Web Hosting Articles

  Home arrow Web Hosting Articles arrow Social Networking Security
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

Social Networking Security
By: Bruce Coker
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 4 stars4 stars4 stars4 stars4 stars / 5

    Table of Contents:
  • Social Networking Security
  • Twitterank Issues
  • Password Sharing Hazards
  • Other Social Network Security Hazards

  • Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article




    Social Networking Security

    (Page 1 of 4 )

    Developers and regular users alike learned all the key points necessary for online security back in the 1990s, when email first became dangerous, right? Well...maybe not. Recent attacks on social networking sites such as Facebook, Twitter, and others have left users exposed to having their accounts hacked into, or worse. Keep reading for an overview of the phenomenon, and some hints for protecting yourself.

    Being hacked is almost a badge of honor these days. With a number of high profile individuals recently having their Twitter accounts compromised - and profiles don't get much higher than the President of the USA - the potential security risk posed by sites such as Twitter and Facebook has finally made an impact on the national consciousness appropriate to the seriousness of the situation.

    The Twitter vulnerability that was announced on January 5 was not just another typical phishing or social engineering scam. In a move that could be interpreted as an escalation of intent, it used the microblog site's internal support tools to broadcast tweets purporting to come from Mr. Obama, along with other luminaries such as Rick Sanchez and Britney Spears.

    Coming on the back of a long sequence of security issues that plagued social networks during the second half of 2008, this raid has been interpreted in some quarters as a sign that web 2.0 is finally maturing to the point where it is attracting attention from the usual selection of crazies and mavericks. But while it's certainly true that being targeted by hackers is usually an indication of having achieved a certain status or size, the approach to security of many such sites continues to invite trouble.  

    If the Twitter hack were the only symptom, it would barely deserve comment. After all, many web sites have been compromised over the years without it signaling the end of the world. What is concerning is that the event seems to be part of a whole series that indicate a serious failure by web 2.0 site developers to absorb the security lessons of the previous decade.

    In rapid succession during the weeks leading up to the breach, we saw professional photographers losing valuable images as Digital Railroad fell victim to the recession, watched the Twitterank experiment spiral out of control , were warned of viruses lurking in 'secret' videos , and were even asked to question whether we were really looking at Facebook or Twitter or some carefully crafted imitations of these sites designed to steal our personal information.

    More Web Hosting Articles Articles
    More By Bruce Coker


    - Top Wordpress Plugins for SEO
    - Top Drupal Evaluation and Rating Modules
    - Free Network Monitoring Programs for Max Per...
    - E-store Hosting: Free Options for Beginners
    - Dropbox: The Ultimate File-Sharing and Synci...
    - Reviewing the Best Free Web Hosting Sites
    - Businesses Turn to Reseller Web Hosting for ...
    - Multiple Data Center Hosting
    - Web Hosting Goes Green
    - Web Hosting Technology Overview
    - Collaborate: An Examination of Tools for Gro...
    - Social Networking Security
    - Domain Names 101
    - Top Software to Help Manage Your Websites
    - The Evolution of Phishing

    Developer Shed Affiliates


    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap