<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Security &#8211; Social Media SEO</title>
	<atom:link href="https://socialmediaseo.net/category/technology/security-technology/feed/" rel="self" type="application/rss+xml" />
	<link>https://socialmediaseo.net</link>
	<description>Social Media &#38; Tech News and Tips</description>
	<lastBuildDate>Thu, 15 Feb 2024 17:23:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.2</generator>

<image>
	<url>https://socialmediaseo.net/wp-content/uploads/2020/07/fb-profilepic-150x150.jpg</url>
	<title>Security &#8211; Social Media SEO</title>
	<link>https://socialmediaseo.net</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>WannaCry Ransomware Attack Hits 74 Countries, Shuts Down Hospitals, Services in Europe</title>
		<link>https://socialmediaseo.net/2017/05/12/wannacry-ransomware-attack-hits-74-countries-shuts-down-hospitals-services-in-europe/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wannacry-ransomware-attack-hits-74-countries-shuts-down-hospitals-services-in-europe</link>
					<comments>https://socialmediaseo.net/2017/05/12/wannacry-ransomware-attack-hits-74-countries-shuts-down-hospitals-services-in-europe/#respond</comments>
		
		<dc:creator><![CDATA[Fahad Saleem]]></dc:creator>
		<pubDate>Fri, 12 May 2017 18:58:21 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=34439</guid>

					<description><![CDATA[There is a major cyberattack currently unfolding in about 74 countries. Thousands of hospitals, mainly based in the UK have been hit by this attack, which is called a ransomware attack by the Russian cybersecurity agency, Kaspersky. The attack reportedly shuts down its targets and then asks for $300 worth of ransomware. Apart from UK [&#8230;]]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">There is a major cyberattack currently unfolding in about 74 countries. Thousands of hospitals, mainly based in the UK have been hit by this attack, which is called a ransomware attack by the Russian cybersecurity agency, Kaspersky. The attack reportedly shuts down its targets and then asks for $300 worth of ransomware. Apart from UK hospitals, the attack has also hit Spain’s largest telecom company, Telefonica, and Portugal Telecom. Some universities in Italy are also reported to be crippled by the ransomware attack, which is currently unfolding in Czech Republic, Russia, Japan, Taiwan, Ukraine and many other countries. Czech Republic-based cybersecurity firm Avast has so far recorded over 50,000 attacks globally since Friday afternoon.</p>
<p style="text-align: justify;">Spain’s Gas Natural, and the electrical company Iberdrola have also been hit in this attack.</p>
<p style="text-align: justify;">This is perhaps the biggest ransomware attack recorded in history. Cyber security experts had been cautioning the governments around the world to beware and ready for such hacks.</p>
<p style="text-align: justify;">City services in London, Nottingham, and the counties of Hertfordshire and Cumbria are affected by the latest ransomware attack, the source of which is still unknown.</p>
<p style="text-align: justify;">Experts are calling the latest cyberattack “WannaCry”, or WanaCrypt0r and WCry. This malware infection spreads quickly because it stems from a Windows vulnerability known as EternalBlue that allegedly originated with the NSA. In March, Microsoft released an exploit to patch this exploit, known as MS17-010. But it appears hackers were quicker that the sloppy governments around the world.</p>
<p style="text-align: justify;">Adam Kujawa, director of malware intelligence at Malwarebytes says that he hasn’t seen anything like this.  “The spread is immense. This is nuts,” says Kujawa.</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2017/05/12/wannacry-ransomware-attack-hits-74-countries-shuts-down-hospitals-services-in-europe/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Trump Tower was just evacuated due to suspicious package</title>
		<link>https://socialmediaseo.net/2016/12/28/trump-tower-was-just-evacuated-due-to-suspicious-package/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=trump-tower-was-just-evacuated-due-to-suspicious-package</link>
					<comments>https://socialmediaseo.net/2016/12/28/trump-tower-was-just-evacuated-due-to-suspicious-package/#respond</comments>
		
		<dc:creator><![CDATA[SMSEO]]></dc:creator>
		<pubDate>Wed, 28 Dec 2016 18:00:46 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[US & World]]></category>
		<category><![CDATA[New York]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=32542</guid>

					<description><![CDATA[The Trump Tower lobby was evacuated on Tuesday afternoon after reports of an unknown package came streaming in.  New York Police Department spokesman J. Peter Donald tweeted that the department’s bomb squad was responding to the report “out of an abundance of caution.” The spokesman soon tweeted an &#8220;all clear.&#8221; Further reports indicate the bag was [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-32543 size-full" src="https://socialmediaseo.net/wp-content/uploads/2016/12/trump-tower-evacuated-suspicious-bag.jpg.jpg" alt="trump tower evacuated" width="736" height="414" title="Trump Tower was just evacuated due to suspicious package 2" srcset="https://socialmediaseo.net/wp-content/uploads/2016/12/trump-tower-evacuated-suspicious-bag.jpg.jpg 736w, https://socialmediaseo.net/wp-content/uploads/2016/12/trump-tower-evacuated-suspicious-bag.jpg-512x288.jpg 512w" sizes="(max-width: 736px) 100vw, 736px" /></p>
<p>The Trump Tower lobby was evacuated on Tuesday afternoon after reports of an unknown package came streaming in.  New York Police Department spokesman J. Peter Donald <a href="https://twitter.com/JPeterDonald/status/813868082322165761" target="_blank" rel="nofollow noopener">tweeted</a> that the department’s bomb squad was responding to the report “out of an abundance of caution.” The spokesman soon tweeted an &#8220;all clear.&#8221;</p>
<p>Further reports indicate the bag was just filled with children&#8217;s toys.</p>
<p>With the President Elect Donald Trump&#8217;s security on the line, it&#8217;s great they acted so quickly.</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2016/12/28/trump-tower-was-just-evacuated-due-to-suspicious-package/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Preparing your Company for a Hard Drive Failure</title>
		<link>https://socialmediaseo.net/2016/12/23/preparing-your-company-for-a-hard-drive-failure/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=preparing-your-company-for-a-hard-drive-failure</link>
					<comments>https://socialmediaseo.net/2016/12/23/preparing-your-company-for-a-hard-drive-failure/#respond</comments>
		
		<dc:creator><![CDATA[SMSEO]]></dc:creator>
		<pubDate>Fri, 23 Dec 2016 17:26:58 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=32535</guid>

					<description><![CDATA[You&#8217;ve worked hard to make your business successful. You&#8217;ve carefully selected from qualified applicants, have the latest programs installed into your operating system and keep an open mind in areas that could use improvement. So what would you do if you went into the office and your computer wouldn&#8217;t turn on or you went to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignright size-medium wp-image-32536" src="https://socialmediaseo.net/wp-content/uploads/2016/12/hard-drive-failure-recovery-300x300.jpg" alt="hard drive parts view" width="300" height="300" title="Preparing your Company for a Hard Drive Failure 4">You&#8217;ve worked hard to make your business successful. You&#8217;ve carefully selected from qualified applicants, have the latest programs installed into your operating system and keep an open mind in areas that could use improvement. So what would you do if you went into the office and your computer wouldn&#8217;t turn on or you went to access an important file and it&#8217;s simply not there? With more information stored on computers and other electronic devices, this is a real possibility. Before waiting to experience this scenario &#8211; because it&#8217;s just a question of when and not if &#8211; it&#8217;s important to have a plan in place with a <a href="https://www.securedatarecovery.com" rel="nofollow noopener" target="_blank">data recovery professional</a> service to reduce your downtime to the bare minimum.</p>
<p><b>Training employees to notice for changes in the operating system</b></p>
<p>The good news is that there&#8217;s still time to address the possibility of a hard drive failure. It&#8217;s important that every employee who uses the computers can identify if a problem is occurring prior to a full shutdown of your system. It&#8217;s a good idea to hold a meeting and make them aware of the warning signs and the steps they need to take if this happens. Many things can contribute to a hard drive failure, the most common being age. Computers are machines and while you may think they will run forever, this simply is not true. In fact, most computers last between 3 to 5 years before needing repair or replacing.</p>
<p><b>Warning signs</b></p>
<p>For the most part, a computer doesn&#8217;t just stop working. It gives several indications ahead of time, that if you are in tune with, you&#8217;ll know something just isn&#8217;t right. It may be slow and sluggish starting up and shutting down, it may freeze up from time to time or you may notice that a file you entered yesterday isn&#8217;t there today. There are sometimes noises that go along with a slow system such as a screeching, grinding or clicking sound. That noise is your hard drive. In the case of malware infections you may also experience an error message or in severe cases the dreaded blue screen.</p>
<p><b>Work leaving the office</b></p>
<p>Technology now gives employees the ability to work on numerous electronic devices from just about anywhere. Wireless devices like smartphones, iPads, tablets, notebook PCs and laptops are now more than not the go to&#8217;s for after hours. This gives employers a way to keep in touch with their key executives and satisfy their clients from around the world. But, it also means that there&#8217;s more at stake. If one of these devices go down before the information is transferred to the in-house operating system you could lose valuable time and maybe even lose your work. There&#8217;s also the possibility of a head crash while transporting. For these very reasons, it&#8217;s important to hire a professional data recovery service so that you regain your files and avoid lengthy downtimes.</p>
<p><b>Small and medium size businesses are not excluded from cyber crimes</b></p>
<p>While you may think you&#8217;re not big enough for hackers to waste their time getting into your operating system, nothing could be further from the truth. In fact, large businesses are less likely to experience these time crimes because they have sophisticated firewalls and security measures in place. For the smaller company just coming into their own, the emphasis is all about bringing in the revenue. But, the reality is that if you don&#8217;t safeguard your system and hire a professional recovery service, you may lose everything. Remember, hackers dedicate 100 percent of their time findings ways to hold companies for ransom.</p>
<p><b>Prosper without blinders on</b></p>
<p>You&#8217;ve done the work. You started a company from the ground up. You have big plans to expand even further through exciting <a href="https://welovewp.com/the-appirio-appxpress-marketplace/" class="broken_link" rel="nofollow noopener" target="_blank">web designs and multimedia sights</a>. As you take your company to the next level, remember what&#8217;s at stake. Update your systems, install sophisticated firewalls and have a company waiting in the wings to assist on a moment&#8217;s notice with any computer issues that may come your way.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2016/12/23/preparing-your-company-for-a-hard-drive-failure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How Planned Parenthood Foes May Threaten TBI Efforts</title>
		<link>https://socialmediaseo.net/2016/02/23/how-planned-parenthood-foes-may-threaten-tbi-efforts/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-planned-parenthood-foes-may-threaten-tbi-efforts</link>
					<comments>https://socialmediaseo.net/2016/02/23/how-planned-parenthood-foes-may-threaten-tbi-efforts/#respond</comments>
		
		<dc:creator><![CDATA[rdholla]]></dc:creator>
		<pubDate>Wed, 24 Feb 2016 04:38:14 +0000</pubDate>
				<category><![CDATA[Health]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[YouTube]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=32429</guid>

					<description><![CDATA[&#160; &#160; A new report published by the Guttmacher Institute states that research using fetal tissue may be endangered by last summer’s smear campaign against Planned Parenthood, according to a recent article by thenation.com. Fetal tissue is often used in traumatic brain injury research, according to an article by Marek Molcanyi, MD PhD, Clinic of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p><iframe width="560" height="315" frameborder="0" src="https://www.youtube.com/embed/zeKpb4FbgW4?rel=0"></iframe></p>
<p>&nbsp;</p>
<p>A new report published by the Guttmacher Institute states that research using fetal tissue may be endangered by last summer’s smear campaign against Planned Parenthood, according to a recent <a href="https://www.thenation.com/article/archive/how-planned-parenthood-foes-are-thwarting-research-into-alzheimers-ebola-and-more/" rel="nofollow noopener" target="_blank">article</a> by thenation.com.</p>
<p>Fetal tissue is often used in traumatic brain injury research, according to an article by Marek Molcanyi, MD PhD, Clinic of Neurosurgery; University of Cologne.</p>
<p>“Stem cell transplantation has been proposed for various indications like Parkinson and Huntington disease, … spinal cord injury … and traumatic brain injury (TBI),” Molcanyi explained in the article.</p>
<p>Scientists like Dr. Lawrence Goldstein at the University of California, San Diego, use fetal tissue for research on the brain and on spinal cord injury. The article on thenation.com says such scientific inquiry is increasingly threatened – often literally.</p>
<p>“We are cautious,” Goldstein says in the <a href="https://www.thenation.com/article/archive/how-planned-parenthood-foes-are-thwarting-research-into-alzheimers-ebola-and-more/" rel="nofollow noopener" target="_blank">article</a>. “We’ve raised physical security in our laboratory building.”<a name="_ftnref1"></a></p>
<p>After an anti-abortion organization released videos portraying Planned Parenthood as callously haggling the price of aborted fetuses, thenation.com reports legislators have attempted to restrict research using such material, while scientists have found their work limited and riskier.</p>
<p>“Beyond the attacks on Planned Parenthood,” the report says, “the use of fetal tissue in research also is under direct attack.”</p>
<p>Fetal tissue has been used for scientific research since the 1930s. The tissue is derived from abortion because tissue from miscarriage is often not suitable for research,” according to the article.</p>
<p>Traumatic brain injury is just one of the many issues scientist might use fetal tissue to conduct further research on.</p>
<p>“Cell cultures from fetal tissue have been used to develop vaccines for measles, polio and tetanus, among other diseases. Scientists at Colorado State have been conducting HIV research using fetal tissue, while at the University of North Carolina Chapel Hill, cell culture derived from fetal tissue has been central to work on Hepatitis B and C,” the <a href="https://www.thenation.com/article/archive/how-planned-parenthood-foes-are-thwarting-research-into-alzheimers-ebola-and-more/" rel="nofollow noopener" target="_blank">article</a> reads. “The National Institutes of Health awarded grants for 164 research projects using fetal tissue in 2014, according to a survey by<em>Nature</em>. Today, fetal tissue is being used in the development of vaccines against Ebola and HIV, the study of human development, and efforts to treat and cure conditions and diseases that afflict millions of Americans.”</p>
<p>Theresa Naluai-Cecchini, a scientist at the University of Washington told <a href="https://www.motherjones.com/" rel="nofollow noopener" target="_blank"><em>Mother Jones</em><em> </em></a>last October that the number of tissue donations had dropped dramatically. She worried that if the trend continued, “promising research would stop until a commercial alternative is found. The cost of research would increase dramatically, and new findings would take considerably longer.”</p>
<p>Some scientists have avoided talking to the media all-together, for fear of attacks.<a name="_ftnref2"></a></p>
<p>Bills introduced on both the state and federal level would make it more difficult to donate tissue or use fetal tissue in research, according to the report. Some would ban fetal tissue research outright.</p>
<p>For more information, read the full article <a href="https://www.thenation.com/article/archive/how-planned-parenthood-foes-are-thwarting-research-into-alzheimers-ebola-and-more/" rel="nofollow noopener" target="_blank">here</a>.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-32392" src="https://socialmediaseo.net/wp-content/uploads/2016/02/brain-injury-attorney-wisconsin.jpg" alt="Brain Injury Attorney Wisconsin" width="728" height="100" title="How Planned Parenthood Foes May Threaten TBI Efforts 6" srcset="https://socialmediaseo.net/wp-content/uploads/2016/02/brain-injury-attorney-wisconsin.jpg 728w, https://socialmediaseo.net/wp-content/uploads/2016/02/brain-injury-attorney-wisconsin-150x21.jpg 150w, https://socialmediaseo.net/wp-content/uploads/2016/02/brain-injury-attorney-wisconsin-300x41.jpg 300w" sizes="(max-width: 728px) 100vw, 728px" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2016/02/23/how-planned-parenthood-foes-may-threaten-tbi-efforts/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Are Online Divorces Possible?</title>
		<link>https://socialmediaseo.net/2015/12/11/are-online-divorces-possible/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=are-online-divorces-possible</link>
					<comments>https://socialmediaseo.net/2015/12/11/are-online-divorces-possible/#respond</comments>
		
		<dc:creator><![CDATA[Jeremy]]></dc:creator>
		<pubDate>Fri, 11 Dec 2015 17:30:12 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=32345</guid>

					<description><![CDATA[Websites that specialize in helping couples obtain a divorce are gaining popularity as a quick, easy, and affordable way to end a marriage. There are sites available that allows spouses to take a complete do-it-yourself approach to their divorce as well as those which lend a helping-hand by filling out the forms required to initiate [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Websites that specialize in helping couples obtain a divorce are gaining popularity as a quick, easy, and affordable way to end a marriage. There are sites available that allows spouses to take a complete do-it-yourself approach to their divorce as well as those which lend a helping-hand by filling out the forms required to initiate divorce proceedings. </span></p>
<p><span style="font-weight: 400;">Thanks to the popularity of e-filing, many states now allow divorces to be filed online. This means, in certain situations, divorces can be initiated, filed, and fees paid for entirely online. But since all divorces are not created equal, only certain circumstances should lead couples to filing for divorce online. </span></p>
<h2><b>Types Divorces and Online Filing </b></h2>
<p><span style="font-weight: 400;">When couples have an uncontested divorce, that is, they agree on issues like property division, child custody, and support payments, filing for divorce can be done with the help of online services. Often, these websites will provide instruction in filling out forms required in your state. Sometimes, they may even have paralegal services available that will review your documents to ensure they are all properly filled out and ready to be submitted. </span></p>
<p><span style="font-weight: 400;">For those couples that are unable to agree on the issues that come up during the divorce process – support, custody, property and debt disbursement – filing online is not the best solution. These couples often need assistance settling their divorce. In the most extreme cases, it may even result in a trial. In these scenarios, a </span><span style="font-weight: 400;">family lawyer should be consulted</span><span style="font-weight: 400;"> to help divorcing couples sort out their differences. </span></p>
<p><span style="font-weight: 400;">Remember, once you agree on a divorce settlement, whether filed online or in-person, it is difficult to make any changes to the terms you originally approved. Even if you choose the do-it-yourself approach, having an experienced family law attorney review your divorce documents before finalizing them is a good idea. They can make sure all parties’ best interests are represented and the settlement is fair and equitable.  </span></p>
<h2><b>How to File for Divorce Online</b></h2>
<p><span style="font-weight: 400;">If you and your spouse have agreed on the major issues involved in your divorce, the next step is to file for divorce. Depending on where you live, there may be several options available to you for filing online. </span></p>
<p><span style="font-weight: 400;">If your state allows e-filing, you can use their forms to initiate your divorce. Often, these are online PDFs that you will have to fill out yourself. If you’re not comfortable completing these forms on your own, you can always choose to pay a fee to a website that specializes in helping people with online legal services. They will guide you through the process of filing and may even review your documents before submitting them. </span></p>
<p><span style="font-weight: 400;">Whichever method you choose, remember to make hardcopy duplicates of your paperwork. Once you have prepared all the paperwork necessary for your uncontested divorce, you can pay the filing fee and proceed to the next steps, which usually include serving your spouse with divorce papers and finalizing a divorce agreement. </span></p>
<h2><b>Attorney Help with Online Divorces</b></h2>
<p><span style="font-weight: 400;">Before finalizing divorce, you may want to seek the services of a family law attorney. While it is convenient and easy to initiate divorce proceedings online, there is no substitute for the expertise of a divorce attorney when reviewing documents that will ultimately be used as part of a divorce decree. Seeking the services of a divorce attorney can be done after you have filled out all your forms and filed for divorce but before your divorce agreement becomes a court order. This gives you the added security of knowing your divorce is fair.</span></p>
<p>There are other options as well that can help with legal proceedings online. It is easy to schedule appointments with experienced criminal defense attorneys just by visiting a website. Legal help doesn&#8217;t always have to be in person.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2015/12/11/are-online-divorces-possible/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ashley Madison Adultery Website Targeted in Hack</title>
		<link>https://socialmediaseo.net/2015/07/20/ashley-madison-adultery-website-targeted-in-hack/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ashley-madison-adultery-website-targeted-in-hack</link>
					<comments>https://socialmediaseo.net/2015/07/20/ashley-madison-adultery-website-targeted-in-hack/#respond</comments>
		
		<dc:creator><![CDATA[SMSEO]]></dc:creator>
		<pubDate>Mon, 20 Jul 2015 19:08:56 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Websites]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[hacked]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=32261</guid>

					<description><![CDATA[According to the KrebsOnSecurity blog, the famous adultery website, AshleyMadison.com, has been hacked. Along with the hack they threatened to leak details including credit cards, sexual fantasies, and nude photos. There are as many as 37 million customers on the website. The dating website AshleyMadison.com&#8217;s Canadian parent, Avid Life Media, confirmed the breach on its [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-32263" src="https://socialmediaseo.net/wp-content/uploads/2015/07/ashley-madison-hacked.png" alt="ashley-madison-hacked" width="511" height="465" title="Ashley Madison Adultery Website Targeted in Hack 8" srcset="https://socialmediaseo.net/wp-content/uploads/2015/07/ashley-madison-hacked.png 511w, https://socialmediaseo.net/wp-content/uploads/2015/07/ashley-madison-hacked-316x288.png 316w" sizes="(max-width: 511px) 100vw, 511px" /></p>
<p>According to the KrebsOnSecurity blog, the famous adultery website, AshleyMadison.com, has been hacked. Along with the hack they threatened to leak details including credit cards, sexual fantasies, and nude photos. There are as many as 37 million customers on the website.</p>
<p><span id="articleText">The dating website AshleyMadison.com&#8217;s Canadian parent, Avid Life Media, confirmed the breach on its systems, and said it had since secured the site and was working with law enforcement agencies to trace those behind the attack.</span></p>
<p>It&#8217;s not too surprising a site like Ashley Madison would be targeted since the websites audience has a lot at stake.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2015/07/20/ashley-madison-adultery-website-targeted-in-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>BitTorrent&#8217;s Bleep Messaging App Offers End to End, P2P, Serverless Encryption for Free</title>
		<link>https://socialmediaseo.net/2015/05/14/bittorrents-bleep-messaging-app-offers-end-to-end-p2p-serverless-encryption-for-free/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=bittorrents-bleep-messaging-app-offers-end-to-end-p2p-serverless-encryption-for-free</link>
					<comments>https://socialmediaseo.net/2015/05/14/bittorrents-bleep-messaging-app-offers-end-to-end-p2p-serverless-encryption-for-free/#respond</comments>
		
		<dc:creator><![CDATA[Fahad Saleem]]></dc:creator>
		<pubDate>Thu, 14 May 2015 15:12:22 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[ios]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=32177</guid>

					<description><![CDATA[BitTorrent has launched a new messaging app which will provide end-to-end, peer-to-peer encryption and security over your messages. The app is called ‘Bleep’ and it is now available for free for iOS, Windows, Android, and Mac. BitTorrent. The best feature which could make this app stand out among the hundreds of messaging apps is its [&#8230;]]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify">BitTorrent has launched a new messaging app which will provide end-to-end, peer-to-peer encryption and security over your messages. The app is called ‘Bleep’ and it is now available for free for iOS, Windows, Android, and Mac. BitTorrent. The best feature which could make this app stand out among the hundreds of messaging apps is its ability to operate without any central server or Cloud. BitTorrent claims that the messages sent or received via Bleep will not be saved on the Cloud or at the servers, so no third party could hack and read your messages.</p>
<p style="text-align: justify">Bleep has a ‘Whisper’ feature which lets you send self-destructible messages. A ‘whisper’ will be deleted as soon as it is read.</p>
<p style="text-align: justify">Bleep supports end to end encryption, which, surprisingly, is not supported by iMessage, WhatsApp or Viber. You can also make secure Voice Calls using Bleep.</p>
<p style="text-align: justify">Download Bleep By BitTorrent</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2015/05/14/bittorrents-bleep-messaging-app-offers-end-to-end-p2p-serverless-encryption-for-free/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>RadioShack Facing Tough Legal Battle Regarding User Data Auction</title>
		<link>https://socialmediaseo.net/2015/04/15/radioshack-facing-tough-legal-battle-regarding-user-data-auction/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=radioshack-facing-tough-legal-battle-regarding-user-data-auction</link>
					<comments>https://socialmediaseo.net/2015/04/15/radioshack-facing-tough-legal-battle-regarding-user-data-auction/#respond</comments>
		
		<dc:creator><![CDATA[Fahad Saleem]]></dc:creator>
		<pubDate>Wed, 15 Apr 2015 14:55:58 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[New York]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=32096</guid>

					<description><![CDATA[RadioShack is facing a tough legal battle regarding its plans to sell its consumer information to pay its creditors after bankruptcy. RadioShack, the famous electronics retailer which filed for Chapter 11 bankruptcy back in February is still persisting that it will sell the user data as it is a major asset of the company. State [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>RadioShack is facing a tough legal battle regarding its plans to sell its consumer information to pay its creditors after bankruptcy. RadioShack, the famous electronics retailer which filed for Chapter 11 bankruptcy back in February is still persisting that it will sell the user data as it is a major asset of the company. State of Texas is vehemently opposing the auction of personally identifiable information (PII) of around 100 million RadioShack customers. The state has ordered U.S. Bankruptcy Court for the District of Delaware to find out the details regarding the customer information which RadioShack intends to sell. But RadioShack is unmoved despite of the stir that rattled the media after its decision to sell user data, which clearly puts private information of millions of its customers out in the public.</p>
<p>RadioShack has asked the bankruptcy court for the approval of second round of its auction, which will include the auction of consumer data.</p>
<p>In the first round of auction, RadioShack sold 1,700 of its stores to the famous hedge fund Standard General, which is one of the creditors of RadioShack.</p>
<p>Texas Attorney General Ken Paxton filed a petition in the court on 1<sup>st</sup> April, arguing that RadioShack’s decision to sell user data clearly contradicts the promises it made with its consumers.</p>
<p>“We urge RadioShack to make a blanket vow that it will live up to the assurances it provided 117 million customers and entirely rule out any such sale in the future,” said Paxton.</p>
<p>RadioShack’s privacy policy written on its official websites clearly states that the company will not use the personal information of its customers for any purpose other than the business and services in which the company deals.</p>
<p>“Information about you specifically will not be used for any purpose other than to carry out the services you requested from RadioShack and its affiliates. All of our affiliates have agreed to maintain the security and confidentiality of the information we provide to them,” claims RadioShack in its online privacy policy statement.</p>
<p>&nbsp;</p>
<p>Last Month, the bankruptcy court ordered the appointment of a consumer privacy ombudsman to look further into the details of a possible sale of PII by RadioShack. RadioShack vowed to assist and work with the ombudsman.</p>
<p>It is also important to note that RadioShack hasn’t declared officially about its plans to sell its user data, but the company silently listed the customer information as its asset during auction. This is also stated on the Hilco Streambank’s website, the intermediary for RadioShack.</p>
<p>RadioShack’s plans to sell user data and get money to pay its creditors are hard to be achieved, keeping in view the massive user data privacy awareness and campaigns in the modern tech industry. Texas is not the only state giving tough time to RadioShack. Last month, New York’s state Attorney General Eric Schneiderman announced that his office will take necessary action if RadioShack attempts to sell the private data of millions of users.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2015/04/15/radioshack-facing-tough-legal-battle-regarding-user-data-auction/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Slack Confirms Its Servers Are Hacked</title>
		<link>https://socialmediaseo.net/2015/03/27/slack-confirms-its-servers-are-hacked/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=slack-confirms-its-servers-are-hacked</link>
					<comments>https://socialmediaseo.net/2015/03/27/slack-confirms-its-servers-are-hacked/#respond</comments>
		
		<dc:creator><![CDATA[Fahad Saleem]]></dc:creator>
		<pubDate>Fri, 27 Mar 2015 18:00:09 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[ios]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=32044</guid>

					<description><![CDATA[Slack, the most famous communication app that is raising millions in venture funding has announced that its database servers have been hacked. The company’s statement confirmed that hackers were able to beach in the app’s servers. However, the statement didn’t confirm that the encrypted passwords were compromised or not. “We were recently able to confirm [&#8230;]]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify">Slack, the most famous communication app that is raising millions in venture funding has announced that its database servers have been hacked. The company’s statement confirmed that hackers were able to beach in the app’s servers. However, the statement didn’t confirm that the encrypted passwords were compromised or not.</p>
<blockquote><p>“We were recently able to confirm that there was unauthorized access to a Slack database storing user profile information. We have since blocked this unauthorized access and made additional changes to our technical infrastructure to prevent future incidents,” said the Slack’s statement.</p></blockquote>
<p style="text-align: justify">Slack has been hailed as the best communication app for iOS and Android which could be used by companies, co-working environments and anyone for productivity.</p>
<p style="text-align: justify">Unfortunately, several sources have confirmed that Slack security systems are not that state of the art. It still uses the central server where all the information about users like passwords, usernames, Skype, phone numbers, are saved. The passwords are encrypted with one way authentication. It is also being said that Slack server saves all the chats and no encryption is used for chats whatsoever. Slack is yet to shed light on the cause of this attack and what information was leaked.</p>
<p style="text-align: justify">Slack has added two-factor authentication after the attack, but the users will have to open their profile first, toggle the two factor authentication on and then use it with their phone number.</p>
<p style="text-align: justify">
<p style="text-align: justify">
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2015/03/27/slack-confirms-its-servers-are-hacked/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apple Pay Fraud Cases Becoming Common: Report</title>
		<link>https://socialmediaseo.net/2015/03/18/apple-pay-fraud-cases-becoming-common-report/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=apple-pay-fraud-cases-becoming-common-report</link>
					<comments>https://socialmediaseo.net/2015/03/18/apple-pay-fraud-cases-becoming-common-report/#respond</comments>
		
		<dc:creator><![CDATA[Fahad Saleem]]></dc:creator>
		<pubDate>Wed, 18 Mar 2015 16:29:52 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[New York]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=32018</guid>

					<description><![CDATA[When Apple announced its payment system “Apple Pay”, almost all the major banks in the US said that it is a positive step. JPMorgan Chase, WellsFargo, Citigroup, Bank of American and American Express even lined up in order to give support for Apple Pay NFC backed payment method. But now, the media is reporting a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify">When Apple announced its payment system “Apple Pay”, almost all the major banks in the US said that it is a positive step. JPMorgan Chase, WellsFargo, Citigroup, Bank of American and American Express even lined up in order to give support for Apple Pay NFC backed payment method. But now, the media is reporting a number of fraud cases reported by banks. Banks are now skeptical about Apple Pay’s security. Security is the single most important factor in the modern day payments. ART hacks and credit card information breaches are becoming common and even a single fraud case can tarnish Apple Pay’s user trust.</p>
<p style="text-align: justify">An <a href="https://www.nytimes.com/2015/03/17/business/banks-find-fraud-abounds-in-apple-pay.html?ref=fb" target="_blank" rel="nofollow noopener">article</a> on the New York Times reported that it is true that fraud cases are being reported in the media, but banks are to be asked about this and not the Apple Pay.</p>
<p style="text-align: justify">The source quoted Cherian Abraham, a payment industry experts, who says that Apple Pay fraud is ‘growing like a weed’. Apple Pay hasn’t even started rolling out all over the country and users are just gearing up to sign-up for the new payment system. Fraud report at this time can kill Apple Payment system before it even gets mainstream.</p>
<p style="text-align: justify">The source said that Apple has made it practically impossible to breach credit card information via Apple Pay. When an Apple Pay transaction takes place, the vendor sees a new, at-the-sport-generated credit card number and the actual customer data never gets revealed. This means that the fault is at the Banks’ end. Banks, in a hurry to get signed-up for customers’ default credit card bank for Apple Pay service, failed to issue credit cards with improved security and layers. This problem is making it difficult for them to differentiate between intruders and real Apple Pay users.</p>
<p style="text-align: justify">
<p style="text-align: justify">
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2015/03/18/apple-pay-fraud-cases-becoming-common-report/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>You Can Now Send Money to Friends Using Facebook Messenger App</title>
		<link>https://socialmediaseo.net/2015/03/17/you-can-now-send-money-to-friends-using-facebook-messenger-app/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=you-can-now-send-money-to-friends-using-facebook-messenger-app</link>
					<comments>https://socialmediaseo.net/2015/03/17/you-can-now-send-money-to-friends-using-facebook-messenger-app/#respond</comments>
		
		<dc:creator><![CDATA[Fahad Saleem]]></dc:creator>
		<pubDate>Tue, 17 Mar 2015 20:24:12 +0000</pubDate>
				<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Google]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=32015</guid>

					<description><![CDATA[Facebook has launched a payment service which will let you pay your friends via Facebook Messenger. The service will be absolutely free. You will be able to connect your VISA or Mastercard debit card with your Facebook account and press “$’ sign which will appear in the Facebook Messenger app. Once you press this button, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify">Facebook has launched a payment service which will let you pay your friends via Facebook Messenger. The service will be absolutely free. You will be able to connect your VISA or Mastercard debit card with your Facebook account and press “$’ sign which will appear in the Facebook Messenger app. Once you press this button, you can enter the amount and press send in the chat with your friend to who you want to send money. That’s it. The money will be wired.</p>
<p style="text-align: justify">Facebook has launched this service in an effort to tackle payments behemoth PayPal. Twitter also launched a payment service in partnership with Barclay&#8217;s Bank. Facebook wants to make sure that it leaves no domain untapped in the contemporary tech world.</p>
<p style="text-align: justify">Facebook already processes over 1 million payments daily for its ads and games business. These payments are done via PayPal. SnapChat also signed a deal with Square Cash payment service for its SnapCash payment service. Google Wallet, Venmo are some other competitors Facebook want to compete.</p>
<p style="text-align: justify">Giving a payments feature in Facebook Messenger app is a smart move by Facebook. People mostly don’t want to open new apps and service for a single task. Just pressing the $ sign and sending money to a friend will be preferred by Facebook users. Security and authentication will be a key factor in the success of Facebook payments service.</p>
<p style="text-align: justify">Facebook’s plans for its payment service were leaked in some hacked images a few months back. The service is now officially announced.</p>
<p style="text-align: justify">Facebook payment feature will be rolled out in the US in the coming months. PayPal also issued a statement and said that it has strong working relationships with Facebook and both companies will keep working on joint endeavors in the future as well.</p>
<p style="text-align: justify">
<p style="text-align: justify">
<p style="text-align: justify">
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2015/03/17/you-can-now-send-money-to-friends-using-facebook-messenger-app/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Yahoo Launches Password-Free Email Login and Encrypted Email Features</title>
		<link>https://socialmediaseo.net/2015/03/16/yahoo-launches-password-free-email-login-and-encrypted-email-features/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=yahoo-launches-password-free-email-login-and-encrypted-email-features</link>
					<comments>https://socialmediaseo.net/2015/03/16/yahoo-launches-password-free-email-login-and-encrypted-email-features/#respond</comments>
		
		<dc:creator><![CDATA[Fahad Saleem]]></dc:creator>
		<pubDate>Mon, 16 Mar 2015 18:42:15 +0000</pubDate>
				<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=32009</guid>

					<description><![CDATA[Yahoo has announced a new security feature which could be easily labelled as a revolutionary step towards password free yet highly secure technological era. The tech giant said that it is going to let its users login Yahoo’s email service without any password. Instead, users could use an on-demand service which will be using a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify">Yahoo has announced a new security feature which could be easily labelled as a revolutionary step towards password free yet highly secure technological era. The tech giant said that it is going to let its users login Yahoo’s email service without any password. Instead, users could use an on-demand service which will be using a smartphone as the primary device. So whenever a user wants to login his/her Yahoo account, the password will be sent to the user-owned smartphone. This will not be a onetime password rather it will be randomly and securely generated for every user separately on every request.</p>
<p style="text-align: justify">This is a daring step by Yahoo. Facebook, Twitter and Google have been trying since long to devise a mechanism to get rid of passwords. Passwords are fairly hackable because of their weak nature. A majority of users don’t spend time making their password. A user prefers a same password for all servers or user a chunk of a word in different password. This compromises the security and we have seen hundreds of hacking attempts in the recent past that went successful.</p>
<p style="text-align: justify">But Yahoo’s latest on-demand password free service has one potential flaw which could collapse your digital identity. All your security depends upon your smartphone. If an intruder succeeds in getting hands on your smartphone, your Yahoo account could be easily breached.</p>
<p style="text-align: justify">In a statement, Yahoo said that its on-demand password service is the first step towards enhancing mobile security.</p>
<p style="text-align: justify">Yahoo’s new service will show you the password in the SMS form even if the phone is locked. This could create massive problems if the phone is placed on a public location. Yahoo could devise a two factor authentication, temporary password or secret questions mechanism to beef up its new system’s strength.</p>
<p style="text-align: justify">Yahoo said that it is also working on end-to-end encryption algorithm for its email service which will be launched soon.</p>
<p style="text-align: justify">
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2015/03/16/yahoo-launches-password-free-email-login-and-encrypted-email-features/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Google bans sexually explicit content from Blogger, cracks down on malicious software downloads</title>
		<link>https://socialmediaseo.net/2015/02/24/google-bans-sexually-explicit-content-from-blogger-cracks-down-on-malicious-software-downloads/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=google-bans-sexually-explicit-content-from-blogger-cracks-down-on-malicious-software-downloads</link>
					<comments>https://socialmediaseo.net/2015/02/24/google-bans-sexually-explicit-content-from-blogger-cracks-down-on-malicious-software-downloads/#respond</comments>
		
		<dc:creator><![CDATA[Fahad Saleem]]></dc:creator>
		<pubDate>Tue, 24 Feb 2015 17:59:28 +0000</pubDate>
				<category><![CDATA[Health]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Google]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=31969</guid>

					<description><![CDATA[Google has announced that it will no longer allow sexually explicit, pornographic content on the blogging platform ‘Blogger’. Google will start making sexually explicit material already hosted on Blogger private from March, 23. Google announced this news in a public blog post and said that Google has always tried to make web free of sexually [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Google has announced that it will no longer allow sexually explicit, pornographic content on the blogging platform ‘Blogger’. Google will start making sexually explicit material already hosted on Blogger private from March, 23.</p>
<p>Google announced this news in a public blog post and said that Google has always tried to make web free of sexually explicit, violent and unethical content. However, Google has given a space for a limited kind of sexual content. Websites which post adult content for educational purposes, medical and health reasons will be allowed. Also, in another development, Google has started rolling out warnings about any suspicious web content, adware, potential threat.</p>
<p>Google also banned adult ads from the Blogger platform two years ago. All those who are running and monetizing Blogger platform based on adult content have no choice but to either delete the content or move off the platform. Google’s program ‘Google Takeout’ allows you to export all the Blogger data, content, images and other information to another open source platform. But replacement of ads, money and revenue will certainly not be possible.</p>
<p>Today, Google also gave a revamp to its Unwanted Software Policy after which, any software which does not adhere to commonly secure and proper SOP will not be allowed a download on Chrome. Google will show a warning that the software may harm your computer and the download will not be resumed.</p>
<p>This policies by Google are implemented after news of <a href="https://socialmediaseo.net/2015/02/20/microsoft-updates-destructs-superfish-adware-lenovo-apologizes-its-users/" target="_blank">Super Fish malware</a> and other leaks and report by Security companies that hackers are attacking websites, bank accounts and other user data across the web.</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2015/02/24/google-bans-sexually-explicit-content-from-blogger-cracks-down-on-malicious-software-downloads/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft Update Destructs Superfish Adware, Lenovo Apologizes its Users</title>
		<link>https://socialmediaseo.net/2015/02/20/microsoft-updates-destructs-superfish-adware-lenovo-apologizes-its-users/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=microsoft-updates-destructs-superfish-adware-lenovo-apologizes-its-users</link>
					<comments>https://socialmediaseo.net/2015/02/20/microsoft-updates-destructs-superfish-adware-lenovo-apologizes-its-users/#respond</comments>
		
		<dc:creator><![CDATA[Fahad Saleem]]></dc:creator>
		<pubDate>Fri, 20 Feb 2015 19:11:41 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=31956</guid>

					<description><![CDATA[Lenovo, the famous PC maker has apologized its users after report of Superfish malware humiliated it across the media. Lenovo is yet to explain how this blunder became possible. On the other hand, Microsoft reacted quickly and gave an update in Windows defender, which completely grilled Superfish. A lot of Lenovo users have thanked Microsoft [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Lenovo, the famous PC maker has apologized its users after report of Superfish malware humiliated it across the media. Lenovo is yet to explain how this blunder became possible. On the other hand, Microsoft reacted quickly and gave an update in Windows defender, which completely grilled Superfish. A lot of Lenovo users have thanked Microsoft on this quick step.</p>
<p>Superfish helps users find and discover products visually, it instantly analyze the images on the website and offer the similar products in lower prices. Lenovo claims that it was unaware of this software which can grant hackers to have access to a user’s secure browser data, allowing third parties to potentially collect passwords, bank details and other sensitive information. Even the CTO of the Lenovo company, Peter Hortensius, said in an interview that they have made a mistake.</p>
<p>This software was included in some models of laptops which were sold worldwide between September and December. After receiving complaints from the users it they discontinued to pre-install it on to the laptops. This software is developed by the company named Superfish (same name as of its software) with base in Tel Aviv and Palo Alto and was also recently ranked 4<sup>th</sup> on a list of fastest growing companies in US.</p>
<p>This software actually installs its own self-signed certificate which is a malicious technique known as man-in-middle attack, where the certificate allows the software to decrypt secure requests. The biggest threat in the security point of view is that hackers could use Superfish encryption methods and mistreat them to intercept other people’s traffic. For example, if someone is sitting in a coffee shop and is using public Wi-Fi then the owner could easily spy on any Lenovo user on network, collecting any password entered during the session.</p>
<p>Meanwhile, Lenovo is not pre-installing the software in the Lenovo machines. As some machines still have this software so they have asked the users to post on their forum in case of any concerns and they have also released full instructions on how to fully remove Superfish from their machines. A developer has also made a website which helps Lenovo users to know that if they are affected by security certificate and helps them on how to resolve those issues.</p>
<p>Check if you are affected by this malware by clicking this <a href="https://filippo.io/Badfish/" rel="nofollow noopener" target="_blank">link</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2015/02/20/microsoft-updates-destructs-superfish-adware-lenovo-apologizes-its-users/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Lethal malware infecting external hard drives of Samsung, Toshiba, Seagate for 20 Years</title>
		<link>https://socialmediaseo.net/2015/02/17/lethal-malware-infecting-external-hard-drives-of-samsung-toshiba-seagate-for-20-years/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=lethal-malware-infecting-external-hard-drives-of-samsung-toshiba-seagate-for-20-years</link>
					<comments>https://socialmediaseo.net/2015/02/17/lethal-malware-infecting-external-hard-drives-of-samsung-toshiba-seagate-for-20-years/#respond</comments>
		
		<dc:creator><![CDATA[Fahad Saleem]]></dc:creator>
		<pubDate>Tue, 17 Feb 2015 22:12:54 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[china]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[samsung]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=31942</guid>

					<description><![CDATA[Kaspersky, the famous security company has claimed that a group called ‘Equation’ has been infecting external hard drives with a firmware resident malware for no less than 20 years. This malware is so lethal that it can never be detected nor destroyed. Perhaps the only way to get rid of this malware is to physically [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Kaspersky, the famous security company has claimed that a group called ‘Equation’ has been infecting external hard drives with a firmware resident malware for no less than 20 years. This malware is so lethal that it can never be detected nor destroyed. Perhaps the only way to get rid of this malware is to physically destroy the device. Kaspersky detailed this interesting reveal in a blog post and said that it has identified that ‘Equation’ group&#8212; which used ‘similar’ techniques as used by US intelligence agencies&#8212; is infecting hard drives of almost all famous companies with a lethal malware.</p>
<p>The external hard drives which could be effected are from famous companies like Seagate, Western Digital, Samsung.</p>
<p>Kaspersky lab blog post said that this sophisticated attack targeted countries like Russia, China, Afghanistan, India and Pakistan. The report also claimed that the encryption techniques used by the Equation group had a striking similarity with NSA techniques that were leaked in some documents in 2013.</p>
<p>The lethal firmware malware works in two-pronged fashion. As soon as it gets on the hard drive, it creates sectors and partitions in it which can only be accessed by secret API (application programming interface). Once the malware gets hold, any kind of formatting, partitioning, antivirus scans cannot remove it.</p>
<p>The source said that such kind of sophisticated malware is there in the books but this is the first time it has been practically seen with all its meticulous implementation.</p>
<p>Kaspersky says that most hard drive vendors use ATA commands that are publicly available. These commands and firmware architecture was exploited by the Equation group. The malware is named as ‘Equationdrug’ and ‘GrayFish’.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2015/02/17/lethal-malware-infecting-external-hard-drives-of-samsung-toshiba-seagate-for-20-years/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>China Cracks Down Against Fake and Anonymous Social Media Users</title>
		<link>https://socialmediaseo.net/2015/02/04/china-cracks-down-against-fake-and-anonymous-social-media-users/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=china-cracks-down-against-fake-and-anonymous-social-media-users</link>
					<comments>https://socialmediaseo.net/2015/02/04/china-cracks-down-against-fake-and-anonymous-social-media-users/#respond</comments>
		
		<dc:creator><![CDATA[Fahad Saleem]]></dc:creator>
		<pubDate>Wed, 04 Feb 2015 18:32:54 +0000</pubDate>
				<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[china]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=31896</guid>

					<description><![CDATA[The Chinese government has decide to wipe-off anonymous and fake social media accounts to revamp its security in the country. According to reports, China has ordered its citizens that users of local and international social media services will have to give their real names and identification data in order to be eligible to use the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The Chinese government has decide to wipe-off anonymous and fake social media accounts to revamp its security in the country.</p>
<p>According to reports, China has ordered its citizens that users of local and international social media services will have to give their real names and identification data in order to be eligible to use the service. The regulatory authorities have said that in the past, many security breaches were surfaced because of fake social media accounts, in which the culprits were impersonating governmental, law enforcing figures to deceive the public.</p>
<p>A statement issued online by the Chinese authorities said that users will have to make their accounts with real name. However, they can use screen names of their choice, provided that they don’t contain any illicit and unreasonable names. Similarly, profile pictures will also be under check from the Chinese regulatory authorities for the social media.</p>
<p>China has always been a staunch and vehement opponent of social media freedom, blogging and US based social media services. A few months ago, Facebook’s Mark Zuckerberg went to China and conducted a public meeting where he delivered a talk in Chinese language, an apparent effort to soften up the Chinese authorities for smooth operations of Facebook inside the country. But that effort seems to not have worked.</p>
<p>Sources think that latest move from the Chinese government is a threat to freedom of speech for local platforms. QQ, Weibo’ Tieba are some of the pronounced social media outlets in China. The internet users in China grew by 649 million in 2014, and the government is worried about increasing freedom of speech enjoyed by users on blogs, comments and social media platforms.</p>
<p>The registration process for social media users for giving their real names will start from 1<sup>st</sup> March 2015. All those users who don’t comply to this rule will be banned from using social media in China.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2015/02/04/china-cracks-down-against-fake-and-anonymous-social-media-users/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Millions of Android Devices Infected With Lethal Malware, Claims Avast</title>
		<link>https://socialmediaseo.net/2015/02/04/millions-of-android-devices-infected-with-lethal-malware-claims-avast/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=millions-of-android-devices-infected-with-lethal-malware-claims-avast</link>
					<comments>https://socialmediaseo.net/2015/02/04/millions-of-android-devices-infected-with-lethal-malware-claims-avast/#comments</comments>
		
		<dc:creator><![CDATA[Fahad Saleem]]></dc:creator>
		<pubDate>Wed, 04 Feb 2015 17:43:51 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Google]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=31893</guid>

					<description><![CDATA[Another bad news has surfaced for Android users. Famous anti-virus company Avast has published a statement according to which, millions of Android phones around the world may be infected with dormant or active malware. This malware, according to Avast experts, hides in apps and may remain inactive for months before showing its real face. The [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Another bad news has surfaced for Android users. Famous anti-virus company Avast has <a href="https://blog.avast.com/2015/02/03/apps-on-google-play-pose-as-games-and-infect-millions-of-users-with-adware/" target="_blank" rel="nofollow noopener">published</a> a statement according to which, millions of Android phones around the world may be infected with dormant or active malware. This malware, according to Avast experts, hides in apps and may remain inactive for months before showing its real face.</p>
<p>The alert by Avast was issued in the form of a blog post by Fillip Chytry, who is a security expert at the company. He said that a few days ago, a complaint was lodged by an Android use which was not taken seriously. But upon taking a closer look, Chytry discovered that adware malware is hiding itself in apparently legitimate apps which are downloaded by millions of users around the world.</p>
<p>Some of these malware infected apps are Durak ( a famous card game downloaded more than 5 million times from the Google Play Store), IQ test and a history app.</p>
<p>According to the source, the mechanism through which this lethal malware works is pretty smart and deceives the users easily. The malware effected app works normally for more than 30 days. After a specific period of time, whenever the users unlocks the device, a pop-up ad will appear, warning the user about potential vulnerabilities in the device’s security. The worried user clicks the ad and that is when the damage begins. The malware gets active and retrieves the user data from contacts, messages and other sources.</p>
<p>The most bothering factor is that this adware might have effected numerous famous apps which users install and use daily. The source added that many apps are using adware for promotions, which is burgeoning the spread of this malware rapidly.</p>
<p>Google is yet to comment on this flabbergasting claim by Avast.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2015/02/04/millions-of-android-devices-infected-with-lethal-malware-claims-avast/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>You&#8217;ll never guess what Facebook is changing next! This is crazy&#8230;</title>
		<link>https://socialmediaseo.net/2014/08/25/how-facebook-intends-to-minimize-clickbait-in-your-news-feed/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-facebook-intends-to-minimize-clickbait-in-your-news-feed</link>
					<comments>https://socialmediaseo.net/2014/08/25/how-facebook-intends-to-minimize-clickbait-in-your-news-feed/#respond</comments>
		
		<dc:creator><![CDATA[SMSEO]]></dc:creator>
		<pubDate>Mon, 25 Aug 2014 21:50:46 +0000</pubDate>
				<category><![CDATA[Facebook]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Websites]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=31803</guid>

					<description><![CDATA[Click-baiting is the expression that is used to describe the tactics that some publishers use which consists of posting a link with an enticing headline that encourages people to click on the link to see more. The problem with click baiting is that it essentially tricks the user into clicking the link without giving them [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright size-full wp-image-31804" src="https://socialmediaseo.net/wp-content/uploads/2014/08/facebook-clickbait-fix.jpg" alt="facebook click bait" width="380" height="380" title="You&#039;ll never guess what Facebook is changing next! This is crazy... 10" srcset="https://socialmediaseo.net/wp-content/uploads/2014/08/facebook-clickbait-fix.jpg 380w, https://socialmediaseo.net/wp-content/uploads/2014/08/facebook-clickbait-fix-288x288.jpg 288w" sizes="(max-width: 380px) 100vw, 380px" />Click-baiting is the expression that is used to describe the tactics that some publishers use which consists of posting a link with an enticing headline that encourages people to click on the link to see more. The problem with click baiting is that it essentially tricks the user into clicking the link without giving them any real information about the story behind the headline, which in some circumstances is misleading. Earlier this week, Facebook announced that they are well aware that based on the fact that posts like these, tend to receive a lot of clicks and tend to rank higher in the news feed, they ultimately drown out content that&#8217;s being posted by friends and pages that the users legitimately care about. As a result of this they are making a variety of tweaks to its news feed&#8217;s algorithm in an attempt of Facebook minimizing clickbait in your news feed.</p>
<p>One of the changes that Facebook announced is that from now on, they will be tracking the time that users spend off-site before returning to Facebook, whenever they click a link within their news feed. Essentially, if it determines that a user clicked a link within a post and quickly goes back to Facebook, the post will be seen as lacking in value and thus rank lower in the news feed. Alternatively, if Facebook determines that a post with a clickable link is receiving an abundance of engagement such as shares and likes, they will be viewed as a high quality post and rank higher in the news feed. By doing this, they proclaimed, that they will be able to filter out content that doesn&#8217;t provide real value to its users.</p>
<p>They also mentioned, that they have no intention of penalizing all posts that have clickable headlines. They intend on eradicating posts that fail to deliver on their headline&#8217;s promise or posts in general that aim to trick users into clicking on a link that isn&#8217;t relevant to the headline that is being portrayed.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2014/08/25/how-facebook-intends-to-minimize-clickbait-in-your-news-feed/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Sony Online Entertainment Network Hacked And Flight Re-routed</title>
		<link>https://socialmediaseo.net/2014/08/25/sony-online-entertainment-network-hacked-and-flight-re-routed/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=sony-online-entertainment-network-hacked-and-flight-re-routed</link>
					<comments>https://socialmediaseo.net/2014/08/25/sony-online-entertainment-network-hacked-and-flight-re-routed/#respond</comments>
		
		<dc:creator><![CDATA[SMSEO]]></dc:creator>
		<pubDate>Mon, 25 Aug 2014 21:46:41 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[US & World]]></category>
		<category><![CDATA[sony]]></category>
		<category><![CDATA[tv]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=31801</guid>

					<description><![CDATA[A flight from Dallas to San Diego was re-routed to Phoenix instead following a bomb threat via Twitter. This happened on an odd day when the Sony Online Entertainment’s president, John Smedley, had his flight diverted to Phoenix in addition to Sony’s PlayStation Network being shut down by hackers. These two events happen to be [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>A flight from Dallas to San Diego was re-routed to Phoenix instead following a bomb threat via Twitter. This happened on an odd day when the Sony Online Entertainment’s president, John Smedley, had his flight diverted to Phoenix in addition to Sony’s PlayStation Network being shut down by hackers. These two events happen to be a coincidence and are speculated to be related in some way.John Smedley had previously announced that he was to travel to San Diego, which could have prompted the hackers to look into his flight number to enable them tweet the threat. A Twitter account, under the name Lizard Squad, took up the responsibility for the day’s bizarre events including the PlayStation Network denial-of-service attack tweeting that the network had turned offline. Earlier, Lizard Squad had declared of attempts to slam Sony Entertainment back to the ground. Later, Lizard Squad tweeted of the possibility of explosives being present on the flight 362 of American Airlines, which the Sony Online Entertainment president was on board. Other personalities who were present in that flight include TV personalities, Sam the Cooking Guy and Troy Johnson. Another Twitter user, FameGod, claimed that Lizard Squad was not responsible for that attack and that it was his work. The diverted flight inconvenienced 6 crew members and 179 passengers who played out on Twitter throughout the journey. This prompted immediate investigations by the federal authorities. Several media sources such as CBS News and Game Informer reported that the FBI was apparently investigating into the incident. The plane parked at a remote part of the Phoenix airport, where passengers moved out of the plane, and their bags searched for any explosives. The plane however, resumed its flight to San Diego later. The PlayStation Network, however, reassured their clients that there was no compromise of any personal information. Smedley spoke out about the attack and assured the public that the anonymous hackers would be found and arrested. American Airlines, on the other hand, declined to make comments on the bomb threat. This series of events quickly came to the attention of people all over the globe. This was not the first occurrence of a Sony hacked case. Hackers compromised 77 million user accounts and disrupted the company’s network. Sony took action on the event and upgraded their security system as a result. It was also not the first occurrence of someone tweeting threats to airlines.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2014/08/25/sony-online-entertainment-network-hacked-and-flight-re-routed/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Gmail &#8220;Easily&#8221; Hacked According to Tests</title>
		<link>https://socialmediaseo.net/2014/08/22/gmail-easily-hacked-according-to-tests/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gmail-easily-hacked-according-to-tests</link>
					<comments>https://socialmediaseo.net/2014/08/22/gmail-easily-hacked-according-to-tests/#respond</comments>
		
		<dc:creator><![CDATA[SMSEO]]></dc:creator>
		<pubDate>Fri, 22 Aug 2014 21:40:39 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[Mobile Phones]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tablets]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[ios]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=31785</guid>

					<description><![CDATA[As complicated and secure as you thought Gmail was, it was eventually hacked. Amazingly enough it was hacked with a 92 percent success rate by researchers from the U.S. The researchers who comprised mostly of computer scientists and technicians were able to gain access to various applications developed including Gmail. They did this by developing [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright size-full wp-image-31786" src="https://socialmediaseo.net/wp-content/uploads/2014/08/gmail-app-easy-to-hack.png" alt="gmail-app-easy-to-hack" width="300" height="300" title="Gmail &quot;Easily&quot; Hacked According to Tests 12" srcset="https://socialmediaseo.net/wp-content/uploads/2014/08/gmail-app-easy-to-hack.png 300w, https://socialmediaseo.net/wp-content/uploads/2014/08/gmail-app-easy-to-hack-288x288.png 288w" sizes="(max-width: 300px) 100vw, 300px" />As complicated and secure as you thought Gmail was, it was eventually hacked. Amazingly enough it was hacked with a 92 percent success rate by researchers from the U.S. The researchers who comprised mostly of computer scientists and technicians were able to gain access to various applications developed including Gmail. They did this by developing a disguising deadly application that can be downloaded just like an ordinary application. Gmail was so vulnerable to this hacking as it is the easiest application to access from the list of the many applications in test. The application was hacked on an android phone though the researchers insist that it can still be hacked on other operating systems. This is basically because all operating systems share a key feature that is considered a weakness. The researchers, including an Assistant Professor from the University of California say that this weakness is believed to be in all operating systems including windows and iOS. It is this weakness that they use to obtain personal information from the many unsuspecting clients of the said operating systems. They also argue that there is always a security risk associated with the many apps being created by developers that make them vulnerable to hackers. The different apps acquired by users for their smart phones all run on some shared infrastructure. It was previously assumed that one app cannot interfere with the functioning of another app but this has been proven to be false. This is according to Zhiyun Qian, a scientist at UC Riverside. Once users install these malicious apps developed by the hackers, they give the hackers a chance to exploit the user’s data. It is from this that they are able to hack this account.</p>
<p>This research is to be presented later in San Diego by academicians from Michigan and California University at a Cybersecurity Conference.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2014/08/22/gmail-easily-hacked-according-to-tests/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What You Need To Know About Pressing The &#8216;Like&#8217; Button</title>
		<link>https://socialmediaseo.net/2014/05/14/what-you-need-to-know-about-pressing-the-like-button/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-you-need-to-know-about-pressing-the-like-button</link>
					<comments>https://socialmediaseo.net/2014/05/14/what-you-need-to-know-about-pressing-the-like-button/#respond</comments>
		
		<dc:creator><![CDATA[SMSEO]]></dc:creator>
		<pubDate>Wed, 14 May 2014 15:20:42 +0000</pubDate>
				<category><![CDATA[Facebook]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[viral]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=31706</guid>

					<description><![CDATA[Scammers will go to great lengths to steal your information, make money or deceitfully advertise. They&#8217;ll send phishing emails to steal passwords or unleash viruses on computers to hijack Web browsers. Scamming victims on the Internet doesn&#8217;t even have to be that arduous, especially since scammers can rely on your emotions and good intentions to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="wp-image-31707 size-full alignnone" src="https://socialmediaseo.net/wp-content/uploads/2014/05/Depositphotos_9168654_xs.jpg" alt="She Likes it!" width="500" height="430" title="What You Need To Know About Pressing The &#039;Like&#039; Button 14" srcset="https://socialmediaseo.net/wp-content/uploads/2014/05/Depositphotos_9168654_xs.jpg 500w, https://socialmediaseo.net/wp-content/uploads/2014/05/Depositphotos_9168654_xs-335x288.jpg 335w" sizes="(max-width: 500px) 100vw, 500px" /></p>
<p>Scammers will go to great lengths to steal your information, make money or deceitfully advertise. They&#8217;ll send phishing emails to steal passwords or unleash viruses on computers to hijack Web browsers. Scamming victims on the Internet doesn&#8217;t even have to be that arduous, especially since scammers can rely on your emotions and good intentions to deceive you.</p>
<p>In early 2014, CNN reported on a story about a photo of a smiling 7-year-old girl without hair posing in her cheerleading uniform. The photo was posted to Facebook and asked for &#8220;likes&#8221; as messages of support and prayers for her to beat cancer. In reality, the picture was almost six years old and never once posted to Facebook. The girl&#8217;s family had no clue it was even stolen from their Photobucket account and used for that purpose. The family, along with everyone who liked or shared the picture, were victims of like-farming — acquiring &#8220;likes&#8221; for fraudulent Facebook photos, posts and pages. Deceptive Facebook posts and pages garnering mass &#8220;likes&#8221; and shares are direct threats designed to spread a malware virus or collect personal information. Once scammers have your personalized data, such as location or age, they can use it to target a more dangerous attack like identity theft.</p>
<h3>Like-Farming</h3>
<p>Like-farming works by sharing viral content that&#8217;s fallacious and likely to receive hundreds of thousands of &#8220;likes&#8221; and shares. The more &#8220;likes&#8221; and shares a page receives, the higher its value and social visibility.</p>
<p>&#8220;It&#8217;s a way to trick Facebook&#8217;s algorithm,&#8221; describes CNN. Scott Kleinberg, a Chicago Tribune contributor, calls the liking scam a &#8220;sharing trap&#8221; — when people are manipulated into liking an emotionally gripping fake post as a scamming technique.</p>
<p>For example, a scammer may create a page dedicated to inspirational quotes and gain a large following. Then the scammer can strip the popular page to spread a virus, phish or advertise. The new page can be used to sell products or it can be sold to a black market website that now has access to your newsfeed. A scammer can also use the page as a way to spam users to click on links to spammy sweepstakes or giveaways. Information you provide by entering a fake contest could then be used for credit card or bank fraud.</p>
<h3>Clickjacking</h3>
<p>The threat of viral scammers and exploiting the Facebook &#8220;like&#8221; button hasn&#8217;t just recently shocked social networking. In 2010, scammers took advantage of the &#8220;like&#8221; button&#8217;s Javascript to create clickjacking exploits. <a href="https://www.theguardian.com/technology/blog/2010/jun/07/facebook-likejacking-spreads" rel="nofollow noopener" target="_blank">Clickjacking tricks a user</a> into clicking on a concealed link or revealing confidential information by accessing and performing actions on a hidden page. A user who clicks on the link implemented with the &#8220;like&#8221; button basically spreads pages virally throughout the site, explains The Guardian. Clickjacking, a browser-based attack, includes targeted links and catchy display text. Attracted to a sensationalized headline, the user will follow the link to a page that entices visitors to &#8220;click here!&#8221; After clicking on the page, an invisible iframe with a Facebook &#8220;like&#8221; button launches, and the link spreads. The &#8220;like&#8221; button embedded on an iframe enables the clickjacking attack to easily go viral as its exposure grows from newsfeed to newsfeed.</p>
<h3>Best Practices for Prevention</h3>
<p>Awareness is the first step to protect yourself. &#8220;Like&#8221; and share on Facebook vigilantly. If something sounds too good to be true or is obviously intended to monopolize on your emotions, it&#8217;s a red flag (e.g. an unbelievable trip giveaway or a picture of an abused animal at a pet shelter). Observe low-quality posts keenly, and don&#8217;t be afraid to report suspicious posts to Facebook as well. Securing your online activity and information with anti-virus security and even identity theft protection also provides extra assurance. Identity theft protection company LifeLock&#8217;s Facebook page offers valuable security information, from preventing identity theft consumer fraud to changing passwords because of the Heartbleed bug. Plus, <a href="https://get.aol.com/lifelock" rel="nofollow noopener" target="_blank">if you are an AOL member</a>, you can sign up for free LifeLock protection. Our <a href="https://www.facebook.com/login/?next=https%3A%2F%2Fwww.facebook.com%2FIntego" rel="nofollow noopener" target="_blank">Intego Mac Security Facebook page</a> is another good resource for staying up-to-date on WindowsXP vulnerabilities and security risk mitigation.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2014/05/14/what-you-need-to-know-about-pressing-the-like-button/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WARNING: Microsoft Reveals New Security Bug in Browser</title>
		<link>https://socialmediaseo.net/2014/04/28/warning-microsoft-reveals-new-security-bug-in-browser/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=warning-microsoft-reveals-new-security-bug-in-browser</link>
					<comments>https://socialmediaseo.net/2014/04/28/warning-microsoft-reveals-new-security-bug-in-browser/#respond</comments>
		
		<dc:creator><![CDATA[SMSEO]]></dc:creator>
		<pubDate>Mon, 28 Apr 2014 15:35:02 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Websites]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[Internet Explorer]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=31678</guid>

					<description><![CDATA[Well, as if Microsoft hasn&#8217;t given us enough reasons to kick their browser to the side, now there is another eason.  Microsoft recently released a security advisory that warns about remote code executions in various versions of Internet Explorer. &#8220;This issue allows remote code execution if users visit a malicious website with an affected browser,&#8221; [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-31679" src="https://socialmediaseo.net/wp-content/uploads/2014/04/internet-explorer-browser-security-bug.jpg" alt="internet-explorer-browser-security-bug" width="275" height="275" title="WARNING: Microsoft Reveals New Security Bug in Browser 16" srcset="https://socialmediaseo.net/wp-content/uploads/2014/04/internet-explorer-browser-security-bug.jpg 275w, https://socialmediaseo.net/wp-content/uploads/2014/04/internet-explorer-browser-security-bug-150x150.jpg 150w" sizes="(max-width: 275px) 100vw, 275px" />Well, as if Microsoft hasn&#8217;t given us enough reasons to kick their browser to the side, now there is another eason.  Microsoft recently released a security advisory that warns about remote code executions in various versions of Internet Explorer.</p>
<p>&#8220;This issue allows remote code execution if users visit a malicious website with an affected browser,&#8221; Microsoft said. &#8220;This would typically occur by an attacker convincing someone to click a link in an email or instant message.&#8221;</p>
<p>The bug affects Internet Explorer 6 &#8211; 11.</p>
<p>The Vulnerability enables the hackers to gain control of your system and lets them access and manipulate the data which is quite alarming considering the fact that almost 10% of all government systems still run Windows XP and perfectly vulnerable to this attack.  Microsoft has addressed the issue in a security advisory post and says “it is working on a patch” to fix the issue.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2014/04/28/warning-microsoft-reveals-new-security-bug-in-browser/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Heartbleed SSL Threat Startles Web Industry</title>
		<link>https://socialmediaseo.net/2014/04/08/heartbleed-ssl-threat-startles-web-industry/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=heartbleed-ssl-threat-startles-web-industry</link>
					<comments>https://socialmediaseo.net/2014/04/08/heartbleed-ssl-threat-startles-web-industry/#respond</comments>
		
		<dc:creator><![CDATA[SMSEO]]></dc:creator>
		<pubDate>Wed, 09 Apr 2014 02:51:56 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[US & World]]></category>
		<category><![CDATA[Websites]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=31652</guid>

					<description><![CDATA[Headlines are flashing scary news, that passwords, emails, and other secure information may be at risk across millions of websites who use vulnerable SSL technology. Security researchers say the threat, known as Heartbleed, is serious, partly because it remained undiscovered for more two years. Attackers can exploit the vulnerability without leaving any trace, so anything [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-31653" alt="heartbleed-openssl-security-threat" src="https://socialmediaseo.net/wp-content/uploads/2014/04/heartbleed-openssl-security-threat.jpg" width="500" height="500" title="Heartbleed SSL Threat Startles Web Industry 18" srcset="https://socialmediaseo.net/wp-content/uploads/2014/04/heartbleed-openssl-security-threat.jpg 500w, https://socialmediaseo.net/wp-content/uploads/2014/04/heartbleed-openssl-security-threat-288x288.jpg 288w" sizes="(max-width: 500px) 100vw, 500px" /></p>
<p>Headlines are flashing scary news, that passwords, emails, and other secure information may be at risk across millions of websites who use vulnerable SSL technology.</p>
<p>Security researchers say the threat, known as Heartbleed, is serious, partly because it remained undiscovered for more two years. Attackers can exploit the vulnerability without leaving any trace, so anything sent during that time has potentially been compromised. It&#8217;s not known, though, whether anyone has actually used it to conduct an attack.</p>
<p>Of course, the usual, researchers are urging everyone to change their passwords.  Not a solution to the problem, but if your information is out there it will help.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2014/04/08/heartbleed-ssl-threat-startles-web-industry/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apple Has Huge Security Bug with Mavericks 10.9.2</title>
		<link>https://socialmediaseo.net/2014/02/25/apple-has-huge-security-bug-with-mavericks-10-9-2/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=apple-has-huge-security-bug-with-mavericks-10-9-2</link>
					<comments>https://socialmediaseo.net/2014/02/25/apple-has-huge-security-bug-with-mavericks-10-9-2/#respond</comments>
		
		<dc:creator><![CDATA[SMSEO]]></dc:creator>
		<pubDate>Wed, 26 Feb 2014 02:48:29 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[ios]]></category>
		<category><![CDATA[Mac]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=31567</guid>

					<description><![CDATA[Not too long ago Apple released an update for IOS to fix a huge security bug that basically made SSL connections useless.  The IOS system was a quick patch, however Apple didn&#8217;t update Mavericks until today.  It&#8217;s uncommon for Apple to slowly roll out a patch like this, so some users are worried that it [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright size-full wp-image-31568" alt="apple-mavericks-ssl-security-flaw" src="https://socialmediaseo.net/wp-content/uploads/2014/02/apple-mavericks-ssl-security-flaw.png" width="395" height="187" title="Apple Has Huge Security Bug with Mavericks 10.9.2 20" srcset="https://socialmediaseo.net/wp-content/uploads/2014/02/apple-mavericks-ssl-security-flaw.png 395w, https://socialmediaseo.net/wp-content/uploads/2014/02/apple-mavericks-ssl-security-flaw-150x71.png 150w, https://socialmediaseo.net/wp-content/uploads/2014/02/apple-mavericks-ssl-security-flaw-300x142.png 300w" sizes="(max-width: 395px) 100vw, 395px" />Not too long ago Apple released an update for IOS to fix a huge security bug that basically made SSL connections useless.  The IOS system was a quick patch, however Apple didn&#8217;t update Mavericks until today.  It&#8217;s uncommon for Apple to slowly roll out a patch like this, so some users are worried that it took so long. The bug-fix wasn&#8217;t released on its own but instead they packaged it with some of the updates, which wasn&#8217;t too reassuring to Apple users.</p>
<p>The update to Mavericks include the following:</p>
<ul>
<li>Adds the ability to make and receive FaceTime audio calls</li>
<li>Adds call waiting support for FaceTime audio and video calls</li>
<li>Adds the ability to block incoming iMessages from individual senders</li>
<li>Improves the accuracy of unread counts in Mail</li>
<li>Resolves an issue that prevented Mail from receiving new messages from certain providers</li>
<li>Improves AutoFill compatibility in Safari</li>
<li>Fixes an issue that may cause audio distortion on certain Macs</li>
<li>Improves reliability when connecting to a file server using SMB2</li>
<li>Fixes an issue that may cause VPN connections to disconnect</li>
<li>Improves VoiceOver navigation in Mail and Finder</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2014/02/25/apple-has-huge-security-bug-with-mavericks-10-9-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apple iOS 7.0.6 and 6.1.6 update fix SSL security problem</title>
		<link>https://socialmediaseo.net/2014/02/22/apple-ios-7-0-6-and-6-1-6-update-fix-ssl-security-problem/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=apple-ios-7-0-6-and-6-1-6-update-fix-ssl-security-problem</link>
					<comments>https://socialmediaseo.net/2014/02/22/apple-ios-7-0-6-and-6-1-6-update-fix-ssl-security-problem/#respond</comments>
		
		<dc:creator><![CDATA[SMSEO]]></dc:creator>
		<pubDate>Sat, 22 Feb 2014 15:26:45 +0000</pubDate>
				<category><![CDATA[iPad]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Mobile Phones]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[ios]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=31559</guid>

					<description><![CDATA[Apple released an IOS 7.0.6 and 6.1.6 update to fix an SSL security issue that was related to in-app purchases that could have been made with insecure authorization.  If you are updating your phone, I would recommend a Wi-Fi connection.  It&#8217;s around 13mb and took me 5 minutes to complete.  It seems to take a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright size-full wp-image-31560" alt="ios-ssl-security-update" src="https://socialmediaseo.net/wp-content/uploads/2014/02/ios-ssl-security-update.png" width="360" height="214" title="Apple iOS 7.0.6 and 6.1.6 update fix SSL security problem 22" srcset="https://socialmediaseo.net/wp-content/uploads/2014/02/ios-ssl-security-update.png 360w, https://socialmediaseo.net/wp-content/uploads/2014/02/ios-ssl-security-update-150x89.png 150w, https://socialmediaseo.net/wp-content/uploads/2014/02/ios-ssl-security-update-300x178.png 300w" sizes="(max-width: 360px) 100vw, 360px" />Apple released an IOS 7.0.6 and 6.1.6 update to fix an SSL security issue that was related to in-app purchases that could have been made with insecure authorization.  If you are updating your phone, I would recommend a Wi-Fi connection.  It&#8217;s around 13mb and took me 5 minutes to complete.  It seems to take a little longer than expected for an update of this nature, so only do it if you have a little spare time.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2014/02/22/apple-ios-7-0-6-and-6-1-6-update-fix-ssl-security-problem/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>9 Technology Entrepreneurs who will Thrive in 2014</title>
		<link>https://socialmediaseo.net/2014/02/10/9-technology-entrepreneurs-who-will-thrive-in-2014/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=9-technology-entrepreneurs-who-will-thrive-in-2014</link>
					<comments>https://socialmediaseo.net/2014/02/10/9-technology-entrepreneurs-who-will-thrive-in-2014/#respond</comments>
		
		<dc:creator><![CDATA[Jeremy]]></dc:creator>
		<pubDate>Mon, 10 Feb 2014 21:43:38 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[baseball]]></category>
		<category><![CDATA[New York]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=31527</guid>

					<description><![CDATA[Predicting the most successful technology of 2014 is more art than science, but, in examining the trends, some interesting observations present themselves. One is the effort to make security both convenient and effective. The second is the rise of firms with as much interest in their social agendas as in their bottom lines. However, the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Predicting the most successful technology of 2014 is more art than science, but, in examining the trends, some interesting observations present themselves. One is the effort to make security both convenient and effective. The second is the rise of firms with as much interest in their social agendas as in their bottom lines.</p>
<p>However, the trend with the most potential long-term impact is the increasing number of women that either head or hold high senior positions in technology companies. It is part of a trend in which female entrepreneurs are increasingly desirable targets for venture capitalists. They still get a relatively small slice of the venture capital pie, but the size of the 2013 slice was 20 percent bigger than that of 2012.</p>
<p>These nine people will help shape the world of technology in 2014.</p>
<h2>Francisco Aguilar and David Young</h2>
<p>Two M.I.T. business school alumni may make rescue operations dramatically safer for first responders everywhere. Aguilar and Young founded Bounce Imaging Inc. while working on their M.B.A.s.</p>
<p>Their signature product, the Bounce Imaging Explorer, is a throwable camera that is the size of a baseball. Lenses and sensors point in six directions, making precision placement unnecessary. However it lands, responders can get pictures and data on potential hazards such as carbon monoxide and radiation levels.</p>
<p>The Bounce Imaging Explorer makes gathering data on active crime scenes, combat zones, and disasters such as fires or explosions far less risky to first responders than earlier options. It&#8217;s the kind of product that invites new and different applications, but its primary benefit will always lie in the number of lives it saves.</p>
<h2>Drago Bojkov</h2>
<p>Bojkov is an executive with LifeLogger, a company that specializes in &#8220;augmented memory.&#8221; LifeLogger users record their lives with the aid of a lightweight, wearable streaming video device. LifeLogger technology includes the ability to recognize words that appear on signs, aiding place memory. It is also able to tag place names to images and associate names with faces. Links to a cloud-sharing service let LifeLogger users access these recordings from almost anywhere.</p>
<p>LifeLogger technology has potential for educational and business applications as well. For example, teachers could log a museum visit for use by absent students; businesses could log their processes for training and audit purposes.</p>
<h2>Rana el Kaliouby and Rosalind Picard</h2>
<p>El Kaliouby and Picard are the founders of Affectiva, a company that literally brings a new face to the art of gauging consumer opinion.</p>
<p>Affectiva&#8217;s technology uses facial-recognition technology to assess non-verbal responses to a product. In particular, it measures the consumer&#8217;s emotional response. Participants in Affectiva surveys use a webcam to record their reactions to client products. Once the survey is over, participants can either share their responses or disconnect the webcam. Roughly half choose to share.</p>
<p>The company plans to introduce its Affdex survey software to the smartphone market with an app development kit for Apple&#8217;s iOS.</p>
<h2>Leila Janah</h2>
<p>Leila Janah sees her Samasource startup as her way of using technology to fight poverty worldwide.</p>
<p>In its first six years, Samasource built a 4,000-person workforce and contracts worth $5 million. It has brought living wages to impoverished workers in places like sub-Sahara Africa, southern Asia, and the Caribbean by providing opportunities in data augmentation, digital transcription, and machine learning.</p>
<p>These opportunities build skill sets, provide part-time income and jobs to American community college students, and double the incomes of poverty-strapped employees abroad.</p>
<h2>Tej Kohli</h2>
<p>Kohli made his fortune in technology with Grafix Softech, a payment processing firm with its headquarters in Costa Rica.</p>
<p>Since 2005, Kohli has used his Tej Kohli Foundation to raise the living standards of poor women and children. Much of the foundation&#8217;s work takes place in India, where long-standing social taboos limit women&#8217;s access to education. Kohli aims to improve poor children&#8217;s standard of living by providing their mothers with educational opportunities they otherwise might not have, in addition to improving their quality of food, water, and housing.</p>
<p>Another major Foundation project is fighting blindness in India by providing corneal transplants and vision care.</p>
<h2>Michelle Rowley</h2>
<p>Many technology professionals used books, websites, and friends to pick up skills on their own. Michelle Rowley was one of them, but she realized that making more structured training available more widely would bring the benefits of a technical career to those who had traditionally not sought one: women. As the executive director of Code Scouts, Rowley seeks to bring the diversity that has penetrated much of the working world to the male-dominated world of programming.</p>
<p>Code Scouts began in Portland, Oregon, but looks to expand. There has already been interest from groups in major cities such as Austin, London, New York, and San Francisco. In years to come, Code Scouts may well bring a woman&#8217;s touch to software development worldwide.</p>
<h2>Caryn Seidman-Becker</h2>
<p>Airport security lines are the bane of many travelers&#8217; existence. Caryn Seidman-Becker&#8217;s rescue of biometrics company Clear may make airport security less burdensome. Members use a card that incorporates a biometric chip to confirm their identities at company-supplied kiosks.</p>
<p>Clear had a promising start, with 200,000 members, about 12 airports under contract, and $75 million in venture capital, but the theft of a laptop holding customer data, $33 million of debt, and a declining economy led to bankruptcy in 2009.</p>
<p>Seidman-Becker, however, took control of Clear after the Algood Holdings investment firm bought the company in 2010. From there she has battled to re-establish the brand and rebuild confidence with customers, airports, and the Transportation Security Agency. It&#8217;s working, between 2010 and 2013 membership grew from 200,000 to 250,000. Airport participation stands at nine.</p>
<p>If swiping a biometric card to get through airport security becomes widespread, travelers will have Caryn Seidman-Becker to thank.</p>
<p>Many of these leaders will not grab headlines. With the possible exceptions of LifeLogger and Clear membership, they don&#8217;t represent products with mass market appeal. But these leaders&#8217; impact will leave its mark on a broader scale. Their legacy, whether through risk-reducing devices or economic opportunities, is better quality of life.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2014/02/10/9-technology-entrepreneurs-who-will-thrive-in-2014/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Pop-Up behind Chrome Listens to User’s Offline Conversations</title>
		<link>https://socialmediaseo.net/2014/01/28/pop-up-behind-chrome-listens-to-users-offline-conversations/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=pop-up-behind-chrome-listens-to-users-offline-conversations</link>
					<comments>https://socialmediaseo.net/2014/01/28/pop-up-behind-chrome-listens-to-users-offline-conversations/#comments</comments>
		
		<dc:creator><![CDATA[Fahad Saleem]]></dc:creator>
		<pubDate>Tue, 28 Jan 2014 15:11:11 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[chrome]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Chrome]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=31431</guid>

					<description><![CDATA[Developer Tal Ater observed a strange phenomenon related to the microphone permission policies of Chrome that enables the malicious sites to listen to the user’s offline activities. Such malicious websites can generate pop-ups hidden in the background that will keep listening to the user. Tal Ater revealed that a pop-up window still remains open even [&#8230;]]]></description>
										<content:encoded><![CDATA[<div style="text-align: left;">
<p>Developer Tal Ater observed a strange phenomenon related to the microphone permission policies of Chrome that enables the malicious sites to listen to the user’s offline activities. Such malicious websites can generate pop-ups hidden in the background that will keep listening to the user. Tal Ater revealed that a pop-up window still remains open even if he closes all the tabs of Chrome.</p>
</div>
<p style="text-align: left;" align="center"> The root-cause of the problem lies in the settings related to microphone in Google Chrome. Once the user enables the microphone for certain HTTPS-enabled website, the rule is applied to all the linked pages of the website. If a pop-up is integrated with the website, then it will also use a microphone to listen to the user. This activity doesn’t disturb the tasks of the computer, but it spies on the user. You will not have any idea about this hidden activity since everything is going on in the background. You will have to disable microphone as the only way of defense.</p>
<p style="text-align: left;">Google engineers have analyzed the problems in detail when the problem was first identified in September last year. They emphasized the fact that there is no immediate threat to the users of Chrome since they have to enable the microphone for speech recognition websites.</p>
<p style="text-align: left;">Beyond the influence of Chrome, the use of browsers like Hangouts causes significant destruction that doesn’t require reauthorization of microphone. In these cases, your microphone might be enabled forever until you disable it after noticing. Plethora of Apps has approached the market that requires threatening permissions for the users.</p>
<p style="text-align: left;">The bug of turning microphone on for malicious sites has become destructive with the innovation of apps that don’t ask for enabling the microphone in every new session. Keeping a close eye on the use of your microphone may be a good idea to avoid any hacker to listen to your offline activities.</p>
<p style="text-align: left;">The bug reported by Tal Ater was considered for the award of Chromium. The problem was eventually resolved by the engineers of Chrome. However, the fix of the problem couldn’t make to the user’s computer yet.</p>
<p style="text-align: left;">
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2014/01/28/pop-up-behind-chrome-listens-to-users-offline-conversations/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Report: 99 Percent Of Mobile Malware Targets Android</title>
		<link>https://socialmediaseo.net/2014/01/28/report-99-percent-of-mobile-malware-targets-android/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=report-99-percent-of-mobile-malware-targets-android</link>
					<comments>https://socialmediaseo.net/2014/01/28/report-99-percent-of-mobile-malware-targets-android/#respond</comments>
		
		<dc:creator><![CDATA[Fahad Saleem]]></dc:creator>
		<pubDate>Tue, 28 Jan 2014 15:10:54 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[ios]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=31426</guid>

					<description><![CDATA[Mobile phones are becoming a necessary component of our lives. Specially, smartphones are so popular among people that they consider it as a basic need of their lives. Among the smartphones, Android is the most popular mobile operating software, which is admired by majority of the smartphones users followed by iOS and Windows operating systems. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p style="text-align: left;" align="center">Mobile phones are becoming a necessary component of our lives. Specially, <span class="GINGER_SOFTWARE_mark" id="54354ea5-4938-4933-a8b0-73601c082a42">smartphones</span> are so popular among people that they consider it as a basic need of their lives. Among the <span class="GINGER_SOFTWARE_mark" id="539aa3dc-f441-4594-a9cd-6cce3435e3db">smartphones</span>, Android is the most popular mobile operating software, which is admired by <span class="GINGER_SOFTWARE_mark" id="09bb8293-2473-4af9-b101-9dbfb02845c5">majority</span> of the <span class="GINGER_SOFTWARE_mark" id="8b2dadc8-2385-453a-8b25-b93efd63c1ea">smartphones</span> users followed by <span class="GINGER_SOFTWARE_mark" id="9434dc38-8462-45a0-8405-2443263fe645">iOS</span> and Windows operating systems. Due to its reputation it is widely targeted by mobile <span class="GINGER_SOFTWARE_mark" id="e10cafb5-181d-44e7-88db-b095be39da08">malwares</span> such as viruses. This virus damages the functions of the phone and helps in the effusion of confidential information. Good news for the <span class="GINGER_SOFTWARE_mark" id="e6265bdb-3922-4336-a022-96c0f114dba5">iOS</span> and Windows users, bad news for Anroid fans, Cisco’s<em> </em>2014 Annual Security Report suggests that 99% of mobile malware software target Android platform.</p>
<p style="text-align: left;">It seems to be good news for other operating systems like <span class="GINGER_SOFTWARE_mark" id="aba548a1-bbc0-4819-aa58-fb7091ea21bc">iOS</span>, Windows and <span class="GINGER_SOFTWARE_mark" id="2a5b542b-6179-4253-bfa7-e62b19b9d184">Blackberry but</span> awful for the Android users. From the Cisco’s 2014 Annual Security Report it can be easily concluded that these <span class="GINGER_SOFTWARE_mark" id="618a6af2-1cf3-42d2-9dfc-d627263fb175">malwares</span> enter the phone through SMS or Apps installed from non official market places. Malware is generated by the people that know the coding in Android. There <span class="GINGER_SOFTWARE_mark" id="0dbadc41-4d02-42ad-b806-0b24a56a6807">are</span> <span class="GINGER_SOFTWARE_mark" id="4149c481-033f-4daa-831d-f50ca2ff1d4a">Malwares</span> that <span class="GINGER_SOFTWARE_mark" id="97c32c7c-8ef7-478d-bfd2-886b5cd80daa">are specially designed</span> for Android, which means that if an <span class="GINGER_SOFTWARE_mark" id="691fd11a-6c11-4836-85d6-27aeb4036047">iOS</span> user install that infected app he will not get <span class="GINGER_SOFTWARE_mark" id="cf63cdcd-cc59-447e-a26e-9451819f58d9">infected but,</span> if the same infected app is downloaded by an Android user it will adversely result into a system collapse or slight damage to the software.</p>
<p style="text-align: left;">Android <span class="GINGER_SOFTWARE_mark" id="3d585c03-2a44-4cda-ae47-2274e9c7fade">have attracted</span> most consideration of malicious elements due to its growing popularity and comparative openness as compared to <span class="GINGER_SOFTWARE_mark" id="a02537ad-3934-42d2-b92d-69234e81c512">iOS</span> and Windows.</p>
<p style="text-align: left;">Eric Schmidt has openly said that Android is more secure than <span class="GINGER_SOFTWARE_mark" id="332c49ee-5a0a-4da4-ba37-7060455c4962">iOS</span>, but due to increasing issues of security and privacy this does not seem to be true. This doesn&#8217;t mean that all the Android devices are malware <span class="GINGER_SOFTWARE_mark" id="16705590-82c4-4ef9-ab92-e2e348dfe9ae">effected but</span> it is more likely to solve the security issues in Android. Android is too disintegrated, manufacturers and carriers don&#8217;t want to release updates of which some are security updates. They need to solve this problem out. These burning issues are very hard to resolve as they are properly backed by organized crime elements. Rather than identifying the malware after its penetration in the system, it must be identified at the time of its entrance in the device.</p>
<p style="text-align: left;">In order to minimize the security risks, the security systems should be designed which must be operated directly by the user. Users can install the updates for security issues on the regular basis, plus using a password or pin and setting your phone to lock after a period of inactivity could be a more positive step for a secure and fast operating system.</p>
<p style="text-align: left;" align="center">
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2014/01/28/report-99-percent-of-mobile-malware-targets-android/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The 25 most popular passwords of 2013 (Hint 123456 is one)</title>
		<link>https://socialmediaseo.net/2014/01/20/the-25-most-popular-passwords-of-2013-hint-123456-is-one/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-25-most-popular-passwords-of-2013-hint-123456-is-one</link>
					<comments>https://socialmediaseo.net/2014/01/20/the-25-most-popular-passwords-of-2013-hint-123456-is-one/#respond</comments>
		
		<dc:creator><![CDATA[SMSEO]]></dc:creator>
		<pubDate>Mon, 20 Jan 2014 18:58:33 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Websites]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=31406</guid>

					<description><![CDATA[Come on people, really?  You are still using these passwords? Whether user&#8217;s have been hacked or not, they still continue to use horrible password combinations that make it easy for hackers to guess or break.  The most popular password was 123456 and &#8220;password&#8221; was in second.  It&#8217;s crazy to me that people would use these [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-31407" alt="15-worst-passwords-to-use-2013" src="https://socialmediaseo.net/wp-content/uploads/2014/01/15-worst-passwords-to-use-2013.jpg" width="539" height="343" title="The 25 most popular passwords of 2013 (Hint 123456 is one) 24" srcset="https://socialmediaseo.net/wp-content/uploads/2014/01/15-worst-passwords-to-use-2013.jpg 539w, https://socialmediaseo.net/wp-content/uploads/2014/01/15-worst-passwords-to-use-2013-453x288.jpg 453w" sizes="(max-width: 539px) 100vw, 539px" /></p>
<p>Come on people, really?  You are still using these passwords? Whether user&#8217;s have been hacked or not, they still continue to use horrible password combinations that make it easy for hackers to guess or break.  The most popular password was 123456 and &#8220;password&#8221; was in second.  It&#8217;s crazy to me that people would use these passwords.  The sad part is, they use them for secure logins and not just accounts that don&#8217;t mean much.</p>
<p>The list from SplashData was compiled from the millions of stolen passwords last year that were ultimately made public.</p>
<p>1. 123456<br />
2. password<br />
3. 12345678<br />
4. qwerty<br />
5. abc123<br />
6. 123456789<br />
7. 111111<br />
8. 1234567<br />
9. iloveyou<br />
10. adobe123<br />
11. 123123<br />
12. admin<br />
13. 1234567890<br />
14. letmein<br />
15. photoshop<br />
16. 1234<br />
17. monkey<br />
18. shadow<br />
19. sunshine<br />
20. 12345<br />
21. password1<br />
22. princess<br />
23. azerty<br />
24. trustno1<br />
25. 000000</p>
<h1>The 25 most popular passwords of 2013</h1>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2014/01/20/the-25-most-popular-passwords-of-2013-hint-123456-is-one/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Blackphone Promises To Be The First NSA-Proof Phone</title>
		<link>https://socialmediaseo.net/2014/01/17/blackphone-promises-to-be-the-first-nsa-proof-phone/#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=blackphone-promises-to-be-the-first-nsa-proof-phone</link>
					<comments>https://socialmediaseo.net/2014/01/17/blackphone-promises-to-be-the-first-nsa-proof-phone/#respond</comments>
		
		<dc:creator><![CDATA[Fahad Saleem]]></dc:creator>
		<pubDate>Fri, 17 Jan 2014 14:52:50 +0000</pubDate>
				<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Products]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Firefox]]></category>
		<guid isPermaLink="false">http://preview.socialmediaseo.net/?p=31339</guid>

					<description><![CDATA[A smartphone called Blackphone is about to hit the stores soon, and the major thing about it is that it protects your privacy like no other phone. No one, not even the NSA, will be able to look through your private data. Silent Circle (a US-based company on security) and Geeksphone (a Spanish-based company on [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>A smartphone called Blackphone is about to hit the stores soon, and the major thing about it is that it protects your privacy like no other phone. No one, not even the NSA, will be able to look through your private data. Silent Circle (a US-based company on security) and Geeksphone (a Spanish-based company on Firefox OS) have joined forces to create this phone and have the support of many important individuals who are known for their security work, for example Phil Zimmermann, who is is the creator of Pretty Good Privacy (a data encryption protocol).</p>
<p><a href="https://socialmediaseo.net/wp-content/uploads/2014/01/blackphone-2.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-31341" alt="blackphone 2" src="https://socialmediaseo.net/wp-content/uploads/2014/01/blackphone-2.png" width="562" height="343" title="Blackphone Promises To Be The First NSA-Proof Phone 26" srcset="https://socialmediaseo.net/wp-content/uploads/2014/01/blackphone-2.png 562w, https://socialmediaseo.net/wp-content/uploads/2014/01/blackphone-2-472x288.png 472w" sizes="(max-width: 562px) 100vw, 562px" /></a></p>
<p>Privacy is the main worry of people who own smartphones. They think about who&#8217;s listening to their calls, seeing their conversations, etc. The private information of a person is personal. What they do on their phone should not be recorded or noted by anyone. Blackphone will have a security-first Android type OS called PrivatOS. It will still have the high-quality processor, but it will be unlocked and free of any geographical restrictions. It is also compatible with any GSM network. Users will be able to make completely secure and safe calls and video chats. While it may not be as powerful as the top smartphone right now, the CEO of Silent Circle has claimed that it will be a &#8220;high-end&#8221; smartphone.</p>
<p>Of course, the number one priority isn&#8217;t the specifications. If you wanted that, go buy the Galaxy S4. The number one priority for this smartphone is security. There hasn&#8217;t been any hands-on impression of the smartphone, it will make it&#8217;s first appearance at the Mobile World Congress in Barcelona of the 24th of February. More details will be discovered by then.</p>
<p>Smartphone security is a major issue. With Apple announcing that everything you say to Siri is recorded or the NSA knowing nearly everything you do on your smartphone, it&#8217;s a very uncomfortable and difficult situation. People are hesitant when they do things on their phone, wondering if someone can see what they&#8217;re doing or can listen in on their calls. If Blackphone really does the things it advertises, it could play a major role in the upcoming smartphone generation. It&#8217;s still going to be a high-quality smartphone, but also offer you the superb security that the other major smartphones don&#8217;t offer. Who wouldn&#8217;t be interested in buying the Blackphone? I know I would be, and many other people too. Look out iPhone and Samsung Galaxy, Blackphone is on the way.</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://socialmediaseo.net/2014/01/17/blackphone-promises-to-be-the-first-nsa-proof-phone/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
