500 likes | 1.19k Views
Users & Behaviors. Group: Kenie R. Moses - Rachel Sitarz - Scott Abney. Abuses and Security of Social Media Sites. Purdue University Spring 2011. Social internet TECH621. Social Media Apps and Usage. Users Behaviors: Beware of Media Apps. Scott Abney. Social Media App Intro.
E N D
Users & Behaviors Group: Kenie R. Moses - Rachel Sitarz - Scott Abney Abuses and Security of Social Media Sites Purdue University Spring 2011 Social internet TECH621
Social Media Apps and Usage Users Behaviors: Beware of Media Apps Scott Abney
Social Media App Intro • Apple App Store has over 300,000 apps • Facebook is around 60,000 apps • Twitter just passed over 50,000 apps • 97% of social media users do not check apps or links for viruses
Apple • App Store has over 100 millions users • User info hacked due to knockoffs off applications (Weather HD app) • Thuat Nguyen created 50 apps for app store, then charged up to $600 after hacking into over 400 iTunes accounts for furthering purchases on his other apps • Storm 8 created apps for online games that misconstrued what users were downloading, purchases ranged from $150-$1400
Twitter • Around 200 million users on Twitter • Over 50% of tweets are sent from 3rd party applications • Common app that is used for hacking claims to increase subscribers • Security shield application
Facebook • Between 500-600 million users • November 2010, over 60,000 people clicked on the ePrivacy app to try to see who viewed their profile • Hackers create fake Facebook login pages from apps • Early January 2011, Facebook allows apps to view both home and phone number on profiles
What Can You Do???? • Research applications before adding them • Never give out any private information • Check security settings on your social network • www.facecrooks.com
Social Media Usage and Security Users Behaviors: How Secure Are You? Kenie R. Moses
Social Network Usage • Nearly 20% of Internet users are tweeting on Twitter or using another service to share personal and business updates, or to see updates about others • 66% of LinkedIn users are decision makers or have influence in the purchase decisions at their companies • In 2011, 70+ Percent of Marketers Will Be Using Social Media
Social Network Usage Continued • 54% percent of the companies studied have at least one Facebook Fan page • 72% of companies plan to invest more in social networks • 79% of the largest fortune 500 firms use Twitter, to communicate with customers or employees • 80% of companies are planning to use social networks to find or attract candidates
Social Network Data Leakage • 17% of US companies investigated the exposure of confidential information via a posting to a social networking sites • 13% of US companies investigated the exposure of confidential, sensitive or private information via Twitter • 54% of ClOs said their firms do not allow employees to visit social networking sites for any reason while at work.
Social Networking Pitfalls • 48% have no worries about the security of social networking sites • 46% of Facebook users feel there are security and privacy risks. • 34% have seen somebody else’s phone number posted on a social • networking site. • 9% have included their phone number and 5% have included • their on social networking sites visible to friends. • 25% have discussed holiday plans “wall-to-wall” outside their page
Viruses and Hacking Techniques Used on Social Media Sites 10 1.) Koobface- Virus that steals sensitive data and sends Trojan viruses to contacts of infected 2.) Mikeyy Worm- Virus that activates upon clicked links and sends out messages to contacts. 3.) Acai Attack- Virus that activates once the ad for Acai Berry juice is clicked infecting with Malware. 4.) Facebook Phishing- Coaxes users to give up valuable log-in info on a fake log-in screen. 5.) Twittercut- Virus that promise user over 1000 loyal followers. Once clicked, installs Trojan virus. 9 8 1 7 6 5 2 4 3 1-Facebook 2-MySpace 3-Twitter 4-Bebo 5-U-Tube 6-WAYN 7-Flicker 8-Last FM 9-LinkIn 10-Other
Social Media Abuse and Misuse User Behaviors: Deviant Activities Rachel Sitarz
Introduction • Pornography Internet trends • Deviant behavior: Child Pornography (CP) usage • Predatory behaviors • Victimization of children
Pornography Usage • Multi-billion dollar industry (Ferraro & Casey, 2005) • $97 billion worldwide • $13 billion in the US alone • Every second, $3,075.64 is being spent • 28,258 are viewing pornography every second • 372 Internet users are typing adult search terms into search engines • 39 minutes new pornography is made in US
Pornography Usage Continued • Sex is the most searched topic, with one-third of all internet user visiting some form of sexually related site regularly • Anonymity, cheap, easily accessed, avoid social embarrassment, instant gratification, easily hidden
Pornography Pages By Country Country Porn Pages: • United States 244,661,900 • Germany 10,030,200 • United Kingdom 8,506,800 • Australia 5,655,800 • Japan 2,700,800 • The Netherlands 1,883,800 • Russia 1,080,600 • Poland 1,049,600 • Spain 852,800
Pornography Stats • 40 million U.S. adults regularly visit Internet pornography • 20% of men admit accessing pornography at work • 70% of women keep their online activities secret • 10% of adults admit to Internet sexual addition • 17% of women admit to struggling with pornography addiction
Child Pornography Online • Child pornography isn't new, it’s easier to access without as many social and legal risks • Some statistics estimate that 1.5 million children have been and currently are being exploited • Multi-billion dollar industry with estimated 100,000 child pornography websites • “Golden Age of Child Pornography”
Child Pornography Continued • Child pornography is one of the fastest growing businesses online • Content is continually getting worse and more graphic • 58% of CP websites are made in US
Online Predators • 644,865 Registered Sex Offenders in the US (many unregistered) • 80 % of offenders were explicit about their intentions with youth • 73 % of online crimes, teens go to meet the offender on multiple occasions for multiple sexual encounters
Youth Victimization • Approximately 1 in 6 youth online (10 to 17-years-old) received a sexual solicitation or approach over the Internet. • 4% received an aggressive sexual solicitation – meeting, phone call, gifts • 34% had an unwanted exposure to pornography • 27% of the youth who encountered unwanted pornography told a parent or guardian • Research indicates that 1 in 5 girls and 1 in 10 boys will be sexually victimized before adulthood
Source References 1.) http://information-security-resources.com/2009/08/17/top-8-social-media-security-threats/ 2.) http://socialmediasecurity.com/ 3.) http://www.fastcompany.com/1563867/the-5-biggest-social-media-security-risks-for-businesses 4.) http://dns.tmcnet.com/topics/internet-security/articles/137059-social-networking-sites-sitting 5.) http://www.cdc.gov/socialmedia/Tools/guidelines/pdf/securitymitigations.pdf 6.) http://www.netsmartz.org/ 7.) http://www.missingkids.com/ 8.) http://enough.org/ 9.) Internet Watch Foundation. Annual Report, 2008 10.) Adler, A. (2001). The Perverse Law of Child Pornography. Columbia Law Review, 101(2), 209-273
Source References Continued 11.) http://blog.vimov.com/2011/01/app-squatting-misuse-of-weather-hd-name-in-the-mac-app-store/ 12.) http://www.betanews.com/article/Apple-still-silent-as-more-scams-are-found-on-App-Store/1278363193 13.) http://eu.techcrunch.com/2010/11/29/over-60000-click-on-scam-facebook-app-which -claims-you-can-see-who-checked-your-profile/ 14.) http://www.switched.com/2009/09/15/5-popular-facebook-scams-and-how-to-avoid-them/ 15.) http://www.macworld.com/article/157303/2011/01/twitter_antivirusscam.html. 16.) http://downloadsquad.switched.com/2011/01/16/facebook-enables-one-click-identity-theft-option -for-rogue-application-developers/ 17.) http://www.facecrooks.com/blog/internet-safety-a-privacy/item/904-study-finds-most-social-media -users-do-not-check-shared-links-for-malware 18.) http://tech.fortune.cnn.com/2011/01/22/app-store-hits-10-billion-update/?hpt=T2 19.) http://blog.nutshellmail.com/2010/02/03/can-you-trust-third-party-twitter-applications 20.) Ferraro, M., & Casey, E. (2005). Investigating child exploitation and pornography: The Internet, the Law and Forensic Science. San Diego, CA: Elsvier Academic Press.