Round-up of bad news on Social networks. (Updated)


-The attackers used social media networks, blogs and email accounts to send out links to Web domains that they controlled.

-When users clicked on the links, the attackers were able to gain control of their computers and retrieve documents from them.

-The use of intermediaries such as Twitter allowed the hackers to cover their tracks so network administrators would not realize the computers had been compromised.

Read more here.

The cyberspies used popular online services, including Twitter, Google’s Google Groups and Yahoo mail, to access infected computers, ultimately directing them to communicate with command and control servers in China, according to the report, “Shadows in the Cloud”.

Read more here.

German anti-Facebook backlash gathers speed.

Possible legal trouble for Facebook

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: