Sunday, May 20, 2012

Nine Major Ways Criminals Use Facebook

1. Hacking Account
When criminals hack a Facebook account, they typically use one of several available “brute force” tools, Grayson Milbourne, Webroot’s Manager of Threat Research for North America, told 24/7 Wall St. in an interview. These tools cycle through a common password dictionary, and try commonly used names and dates, opposite hundreds of thousands of different email IDs. Once hacked, an account can be commandeered and used as a platform to deliver spam, or — more commonly — sold. Clandestine hacker forums are crawling with ads offering Facebook account IDs and passwords in exchange for money. In the cyber world, information is a valuable thing.
2. Commandeering Accounts
A more direct form of identity theft, commandeering occurs when the criminal logs on to an existing user account using an illegally obtained ID and password. Once they are online, they have the victim’s entire friend list at their disposal and a trusted cyber-identity. The impostor can use this identity for a variety of confidence schemes, including the popular, London scam in which the fraudster claims to be stranded overseas and in need of money to make it home. The London scam has a far-higher success rate on Facebook — and specifically on commandeered accounts — because there is a baseline of trust between the users and those on their friends list.   


See...Everyone's Guide to Email, Internet, and Wireless Security
3. Profile Cloning
Profile cloning is the act of using unprotected images and information to create a Facebook account with the same name and details of an existing user. The cloner will then send friend requests to all of the victim’s contacts. These contacts will likely accept the cloner as a friend since the request appears to be from someone they’re familiar with. Once accepted, the crook has access to the target’s personal information, which they can use to clone other profiles or to commit fraud. As Grayson Milbourne puts it, “Exploiting a person’s account and posturing as that person is just another clever mechanism to use to extract information.” Perhaps what’s scariest about this kind of crime is its simplicity. Hacking acumen is unnecessary to clone a profile; the criminal simply needs a registered account.
4. Cross-Platform Profile Cloning
Cross-platform profile cloning is when the cyber criminal obtains information and images from Facebook and uses them to create false profiles on another social-networking site, or vice versa. The principle is similar to profile cloning, but this kind of fraud can give Facebook users a false sense of security because their profile is often cloned to a social platform that they might not use. The result is that this kind of fraud may also take longer to notice and remedy.
5. Phishing
Phishing on Facebook involves a hacker posing as a respected individual or organization and asking for personal data, usually via a wall post or direct message. Once clicked, the link infects the users’ computers with malware or directs them to a website that offers a compelling reason to divulge sensitive information. A classic example would be a site that congratulates the victims for having won $1,000 and prompts them to fill out a form that asks for a credit card and Social Security number. Such information can be used to perpetrate monetary and identity fraud. Grayson Milbourne of Webroot, also explained that spearphishing is becoming increasingly common, a practice that uses the same basic idea but targets users through their individual interests.
6. Fake Facebook
A common form of phishing is the fake Facebook scam. The scammers direct users via some sort of clickable enticement, to a spurious Facebook log-in page designed to look like the real thing. When the victims enter their usernames and passwords, they are collected in a database, which the scammer often will sell. Once scammers have purchased a user’s information, they can take advantage of their assumed identity through apps like Facebook Marketplace and buy and sell a laundry list of goods and services. Posing as a reputable user lets the scammer capitalize on the trust that person has earned by selling fake goods and services or promoting brands they have been paid to advertise.
7. Affinity Fraud
In cases of affinity fraud, con artists assume the identity of individuals in order to earn the trust of those close to them. The criminal then exploits this trust by stealing money or information. Facebook facilitates this type of fraud because people on the site often end up having a number of “friends” they actually do not know personally and yet implicitly trust by dint of their Facebook connection. Criminals can infiltrate a person’s group of friends and then offer someone deals or investments that are part of a scheme. People can also assume an identity by infiltrating a person’s account and asking friends for money or sensitive information like a Social Security or credit card number.


See....Network Security Bible


8. Mining Unprotected Info
Few sites provide an easier source of basic personal information than Facebook. While it is possible to keep all personal information on Facebook private, users frequently reveal their emails, phone numbers, addresses, birth dates and other pieces of private data. As security experts and hackers know, this kind of information is often used as passwords or as answers to secret security questions. While the majority of unprotected information is mined for targeted advertising, it can be a means to more pernicious ends such as profile cloning and, ultimately, identity theft.
9. Spam
Not all spam — the mass sending of advertisements to users’ personal accounts — is against the law. However, the existence of Facebook and other social sites has allowed for a new kind of spam called clickjacking. The process of clickjacking, which is illegal, involves the hacking of a personal account using an advertisement for a viral video or article. Once the user clicks on this, the program sends an advertisement to the person’s friends through their account without their knowledge. This has become such an issue for the social media giant that earlier this year that the company has teamed up with the U.S. Attorney General to try to combat the issue.
See....Computer Security Basics

Tuesday, May 1, 2012

Genetically modified crops' results raise concern.


 Genetically modified crops' results raise concern.
April 30, 2012, San Francisco Chronicle (San Francisco's leading newspaper) 
Biotechnology's promise to feed the world did not anticipate "Trojan corn," "super weeds" and the disappearance of monarch butterflies. In the Midwest and South - blanketed by more than 170 million acres of genetically engineered corn, soybeans and cotton - an experiment begun in 1996 with approval of the first commercial genetically modified organisms is producing questionable results. Those results include vast increases in herbicide use that have created impervious weeds now infesting millions of acres of cropland, while decimating other plants, such as milkweeds that sustain the monarch butterflies. More than a million people have signed a petition to the Food and Drug Administration to require labeling of genetically engineered food. The stakes on labeling such foods are huge. The crops are so widespread that an estimated 70 percent of U.S. processed foods contain engineered genes. The U.S. Department of Agriculture has approved more than 80 genetically engineered crops while denying none. Genetically engineered crops ... have spawned an infestation of "super weeds" now covering at least 13 million acres in 26 states. The crops led to a 400-million-pound net increase in herbicide applications. Dave Mortensen, a weed ecologist at Pennsylvania State University, said the number of "super weed" species grew from one in 1996 ... to 22 today. Last month, scientists definitively tied heavy use of glyphosate to an 81 percent decline in the monarch butterfly population. It turns out that the herbicide has obliterated the milkweeds on Midwest corn farms where the monarchs lay their eggs after migrating from Mexico. Iowa State University ecologist John Pleasants, one of the study's authors, said the catastrophic decline in monarchs is a consequence of the genetically engineered crops that no one foresaw.
Note: Multiple reliable sources have shown that you may be eating genetically modified food daily which scientific experiments have repeatedly demonstrated can cause sickness and even death in lab animals. For key reports from major media sources on hidden facts on the dangers of genetically modified food, click here.
S.F. Chronicle article.........