As we have already shown in the latest
issue of our E-Treats Landscape Report (H1 2009), Web 2.0 applications in
general and social networking applications in particular are no longer just
some friendly platforms for sharing news about the most recent project one
could have, but also the ideal place for data and identity theft.
These days’ attempts no longer focus to purloin valuable information about the user and his or her account. Pictures, e-cards and photo streams seem to be the preferred target of the e-larcenists, as proven by the hijacked family Christmas card employed for a grocery commercial or the stolen picture of a baby used in a fraudulent scheme for an alleged adoption.
tags
I rediscovered "all that technical jazz" with the E-Threat Analysis Team at Bitdefender, the creator of one of the industry's most effective lines of internationally certified security software.
View all postsNovember 14, 2024
September 06, 2024