Professional Documents
Culture Documents
Example of attacks :
The scam messages use user name claiming that they watched the video or watched the video.
The phrases in the attack used:
Each link could create random number views or likes. If user accidentally click the link it will
take to a new webpage.
Facebook new security feature has protection attack against scam and spam but it is still
ineffective. Other than Facebook, even Google try to against malicious attack. Google removed
more than 100 applications from Android market which could have malicious software. Malware
was create to hack users information to third party, destroy user data or impersonate the device
owner.
References
Anon., 2015. Facebook hack: Security flaw allows hackers to harvest personal data
using only a phone number. [Online]
Available at: http://www.cityam.com/221907/facebook-hack-security-flaw-allowshackers-harvest-personal-data-using-only-phone-number
[Accessed 15 10 2015].
Anon., 2015. Facebook Responds To Security Vulnerability That May Leave Your
Phone Number Exposed. [Online]
Available at: http://www.ibtimes.com/facebook-responds-security-vulnerability-mayleave-your-phone-number-exposed-2048198
Anon., n.d. Georgia Tech Finds 11 Security Flaws in Popular Internet Browsers Using
New Analysis Method. [Online]
Available at: http://www.cc.gatech.edu/news/434021/georgia-tech-finds-11-securityflaws-popular-internet-browsers-using-new-analysis-method
Anon., n.d. Privacy concerns with social networking services. [Online]
Available at:
https://en.wikipedia.org/wiki/Privacy_concerns_with_social_networking_services#Sex
ual_predators