Risk
5/28/2010
07:35 PM
50%
50%

Symantec Tips For Guarding Facebook Privacy

With Facebook's constant privacy policy changes, Symantec has offered users six tips to aide users in protecting their personal information on the social network.

With Facebook continuously under fire for its privacy policies, Symantec is offering six tips for users of the social network who want to protect their personal information.

Topping the list released Friday is to never share the password used to enter the site. Not even a best friend or spouse is a safe haven.

Users of Facebook and other social networks should also be aware of the "digital crumbs" they leave behind, Symantec said. The security vendor warns that photos, videos and comments posted on the Web are often there forever, so never post anything you wouldn't want a grandmother or future employer to see.

Also, never post sensitive information, such as a phone number, e-mail or birthday; and there's no need to share status updates, such as, "Off to Vegas for the weekend," Symantec said. Such information could be useful to criminals in your town.

Thirdly, Symantec advises social network users to ignore links, supposedly sent from friends, that have enticing titles like, "Check Out The Best Beach Bods." Chances are, the link came from a hacker who broke into a friend's account.

Another tip is to make sure links posted to a Facebook wall are safe. While Symantec suggest the use of its Norton Safe Web software, other security vendors offer similar products. Such applications scan for links that take people to sites built by hackers to steal personal information.

Symantec also advises people to limit their "circle of trust" on social networking sites to family and friends. "Ignore requests from people you do not know, it could be a cyber-criminal," the vendor said.

Finally, people need to stay informed of Facebook's privacy settings, which change often. In the last five years, Facebook's privacy policy has grown from about 1,000 words to today's 5,830 words.

Facebook Chief Executive Mark Zuckerberg acknowledged this week the growing complexity of the site's privacy controls by announcing plans to roll out simplified controls. The new tools will offer users one menu with three settings that determine who can see shared content: friends, friends of friends and everyone.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
DNS Threats: What Every Enterprise Should Know
Domain Name System exploits could put your data at risk. Here's some advice on how to avoid them.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio

The cybersecurity profession struggles to retain women (figures range from 10 to 20 percent). It's particularly worrisome for an industry with a rapidly growing number of vacant positions.

So why does the shortage of women continue to be worse in security than in other IT sectors? How can men in infosec be better allies for women; and how can women be better allies for one another? What is the industry doing to fix the problem -- what's working, and what isn't?

Is this really a problem at all? Are the low numbers simply an indication that women do not want to be in cybersecurity, and is it possible that more women will never want to be in cybersecurity? How many women would we need to see in the industry to declare success?

Join Dark Reading senior editor Sara Peters and guests Angela Knox of Cloudmark, Barrett Sellers of Arbor Networks, Regina Wallace-Jones of Facebook, Steve Christey Coley of MITRE, and Chris Roosenraad of M3AAWG on Wednesday, July 13 at 1 p.m. Eastern Time to discuss all this and more.