Social Media and its influence
44.2K views | +0 today
Follow
Social Media and its influence
Social Medias and its influence...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Twitter vulnerability lets apps send DMs without user permission

Twitter vulnerability lets apps send DMs without user permission | Social Media and its influence | Scoop.it
Security researcher Egor Homakov has discovered a Twitter vulnerability which allows apps to send DMs without requiring explicit user permission. TNW has verified the findings and can ...
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Scooped by Gust MEES
Scoop.it!

Privacy & Security: Complex Relationship

Privacy & Security: Complex Relationship | Social Media and its influence | Scoop.it

The relationship between cybersecurity and privacy is complex. On the one hand, cybersecurity that protects data from intrusion, theft and misuse obviously is a significant privacy safeguard.


On the other hand, cybersecurity measures that monitor access and use can implicate the collection of personal information and thus raises privacy concerns.


Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?q=Privacy

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Twitter bug gives 3rd-party apps access to users' Direct Messages

Twitter bug gives 3rd-party apps access to users' Direct Messages | Social Media and its influence | Scoop.it

"There should be millions of Twitter users that have signed in with Twitter into third-party applications. Some of these applications might have gained access to and might still have access to Twitter users private direct messages," he points out, and advises users to check third-party applications permissions and revoke the apps to which they never gave permission to access their DMs.

Gust MEES's insight:

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Gust MEES's curator insight, January 22, 2013 11:42 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

 

Check ALSO:

 

https://twitter.com/settings/applications

 

 

http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html

 

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

 

 

Gust MEES's curator insight, January 22, 2013 11:54 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Gust MEES's curator insight, January 22, 2013 11:59 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Teachers' Guide to Social Media Privacy and Security

Teachers' Guide to Social Media Privacy and Security | Social Media and its influence | Scoop.it

 

I know several teachers are still struggling to come to grips with this concept but I am hoping that by readying the guide I posted yesterday together with the one I have today, you will be able to have a clear and practical procedure of how to go about explaining digital footprint to your students. Enjoy

 

Gust MEES's insight:

 

Gust MEES: a little rant if YOU permit! When teachers are talking about Security they mean "InternetSafety", looks like THEY didn't have yet understood THE difference ;) (Sorry...)!

 

Here is WHAT "Security" and "Cyber-Security" is:

 

Learn more:

 

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

I especially recommend my 5 minute tutorials here:

 

https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

ALL my blogs and courses are FREE with NO commercial stuff behind!

 

 

Gust MEES's curator insight, April 26, 2013 9:35 AM

 

Gust MEES: a little rant if YOU permit! When teachers are talking about Security they mean "InternetSafety", looks like THEY didn't have yet understood THE difference ;) (Sorry...)!

 

Here is WHAT "Security" and "Cyber-Security" is:

 

Learn more:

 

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

I especially recommend my 5 minute tutorials here:

 

https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

ALL my blogs and courses are FREE with NO commercial stuff behind!

 

 

 

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Facebook's Graph Search worries security experts

Facebook's Graph Search worries security experts | Social Media and its influence | Scoop.it
Post highlighting embarrassing things raises questions of user privacy with Graph Search, which Facebook users cannot opt out of

 

Facebook believes its responsibility is to provide the privacy settings, while users are responsible for using them. "You control who you share your interests and likes with on Facebook," the company said Thursday in an emailed statement.

 

When joining Facebook, people trade their personal information for free use of the social network. Given that, security experts agree that people are responsible for controlling who sees that information.

 

However, some experts believe Facebook does not go far enough in educating users about the potential threats in keeping information public. Because Graph Search makes all that personal information easily searchable, education on its dangers should be a much higher priority for Facebook.

 

===> "Some people do not grasp the importance of Graph Search," said Bogdon Botezatu, a senior e-threat analyst for Bitdefender. "So maybe it would be better for Facebook to actually inform people that some things will change." <===

Gust MEES's insight:

A MUST read and ALSO to learn about the basic knowledge of Cyber-Security!


https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/


Gust MEES's curator insight, January 27, 2013 12:39 PM

A MUST read and ALSO to learn about the basic knowledge of Cyber-Security!

 

Gust MEES's curator insight, January 27, 2013 12:51 PM

A MUST read and ALSO to learn about the basic knowledge of Cyber-Security!

 

https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/