Friday, May 20, 2011 Brian Allen, CISSP Network Security Analyst.
What do I need to know?.   Instant Messages  Social Networking.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
The Most Dangerous Places on The Web (according to PC World)
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Quiz Review.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Internet safety By Lydia Snowden.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
FACEBOOK IS THE BEST THING THAT EVER HAPPENED TO FRIENDSHIP WHY I LIKE FACEBOOK! By Mike Matthews.
Everyday Cyber Security April 27 th Why Should You Care? Ensuring your privacy and security Protecting yourself and others Practicing safe internet.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Internet Security and Your Computer Welcome to Boot Camp.
What is Spam? d min.
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
INTRODUCTION & QUESTIONS.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Safe Computing Practices. What is behind a cyber attack? 1.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.
Computer Security Keeping you and your computer safe in the digital world.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Windows Tutorial 5 Protecting Your Computer
Creating your online identity
What they are and how to protect against them
Social Media Attacks.
Internet Identity, Safety, & Security
Protect Your Computer Against Harmful Attacks!
Risk of the Internet At Home
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
CYBERSAFETY & Personal information
Internet Safety – Social Media
Presentation transcript:

Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House

Today’s Discussion Items Social Networking Security and Privacy: – Facebook photo settings – Phishing examples Facebook and Computer Tips Ursa Bear Observations Highlighted Facebook Malware: – Koobface

Twitter Phish 1 of 2

Twitter Phish 2 of 2

Facebook Options Facebook User Facebook Page Facebook Group – Open: All content is public. – Closed: Limited public content. Members can see all content. – Secret: Members and content are private.

Facebook Group Problems 1.Members can add friends. No confirmation is required by the person being added. – One of your “friends” could add you to the new, closed “Al-Qaeda lovers” group. 2.When Facebook group administrators step down, anyone else can take over. – For small groups, administrators can edit a group name or info, moderate discussion, and message group members.

Social Network Policy

Link Security Tips Use caution when clicking a link or opening an attachment, even if sent or posted by a friend. If you have any doubt, get confirmation directly from the sender. Be wary of messages that include attractive offers or urgent requests. Watch out for links that require you to immediately provide a login and password. Type the URL (for example, directly into your browser address bar.

Browser Security Tips Use Firefox as your regular browser and have it automatically update itself. Firefox 3+ has Phishing and Malware Protection on by default to help keep you safe. Use the Add Block Plus Firefox Addon. Use the NoScript Firefox Addon (for diehard users only)

Four OS Security Tips Make sure the operating system has: – Update automatically – Up-to-date Anti-virus/Anti-spyware – Firewall turned on – All accounts have strong passwords

Facebook Security Facebook provides easy tools to help you: – Keep track of your activity – Keep track of your logins – Control the information you share – Prove your identity if you ever lose access to your account

Facebook Security Tips

Facebook Account Security

Facebook Download Info

Ursa Bear 1

Ursa Bear 2

Ursa Bear 3

Ursa Bear 4

Ursa Bear 5

What To Do With A Scam If you come across a scam, report it so that it can be taken down. Facebook provides report links next to most pieces of content, as well as ways to report spam messages and s. You can also let the Network Security Office know about it.

Koobface Botnet Koobface made an estimated $2m since July 2009 It makes money by selling scareware (fake anti- virus), doing click fraud and other scams. Koobface targets Facebook and other sites. 400,000+ bots; 20,000+ fake Facebook accounts Tricks users to execute malware disguised as Flash updates needed to view shocking content. The malware turns compromised PCs into zombie drones under the control of hackers.

Fake Anti-Virus Screen Shot

KoobFace Botnet How it works in one example: Koobface is a Russian based botnet The threat arrives as a Facebook private message that contains a supposed link to a youtube video

Don’t Click the LINK!

Koobface Example Continued Users who are tricked into clicking the link are redirected to other pages until they finally end up at a spoofed YouTube site called YuoTube

Don’t Trust the “Adobe Flash Update”!

How KoobFace works It searches for social-networking-related cookies and connects to these using saved login sessions. It then navigates through users’ pages to search for their friends. It phones home to get the actual message that the worm will then spread to your friends. McAfee says it is not unusual to see 10,000 Koobface variants in one month. TrendLabs considers Zeus and Koobface to be the most prolific malware families

Koobface Targets MacOSX A new version of Koobface attacks Mac OSX spreads through Facebook. Security company Intego says this version uses a malicious Java applet to attack users.

Facebook Survey Scam A message is posted with an enticing link. It appears to be posted by one of your friends.

Facebook Survey Scam Clicking the link takes you to a page which makes you "Like" the page before showing you the “SICK hidden message" from Toy Story 3.

Facebook Survey Scam The goal for this scam is to direct users to an online survey. The survey is required if you want to view the Toy Story 3 content. The scammers make money for the traffic they bring to the survey, and the survey-makers will benefit from collecting your data.