Risk
5/28/2010
07:35 PM
50%
50%

Symantec Tips For Guarding Facebook Privacy

With Facebook's constant privacy policy changes, Symantec has offered users six tips to aide users in protecting their personal information on the social network.

With Facebook continuously under fire for its privacy policies, Symantec is offering six tips for users of the social network who want to protect their personal information.

Topping the list released Friday is to never share the password used to enter the site. Not even a best friend or spouse is a safe haven.

Users of Facebook and other social networks should also be aware of the "digital crumbs" they leave behind, Symantec said. The security vendor warns that photos, videos and comments posted on the Web are often there forever, so never post anything you wouldn't want a grandmother or future employer to see.

Also, never post sensitive information, such as a phone number, e-mail or birthday; and there's no need to share status updates, such as, "Off to Vegas for the weekend," Symantec said. Such information could be useful to criminals in your town.

Thirdly, Symantec advises social network users to ignore links, supposedly sent from friends, that have enticing titles like, "Check Out The Best Beach Bods." Chances are, the link came from a hacker who broke into a friend's account.

Another tip is to make sure links posted to a Facebook wall are safe. While Symantec suggest the use of its Norton Safe Web software, other security vendors offer similar products. Such applications scan for links that take people to sites built by hackers to steal personal information.

Symantec also advises people to limit their "circle of trust" on social networking sites to family and friends. "Ignore requests from people you do not know, it could be a cyber-criminal," the vendor said.

Finally, people need to stay informed of Facebook's privacy settings, which change often. In the last five years, Facebook's privacy policy has grown from about 1,000 words to today's 5,830 words.

Facebook Chief Executive Mark Zuckerberg acknowledged this week the growing complexity of the site's privacy controls by announcing plans to roll out simplified controls. The new tools will offer users one menu with three settings that determine who can see shared content: friends, friends of friends and everyone.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: just wondering...Thanx
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.