Bibliography for Chapter 7 – Danger Lurks in Common Places

7.1 Introduction

  1. Duvall, Addison. “Don’t Be A Troll Magnet: Tips To Minimize Online Harassment.” Hongkiat. 2013. <http://www.hongkiat.com/blog/minimize-online-harassment/>.
  2. Grimes, Roger. “Watch out for Waterhole Attacks — Hackers’ Latest Stealth Weapon.” InfoWorld. 21 May 2013. <http://akamai.infoworld.com/d/security/watch-out-waterhole-attacks-hackers-latest-stealth-weapon-218716>.
  3. Mayer, Caroline. “How To Avoid The Latest Consumer Scams.” Forbes. 20 Aug. 2013. <http://www.forbes.com/sites/nextavenue/2013/08/20/how-to-avoid-the-latest-consumer-scams/>.
  4. Omega, Amigo. “Beware of Fake ‘Like’ and ‘Dislike’ Buttons on Web Pages.” Internet Security for Consumers. 1 Sept. 2013. <http://564738.com/beware-of-fake-like-and-dislike-buttons-on-web-pages/>.
  5. Omega, Amigo. “Research: 80% of Dangerous Websites Are Actually Legitimate Sites.” Internet Security for Consumers. 1 Sept. 2013. <http://564738.com/research-80-of-dangerous-websites-are-actually-legitimate-sites/>.
  6. Wilson, Tim. “End Users Still Don’t Know How To Handle Personal Data, Study Finds.” Dark Reading. 19 July 2012. <http://www.darkreading.com/identity-and-access-management/167901114/security/privacy/240003989/end-users-still-don-t-know-how-to-handle-personal-data-study-finds.html>.

7.2 Perils of Social Networking

  1. Anon. “Fake Facebook Profiles and Pages – the Tools of Scammers, Bullies and Thieves.” Facecrooks. 12 Nov. 2012. <http://facecrooks.com/Scam-Watch/Fake-Facebook-Profiles-and-Pages-the-Tools-of-Scammers-Bullies-and-Thieves.html>.
  2. Anon. “How Raytheon Software Tracks You Online.” Guardian. 10 Feb. 2013. <http://www.guardian.co.uk/world/video/2013/feb/10/raytheon-software-tracks-online-video>.
  3. Biersdorfer, J. D. “Blocking Game Invites on Facebook.” New York Times Gadgetwise. 27 Nov. 2012. <http://gadgetwise.blogs.nytimes.com/2012/11/27/qa-blocking-game-invites-on-facebook/>.
  4. Bradly, Tony. “Facebook Graph Search Is an Awesome Tool for Phishing Attacks.” CSO. 16 Jan. 2013. <http://www.csoonline.com/article/726947/facebook-graph-search-is-an-awesome-tool-for-phishing-attacks>.
  5. Burnham, Kristin. “How to Spot a Social Media Scam.” CIO. 24 Jan. 2013. <http://www.cio.com/slideshow/detail/83339/How-to-Spot-a-Social-Media-Scam>.
  6. Casti, Taylor. “10 Private Social Networks for Discreet Interaction.” Mashable. 10 June 2013. <http://mashable.com/2013/06/10/private-social-networks/>.
  7. Chung, Jackson. “How Thieves Use Social Media To Rob You.” MakeUseOf. 9 July 2013. <http://www.makeuseof.com/tag/how-thieves-use-social-media-to-rob-you/>.
  8. Cifuentes, Jamie. “A Peek At The Future Of Botnet Evolution.” PCMAG. 29 May 2013. <http://securitywatch.pcmag.com/none/309491-a-peek-at-the-future-of-botnet-evolution>.
  9. Cohen, David. “10 Reasons Why Parents Of Preteens Should Deny Them Facebook Accounts.” AllFacebook. 22 Mar. 2013. <http://allfacebook.com/10-reasons-why-parents-of-preteens-should-deny-them-facebook-accounts_b113598>.
  10. Cohen, David. “STUDY: The More People Use Facebook During A Specific Time Period, The Worse They Feel.” AllFacebook. 14 Aug. 2013. <http://allfacebook.com/michigan-study-happiness_b123376>.
  11. Constine, Josh. “After 30M Visitors And Trillions Of Clicks Scanned, Facebook Expands Anti-Virus Marketplace To Mobile.” TechCrunch. 16 Oct. 2012. <http://techcrunch.com/2012/10/16/facebook-mobile-security/>.
  12. Donston-Miller, Debra. “LinkedIn: When To Say No To Connecting.” InformationWeek. 7 June 2013. <https://www.informationweek.com/social-business/social_networking_consumer/linkedin-when-to-say-no-to-connecting/240156227>.
  13. Dube, Ryan. “The LinkedIn Connections You Don’t Want – How Marketers Target You.” MakeUseOf. 1 Aug. 2013. <http://www.makeuseof.com/tag/the-linkedin-connections-you-dont-want-how-marketers-target-you/>.
  14. Eddy, Max. “Secure Password, Exposed Username: Still Recipe for Disaster.” PCMAG. 11 Mar. 2013. <http://securitywatch.pcmag.com/none/309023-secure-password-exposed-username-still-recipe-for-disaster>.
  15. Eddy, Max. “Sex, Lies, and Email From Infants: Inside Social Network Scams.” PCMAG. 19 Mar. 2013. <http://securitywatch.pcmag.com/spam/309341-sex-lies-and-email-from-infants-inside-social-network-scams>.
  16. Ehrenkranz, Melanie. “Facebook Graph Search: What Are The Privacy Issues Of The New Feature?International Digital Times. 8 July 2013. <http://www.idigitaltimes.com/articles/18696/20130708/facebook-graph-search-what-privacy-issues-new.htm>.
  17. Freeman, Kate. “Neighborhood Watch Moves Online With Social Site Nextdoor.” Mashable. 15 Feb. 2013. <http://mashable.com/2013/02/15/social-network-neighborhoods-crime/>.
  18. Gamma, Eagle. “Beware Facebook Friends Who Are Robots Trying to Sell Stuff.” PCWorld. 13 July 2013. <http://www.pcworld.com/article/2044270/beware-facebook-friends-who-are-robots-trying-to-sell-stuff.html>.
  19. Goel, Vindu. “Malicious Software Poses as Video From a Facebook Friend.” Bits Blog. 26 Aug. 2013. <http://bits.blogs.nytimes.com/2013/08/26/malicious-software-poses-as-video-from-a-facebook-friend/>.
  20. Goldman, Jeff. “Shylock Malware Now Spreading via Skype.” ESecurity Planet. 17 Jan. 2013. <http://www.esecurityplanet.com/malware/shylock-malware-now-spreading-via-skype.html>.
  21. Goodchild, Joan. “15 Social Media Scams.” CSO. 20 June 2012. <http://www.csoonline.com/slideshow/detail/52935/15-social-media-scams>.
  22. Kenney, Caitlin. “Another Reason To Watch What You Say On Facebook.” NPR. 30 May 2013. <http://www.npr.org/blogs/money/2013/05/30/187299414/another-reason-to-watch-what-you-say-on-facebook>.
  23. Khongwir, Darinia K. “Social Media Is a Breeding Ground for ID Thefts.” CXO Today. 7 Aug. 2013. <http://www.cxotoday.com/story/social-media-is-a-breeding-ground-for-id-thefts/>.
  24. Kotenko, Jam. “18 Questions You Need to Ask Yourself before Uploading That Photo.” Digital Trends. 8 June 2013. <http://www.digitaltrends.com/social-media/the-fine-art-of-posting-photos-on-the-internet-a-questionnaire/>.
  25. Kotenko, Jam. “How to Put an End to All the Incessant Facebook Games Nonsense.” Digital Trends. 21 July 2013. <http://www.digitaltrends.com/social-media/how-to-put-an-end-to-all-the-incessant-facebook-game-invites/>.
  26. Lafferty, Justin. “How To: Control What Facebook Apps Post On Your Behalf.” All Facebook. 28 Mar. 2013. <http://allfacebook.com/how-to-control-facebook-apps-posts_b114049>.
  27. Lancet, Yaara. “Some Things Should Remain Private: What Not To Share On Facebook.” MakeUseOf. 4 Mar. 2013. <http://www.makeuseof.com/tag/some-things-should-remain-private-what-not-to-share-on-facebook/>.
  28. Lim, Hongkiat. “Five Notorious Facebook Attacks (Learn How To Protect Yourself).” Hongkiat. 2013. <http://www.hongkiat.com/blog/five-facebook-attacks/>.
  29. Munson, Lee. “Another 5 Tips to Help Keep You Safe on Facebook.” Naked Security. 4 Sept. 2013. <http://nakedsecurity.sophos.com/2013/09/04/5-more-tips-to-help-keep-you-safe-on-facebook/>.
  30. Neal, Ryan. “Facebook Virus: Hackers Exploiting Facebook API To Send Malware To NFL, NBA And Real Madrid FC Fans.” International Business Times. 20 June 2013. <http://au.ibtimes.com/articles/480826/20130620/facebook-malware-malicious-links-graph-api-graph-api-explorer-zeus-fake-real-madrid-facebook-groups-.htm>.
  31. Omniquad Security Team. “Facebook Security – Learn How to Spot Scams and Avoid Malware On Facebook.” Omniquad Security Blog. 18 Mar. 2013. <http://omniquadsecurityblog.com/2013/03/18/facebook-security-learn-how-spot-scams-and-avoid-malware-on-facebook/>.
  32. O’Reilly, Dennis. “How to Spot and Avoid Facebook ‘Like’ Scams.” CNET How To. 22 July 2013. <http://howto.cnet.com/8301-11310_39-57594894-285/how-to-spot-and-avoid-facebook-like-scams/>.
  33. Palsule, Mahendra. “10 Twitter Safety Tips To Protect Your Account & Identity.” MakeUseOf. 16 Dec. 2009. <http://www.makeuseof.com/tag/10-twitter-safety-tips-to-protect-your-account-identity/>.
  34. Perry, Jennifer. “How Stalking Has Been Made Easier by the Internet, Mobiles and Social Networks.” Graham Cluley. 13 Sept. 2013. <http://grahamcluley.com/2013/09/internet-mobile-social-networks-stalking/>.
  35. Price, Emily. “Facebook Photos Get Blurry With This Privacy Plug-In.” Mashable. 2 Aug. 2012. <http://mashable.com/2012/08/03/facebook-social-protection-mcafee/>.
  36. Rix, Louis. “Facebook As A Means Of Credit Checking.” AllFacebook. 2 Sept. 2013. <http://allfacebook.com/louis-rix-guest-post_b124434>.
  37. Rubenking, Neil J. “Double-Lock Your Facebook Profile.” PCMAG. 26 June 2013. <http://securitywatch.pcmag.com/security/313078-double-lock-your-facebook-profile>.
  38. Samson, Ted. “Facebook’s Android App Snags Your Mobile Number the Moment You Launch It.” InfoWorld. 28 June 2013. <http://akamai.infoworld.com/t/data-security/facebooks-android-app-snags-your-mobile-number-the-moment-you-launch-it-221822>.
  39. Shubber, Kadhim. “Mapping Websites Reveal Just How Stupid It Is to Geotag Your Tweets.” Wired UK. 4 Sept. 2013. <http://www.wired.co.uk/news/archive/2013-09/04/twitter-geotagging>.
  40. Stanescu, Bianca. “The Ultimate Guide to Secure Your Social Media Account.” HOTforSecurity. 3 Aug. 2013. <http://www.hotforsecurity.com/blog/the-ultimate-guide-to-secure-your-social-media-account-6788.html>.
  41. Szymańska, Julia. “The 4 Sneakiest Facebook Scams.” Avast! Blog. 4 July 2013. <https://blog.avast.com/2013/07/04/the-4-sneakiest-facebook-scams/>.
  42. Webb, Amy. “We Post Nothing About Our Daughter Online.” Slate Magazine. 4 Sept. 2013. <http://www.slate.com/articles/technology/data_mine_1/2013/09/facebook_privacy_and_kids_don_t_post_photos_of_your_kids_online.html>.

7.3 Using Web-mail and E-mail

  1. Allex. “15 Alternatives to Gmail.” CenterNetworks. 23 Dec. 2012. <http://www.centernetworks.com/15-alternatives-gmail/>.
  2. Anon. “Fake Speeding Ticket Emails Carry W32.FakeHddRepair Trojan.” Omniquad Security Blog. 20 May 2013. <http://omniquadsecurityblog.com/2013/05/20/omniquad-warns-fake-speeding-ticket-emails-carry-w32-fakehddrepair-trojan/>.
  3. Anon. “Malware Attacks Occur Every Three Minutes.” Net-Security. 4 Apr. 2013. <http://www.net-security.org/malware_news.php?id=2455>.
  4. Anon. “Overview of Electronic Mail Protection Systems.” MIT Technology Review. 26 Apr. 2013. <http://www.technologyreview.com/view/513991/overview-of-electronic-mail-protection-systems/>.
  5. Burnham, Kristin. “How To Opt Out Of Gmail’s Emailed Ads.” Information Week. 24 July 2013. <https://www.informationweek.com/social-business/email/how-to-opt-out-of-gmails-emailed-ads/240158892>.
  6. Cluley, Graham. “How PDFs Can Infect Your Computer via Adobe Reader Vulnerabilities.” Naked Security. 17 July 2012. <http://nakedsecurity.sophos.com/2012/07/17/adobe-reader-vulnerability-pdf-malware-video/>.
  7. Cluley, Graham. “Warning: Here Are Three Emails You Don’t Want to See in Your Inbox.” Naked Security. 19 Oct. 2012. <http://nakedsecurity.sophos.com/2012/10/19/warning-email/>.
  8. Honorof, Marshall. “How to Avoid Mother’s Day Email Scams.” Mashable. 1 May 2013. <http://mashable.com/2013/05/01/mothers-day-email-scams/>.
  9. Krebs, Brian. “The Value of a Hacked Email Account.” Krebs on Security. 13 June 2013. <http://krebsonsecurity.com/2013/06/the-value-of-a-hacked-email-account/>.
  10. Levin, Adam. “9 Things You Need to Do When Your Email Is Hacked.” Credit Blog. 18 July 2013. <http://blog.credit.com/2013/07/things-to-do-when-your-email-is-hacked/>.
  11. McAllister, Shep. “MailDrop Provides Persistent, No-Frills Burner Email Accounts.” Lifehacker. 6 July 2013. <http://lifehacker.com/maildrop-provides-a-persistent-no-thrills-burner-email-679057303>.
  12. McDowell, Guy. “What Can You Learn From An Email Header (Metadata)?” MakeUseOf. 13 Aug. 2013. <http://www.makeuseof.com/tag/what-can-you-learn-from-an-email-header-metadata/>.
  13. Miller, Tessa. “How Can I Find Out Where an Email Really Came From?” Lifehacker. 23 Aug. 2013. <http://lifehacker.com/how-can-i-find-out-where-an-email-really-came-from-1190061668>.
  14. Omega, Amigo. “Email Account Hacked, What Happens next (a True Story).” Internet Security for Consumers. 19 Nov. 2012. <http://564738.com/email-account-hacked-what-happens-next-a-true-story/>.
  15. Pot, Justin. “Stop Those Annoying Email-based Social Media Notifications With NotifyMeNot.” MakeUseOf. 7 Nov. 2012. <http://www.makeuseof.com/tag/stop-annoying-emailbased-social-media-notifications-notifymenot/>.
  16. Sygula, David. “Underneath E-mails: Dangerous Attachments.” HOTforSecurity. 28 Aug. 2013. <http://www.hotforsecurity.com/blog/underneath-e-mails-dangerous-attachments-6960.html>.
  17. Taylor, Dave. “How Can You Tell If Email Is Spoofed or Legit?AskDaveTaylor. 1 May 2008. <http://www.askdavetaylor.com/how_to_tell_if_email_is_spoofed_or_legit.html>.
  18. Weiss, Aaron. “3 Tips for Securing Email Messages (and Avoiding International Scandal).” ESecurity Planet. 29 Nov. 2012. <http://www.esecurityplanet.com/network-security/3-tips-for-securing-email-messages-and-avoiding-international-scandal.html>.
  19. Wlasuk, Alan. “E-mail Hacks – A Bigger Problem than You Think.” SecurityWeek. 27 July 2012. <http://www.securityweek.com/e-mail-hacks-bigger-problem-you-think>.

7.4 Gaming and Gambling

  1. Rashid, Fahmida Y. “90 Percent of Game Hacks Infected with Malware, AVG Warns.” SecurityWeek. 11 Apr. 2013.  <https://www.securityweek.com/90-percent-game-hacks-infected-malware-avg-warns>.
  2. Rashid, Fahmida Y. “Why Video Game Companies Are Lucrative Targets for Hackers.” SecurityWeek. 12 July 2013.  <https://www.securityweek.com/why-video-game-companies-are-lucrative-targets-hackers>.
  3. Snyder, Craig. “What’s Wrong With Security In Online Gaming?MakeUseOf. 26 July 2013. <http://www.makeuseof.com/tag/whats-wrong-with-security-in-online-gaming/>.

7.5 Sharing files

  1. Omega, Amigo. “Spreading Malware By Torrents.” Internet Security for Consumers. 2 Sept. 2013. <http://564738.com/spreading-malware-by-torrents/>.

7.6 Investing

  1. Grimes, Roger. “Do’s and Don’ts for Online Traders.” InfoWorld. 27 Nov. 2012. <http://akamai.infoworld.com/d/security/dos-and-donts-online-traders-207786>.

7.7 Viewing adult content

Steele, Chandra. “Watch Porn Online? Beware Ransomware.” PCMAG. 15 Jan. 2013.  <http://www.pcmag.com/article2/0,2817,2414319,00.asp>.

7.8 Using the Classifieds

No Citations

7.9 Participating in Auctions

No Citations

7.10 Buying health care products

  1. Anon. “FDA Shuts Down 9,600 Illegal Pharma Websites.” Dark Reading. 28 June 2013. <http://www.darkreading.com/attacks-breaches/fda-shuts-down-9600-illegal-pharma-websi/240157521>.
  2. Boulger, Sean. “What You Need to Know About Obamacare Scams.” The Health Care Blog. 17 July 2013. <http://thehealthcareblog.com/blog/2013/07/17/what-you-need-to-know-about-obamacare-scams/>.

7.11 Seeking debt relief

No Citations

7.12 Finding a date

  1. Jeffries, Adrianne. “Not OK, Cupid: Dating Site Email Security Gaffe Leaves Your Account Wide Open.” The Verge. 20 Aug. 2013. <http://www.theverge.com/2013/8/20/4639934/login-instantly-okcupids-gaping-security-hole-that-gives-full-account-no-password>.
  2. Reid, David. “Blackmail Fraudsters Target Webcam Daters.” BBC News. 14 Sept. 2012. <http://news.bbc.co.uk/2/hi/programmes/click_online/9751569.stm>.

7.13 Finding a job

  1. Cohen, David. “IOS App FaceSaver Enters Facebook Profile Cleansing Sector.” AllFacebook. 21 Feb. 2013. <http://allfacebook.com/facesaver_b111254>.
  2. Henry, Alan. “FaceWash Makes Sure Your Facebook Profile Is Clean and Interview-Ready.” Lifehacker. 25 Jan. 2013. <http://lifehacker.com/5978872/facewash-makes-sure-your-facebook-profile-is-clean-and-interview ready>.
  3. Michmerhuizen, Dave. “Job Offer Spam Preys on the Vulnerable Unemployed.” Barracuda Labs. 10 Aug. 2013. Web. 02 Sept. 2013. <http://barracudalabs.com/?p=3558>.
  4. Rannals, Lee. “Social Media Sites Good For Employers, Bad For Employees.” RedOrbit. 13 July 2013. <http://www.redorbit.com/news/technology/1112897046/social-media-sites-good-employers-bad-employees-071313/>.
  5. Rashid, Fahmida Y. “Zeus Criminals Recruiting Money Mules on CareerBuilder.” PCMAG. 14 June 2013.  <http://securitywatch.pcmag.com/security/312625-zeus-criminals-recruiting-money-mules-on-careerbuilder>.
  6. Sipes, Steven. “Tales from the Darkside: Another Mule Recruitment Site.” RSA Blogs. 16 Apr. 2013. <https://blogs.rsa.com/tales-from-the-darkside-another-mule-recruitment-site/>.

7.14 Using search engines

  1. Ensha, Azadeh. “Swindles and Spam, Lurking in Your Search Results.” New York Times. 22 May 2013. <http://www.nytimes.com/2013/05/23/technology/personaltech/how-to-detect-swindles-and-spam-lurking-in-your-search-results.html?pagewanted=all&_r=2>.
  2. Google/Yandex Search Link Fix.” Mozilla Addons. 2013. <https://addons.mozilla.org/en-US/firefox/addon/google-search-link-fix/>.
  3. Lee, Joel. “What Search Engine Poisoning Is & How It Spreads Malware.” MakeUseOf. 9 Oct. 2012. <http://www.makeuseof.com/tag/what-is-search-engine-poisoning-and-how-it-spreads-malware/>.
  4. Myhrvold, Conor. “Download Me II—Removing the Remnants of the Web’s Most Dangerous Search Terms.” Ars Technica. 25 Aug. 2013. <http://arstechnica.com/information-technology/2013/08/download-me-ii-removing-the-remnants-of-the-webs-most-dangerous-search-terms/>.

7.15 Using voice communications

  1. Cawley, Christian. “3 Skype Security Issues and Threats You Should Know About.” MakeUseOf. 29 Nov. 2013.  <http://www.makeuseof.com/tag/3-skype-security-issues/>.
  2. Rashid, Fahmida Y. “Six Tips to Avoid Text Message Scams on Mobile Phones.PCMAG. 15 Sept. 2012. <http://securitywatch.pcmag.com/none/302736-six-tips-to-avoid-text-message-scams-on-mobile-phones>.

7.16 Following the news

  1. Anon. “LA Times, Salon Hit By Large-Scale Malvertising Campaign.” Infosecurity-magazine. 6 Sept. 2013.  <http://www.infosecurity-magazine.com/view/34391/la-times-saloncom-hit-by-largescale-malvertising-campaign/>.
  2. Cluley, Graham. “Beware! Fake CNN Emails about USA Bombing Syria Spread Malware.” Graham Cluley. 6 Sept. 2013. <http://grahamcluley.com/2013/09/cnn-syria-malware/>.

7.17 Accessing entertainment and education

  1. Anon. “A Closer Look at Zlob Trojans.” Lavasoft. 2013.  <http://www.lavasoft.com/support/spywareeducationcenter/zlobtrojans.php>.