rss

wibiya widget

  • Free Domain Ayo... Buat Blogmu dengan nama domain sendiri!!
  • CO.CC Dapatkan nama domain gratis selama 1tahun di CO.CC

12.22.2009

--..Web 2.0 World..--


Web 2.0 has spawned a new generation of Internet scams -- let's call them "Cons 2.0." It's not as easy to dupe users as it used to be, but increasingly sophisticated social engineering strategies -- coupled with a growing acceptance of loss of control over one's personal data -- has made the Web a more dangerous neighborhood than ever. Still, there are steps you can take to protect yourself.



Social networking sites such as Facebook and MySpace rely on the trusted nature of the relationship between friends, colleagues, associates and followers. Unfortunately, the level of trust that end-users invest in each other is also being applied to the makers of applications and is perhaps a little over-optimistic. Increasingly, cybercriminals are being drawn by the possibilities opened up by application development on popular Web 2.0 Web sites with the promise of more money, which results in more infections and more potential for something to go horribly wrong with computers being used both at home and in a corporate environment.


Facebook is probably the most well-known site as far Web 2.0 applications are concerned. These applications are typically games, add-ons, and time-saving devices that require access to elements of your profile data in order to function correctly. The risks of doing this should be obvious; it requires sharing profile data that could be compromised, including your username and password.

For example, on Twitter recently many people were setting status updates saying what their three most used words were; they identified them by logging into a site link that a friend or follower sent them. They logged in using their Twitter username and password. One wonders how many individuals did this without first checking the legitimacy of the site in question? Did most assume it was "safe" simply because a friend had used it?
The Rapid Evolution of Web 2.0 Risk

Unfortunately, the problem of the chain of trust extends right to the heart of almost every aspect of a Web 2.0 site -- not just applications.

Even as far back as January 2008, security 2.0 went into meltdown simply because a Facebook application opened a pop-up advertisement that contained a (random) promotion for Zango Adware. Two years later, we've moved from near hysteria over a harmless pop-up to grim acceptance that the applications themselves can indeed perform harmful acts, from directing users to phishing pages to promoting dubious ties to rogue antispyware programs. Worse still, smart Internet marketers have identified that they can piggyback legitimate applications by running advertisements above the installers designed to look like part of the install routine.

Not worried enough yet? Some individuals don't even waste time on coding a rogue application. They simply set up an application page that seemingly has nothing on it other than a fake "customer dispute" page, harvesting the login data of anybody foolish enough to enter their account information. In a number of cases, neither the application nor the application pages exist.

These data-stealing perpetrators rely on our acceptance of applications on Facebook pages in general; an attacker knows a reasonably convincing screenshot of a fake program pasted onto a comments wall will attract victims (the hook here being the supposed exploitation of a legitimate app).
Use Common Sense on Social Networks

It's a pretty dire situation then, but there are steps you can take to reduce the risk of falling prey to one of the many cons currently out there in the world of Web 2.0 applications -- and imitations! While the following advice is suitable for home users, business users and IT managers also should take note and apply these same practices to their everyday activities and education processes where social networking is concerned:

1) In all cases, consider using the least amount of personal data an application requires to install on your profile and only provide as much access as is absolutely necessary.

2) Be wary of gaming applications that offer payment in return for gifts and in-game items. There have been numerous problems with these kinds of game applications on Facebook and other sites. In particular, games like "Mafia Wars" often negotiate deals with affiliate partners, but you can't be certain what types of applications or pay structures might come with those affiliates down the line. Ask yourself if what you're getting in return is really worth it.

3) Whenever someone posts a message on a Facebook wall, or a Twitter DM, that you're "appearing in a video," you can virtually guarantee this is a variation of the Koobface worm. An instant giveaway will be a Web site that asks you to install a "codec" or media player in order to watch the movie. These cons rely on the fact that end-users readily install new applications on Web 2.0 sites, which lowers their sense of suspicion in relation to all installs. This is not a good habit to engender.

4) Inspired by the general acceptance of knowledge users have with regard to Facebook applications, a favorite tactic of Con Artist 2.0 is to create a fake program that typically claims to exploit a genuine application, and then post it to the comments wall of the victim, complete with download link. More often than not, an end-user presented with a "program" on their comments wall will assume it's a form of application and run it without thinking. This is usually the first step to a hijacked computer. Just because a friend posts it to your wall doesn't mean it's safe; your friend's account may have been compromised to spread dubious links!

5) Social media con artists will get around the security measures put in place by social networks whenever possible. A recent attack on Russian social networking site Vkontakte.ru involved placing links on Web sites harboring infection files via messages that claimed to "exploit holes" in order to view private profiles. When Vkontakte started to block some of these text links, the con artists started posting the messages as "drawings" on the graffiti wall of the victim. This is a simple yet very effective method of getting around security measures.

Cons 2.0: The Next Generation

Even when you take precautions against attacks like those outlined above, there are always issues -- e.g., rogue applications, dubious advertisements, and social networking worms spreading across your favorite Web 2.0 sites. Perhaps a bigger concern is the thought that Facebook applications will be phased out in favor of Facebook Connect, a new approach that allows users to log into a Facebook service, such as a game previously available only as an application, from a third-party Web site.

source:technewsworld

--..Web 2.0 World..--
SocialTwist Tell-a-Friend

0 komentar:


Posting Komentar

Silahkan tinggalkahn pesan Anda yang sopan, terimakasih!

←   →
Related Posts with Thumbnails

Other Information

Tutorial Blog

  • Membuat Iklan Melayang dengan Tombol Close
  • Button Maker Online
  • How To Install Alert in Blog
  • Creating Exchange Banner and Text Bar
  • Make Favicon Generator
  • What is blog?
  • Memasang Artikel Terkait Menggunakan LinkWithin
  • Cara Membuat Tab View
  • Cara Memasang Alert Pada Blog
  • Cara Membuat Link Download
  • Cara Membuat Page Navigation
  • Menghilangkan Navbar Blog
  • Menyembunyikan Navbar Blog
  • Memasang bookmark di Setiap Postingan
  • Pasang Audio di Blog
  • Mengganti Tanggalan Dengan Icon Kalender
  • Pasang Iklan di Bawah ReadMore
  • Mengganti Link Blog Pager Dengan Icon
  • Menampilkan Status Online
  • Pasang Emoticon Yahoo di Atas Kotak Komentar
  • Membuat Tulisan Link Berwarna-warni
  • Membuat Teks Dalam Tabel
  • Membuat Teks Berjalan Pada Title Blog
  • Membuat Teks Bergerak Pada Title Bar Blog
  • Membuat ReadMore
  • Membuat Marquee Untuk Banner Iklan
  • Membuat Log in Blogger
  • Membuat Link di Postingan
  • Membuat gambar melayang disudut halaman blog
  • Membuat Button Sebagai Link
  • Membuat Box Pemisah Pada Sidebar
  • Membuat Box Pemisah Pada Postingan
  • Membuat Background Warna / Gambar di Postingan
  • Membuat Awalan Huruf Besar di Awal Postingan
  • Membuat Automatic Scroll Blogroll
  • Membuat Artikel Postingan
  • Membuat Animasi Label Awan
  • Membuat border Pada Gambar Posting
  • Membuat Image Header Buatan Sendiri
  • Memasang Icon Pada Post Footer Element
  • Memasang Google Translate Memakai Icon Bendera
  • Kustomisasi Sidebar Title
  • Kode Warna
  • Kode Emotion
  • Daftar ke Search Engine
  • Cara Pasang Shoutmix
  • Cara Menambah Kolom Pada Footer Blog
  • Cara Membuat Tabel di Postingan
  • Cara Membuat Menu di Atas Header
  • Cara Membuat Link
  • Cara Membuat Favicon
  • Cara Memasukan Kode HTML ke Postingan
  • Cara Memasang Search Engine2
  • Cara Memasang Kotak Pencarian
  • Cara Buat Tukeran Banner dan Teks Barnya
  • Belajar Membuat Shoutmix Tersembunyi
  • Alternatif Teks Pada Gambar
  • Buat Blog
  • Berbagai Macam Metode dan Program Dalam Mencari Uang Melalui Blog
  • Apa itu Blog
  • Kurs Valuta Asing

    Harga Emas dan Minyak Dunia


    Today's Birthday

    Sponsor...

    Adsense Indonesia
     
    My Ping in TotalPing.com Computers Blogs Powered by  MyPagerank.Net
    Yahoo bot last visit powered by MyPagerank.Net
    Msn bot last visit powered by MyPagerank.Net



    RUMAH WEB
    Percayakan Web Hosting Anda Hanya Kepada Rumah Web
    http://www.rumahweb.com

    MASTERWEB
    Mau Punya Blog Dengan Domain Sendiri atau Punya Facebook Dengan Domain Sendiri. Hanya 94ribu
    http://masterkey.masterweb.net

    FREE PREMIUM DOMAIN
    Segera Bergabung Untuk Mendapatkan Domain {.com .net .org} -GRATIS-
    www.FreePremiumDomain.com

    000webhost
    Dapatkan FREE WEB Hosting 250Mb
    http://masterkey.masterweb.net
    Foto saya
    ngeblog saat ini sudah menjadi aktivitas yang dilakukan oleh beberapa kalangan termasuk saya, tapi di blog ini, saya hendak berbagi dengan apa yang sudah saya pelajari maupun yang sedang saya pelajari.
    Jump To Top
    Kembali ke atas