TITLE

LinkedIn Letting Sharks Into Corporate Waters

PUB. DATE
July 2012
SOURCE
OfficePro;Jul2012, Vol. 72 Issue 4, p4
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers helpful tips to avoid spear phishing attacks in the social networking site LinkedIn. These include using common sense and available tools to avoid being victimized by hackers and connecting only with personally known persons. It also notes avoiding sharing confidential information in website discussions.
ACCESSION #
77785846

 

Related Articles

  • Avoid Identity Theft; Learn How to Recognize Phishing Scam.  // Employee Plans News;2016, Issue 13, p1 

    The article offers tips from the U.S. Internal Revenue Service (IRS) how to prevent or avoid identity theft. It states that the agency introduced the public awareness campaign called Taxes. Security, Together, as part of its Security Summit effort. Tips to determine and avoid a phishing e-mail...

  • Towards an Extra Layer of Security: The Cost of Two-Factor Authentication. Hari Om Prakash // Electronics For You;Mar2015, Vol. 3 Issue 11, p72 

    The article discusses the advantages of two-factor authentication (TFA) including the reduction of incidence of online identify theft, phishing expeditions and other online frauds, and increases the level of security. Disadvantages of TFA include the increase inconvenience to the user when...

  • Surfers beware sharks. King, Agnes; Hutton, Jeffrey // BRW;7/3/2008, Vol. 30 Issue 26, p42 

    The article discusses how banks and credit card companies in Australia are dealing with the sharp increase in so-called phishing websites overseas that are dedicated to stealing personal information. It describes how phishing scams work and the risks being posed by online fraud to lenders and...

  • Kaspersky Lab Anti-Phishing Module.  // Database & Network Journal;Oct2007, Vol. 37 Issue 5, p25 

    The article reflects on Kaspersky Lab's anti-phising module. According to the report, Kaspersky Lab announces that anti-phising databases provided by the Phish Tank service have been incorporated into the Anti-Phishing module of Kaspersky Internet Security 7.0. The system offers a consolidated...

  • Fighting Phishing with Discriminative Keypoint Features. Kuan-Ta Chen; Chun-Rong Huang; Chu-Song Chen; Jau-Yuan Chen // IEEE Internet Computing;May/Jun2009, Vol. 13 Issue 3, p56 

    Phishing is a form of online identity theft associated with both social engineering and technical subterfuge and is a major threat to information security and personal privacy. Here, the authors present an effective image-based antiphishing scheme based on discriminative keypoint features in Web...

  • Deceptive spam puts banks on the defensive. Solnik, Claude // Long Island Business News (7/1993 to 5/2009);1/27/2006, Vol. 53 Issue 4, p3B 

    The article describes strategies used by banks in the United States to protect online banking customers from identity theft, fraud and phishing. Bank of America has added an extra guard to its password system. Corillian Corp. provides access signature control systems. The Federal Deposit...

  • IRS committed to working with taxpayers who are the victims of identity theft.  // Jackson Advocate;2/9/2012, Vol. 74 Issue 17, p7B 

    The article reports on the efforts of U.S. Internal Revenue Service (IRS) in preventing online identity theft and fraud incidents.

  • Scared of identity thieves? Quinn, Jane Bryant // Good Housekeeping;Feb2006, Vol. 242 Issue 2, p92 

    The article offers information on how to prevent identity theft. It advises to rip financial records before disposing them and destroy the blank checks that come with solicitations for loans and credit cards. It is also important to take everything in the wallet that has the number printed on it...

  • i-Sprint Innovations.  // NetworkWorld Asia;Jun/Jul2016, Vol. 13 Issue 1, p16 

    The article provides information on the digital identity and identity of things (IDoT) product offerings of i-Sprint Innovations, a premier identity, credential and access management solutions provider and winner of the Best Identity & Authentication Management category at the Network World...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics