We all know that LinkedIn was hacked and lost at least 6.5 million hashed passwords, or at least that’s how many were was posted. Besides changing passwords, is anyone thinking about their LinkedIn lock-down/security settings? What about other social media? See further below instructions for locking down LinkedIn, Facebook, Twitter, and Google+.
Tag Archives: Facebook
Your Social Media Data is Business Data
An Information Week article, From CRM to Social, noted that companies consider data mined from social media as business data. Basically, companies are supplementing their customer relationship management (CRM) database with the personal data from social networks. Consider these points:
If you don’ read anything else, see the quote in red below from the Guess CIO.
Filed under Security, Technology
WordPress Hacked, Attackers Gain Root
On 4/13/11, WordPress announced it suffered a root-level hack of their servers and that “anything on those servers could have been revealed.”
Nothing is said about WHEN the hack occurred. From experience, I can tell you that you generally don’t announce a security incident until you’ve investigated it thoroughly, and that can take at least a day, sometimes more, depending on whether you have experts in-house or can get them in a hurry.
This attack directly affects only blogs or accounts hosted by WordPress (in other words, your blog URL ends with “wordpress.com”. If you host your own WordPress blog, you are indirectly affected. How? Since WordPress source code may have been compromised, attackers may be combing through it to find vulnerabilities that will allow them to attack any blog running WordPress, regardless of where it’s hosted.
If you have a blog or account that is hosted at wordpress.com, at least do the following immediately:
Not Your Father’s Social Network Risks?
You might remember the commercial that said, “This isn’t your father’s Oldsmobile,” meaning this car is nothing like the one your father drives. It’s faster, more luxurious, more YOU.
Have you noticed that the opposite is true regarding the hype over social networking and the risk it brings to your business and a computer near you? In other words, to quote an old king, “There is nothing new under the sun.”
Filed under Security
Quote of the Weak (Unqualified Opinion)
Some people do not understand that both diamonds and the Internet are forever. I found this statement in a discussion on LinkedIn:
I am excited about 2 interviews next week even though I’m not fully qualified for either one.
Filed under Employment, Humor/Irony, Quote of the Weak, Security
Share credit card purchases on the web?
On Facebook, you can share your pictures; on LinkedIn, you can share your resume; on Twitter, you can share what you had for second breakfast.
On Blippy, you can share your credit card purchases!
Filed under Security
Virtual Relationships
I find it interesting that many of us spend a lot of time on in virtual relationships.
We live and share on blogs, forums, Twitter, Facebook, LinkedIn, and the like, learning about various subjects, getting to know others better, and building relationships (currently called friends, connections, followers, or contacts).
Many of the people we relate to over the Internet are people who are quite distant from us, who we seldom or never see, and whose gender and age are sometimes vastly different from what they represent.
Filed under Technology
I’m out of town!
When I joined LinkedIn, it was because it was BUSINESS-like and so un-Facebook. As much as I like LinkedIn, it is becoming too much like Twitter and Facebook. Or perhaps it is more accurate to say that LinkedIn features are being used in the same casual manner.
Filed under Security
15 Must-See Sights in Google Earth
Diann Daniel’s
15 pictures from Google Earth(GE) showcases the power of GE, and the images are indeed interesting. NOTE: Evidently these pics were removed – Mack
Seven images show the Firefox browser circle cut into a crop field (UFO style) and other large-scale animals and objects. The slide show includes commentary and the coordinates of each image. If you’re in a hurry, I recommend images 5 through 10.
Filed under Humor/Irony, Security, Written by Skyyler