Showing posts with label Internet. Show all posts
Showing posts with label Internet. Show all posts

Tuesday, October 11, 2011

Soome Few Ways Job Seekers Harm Themselves

The IT job market is improving, & CIOs are once again looking to hire permanent, full-time IT staff. But because the labor market is saturated with IT pros looking for work, IT hiring managers are being choosey, say IT staffing industry experts.

Make one mistake on your resume, & you can forget about being called for an interview. Fail to impress during the job interview, & the hiring manager may cut your meeting short. Go dark on a prospective employer after a job interview, & you can kiss your chances of getting a job offer good-bye. Yes, my friends, the stakes are that high.

Experienced & inexperienced job seekers alike make mistakes before, during & after job interviews that can sink their chances of landing a new job. Tracy Cashman, partner & general manager of the information technology group at staffing firm Winter Wyman, says she has seen candidates get eliminated in the past month for making such mistakes as speaking ill of a previous employer & asking about vacation & benefits too soon.

Most of the missteps job seekers make are common & can easily be avoided with a dose of common sense or preparation. Here are seven ways job seekers self-destruct.

1. They lie about their qualifications. If anything will kill your chances of getting a job, it's lying, whether on your resume or in a job interview, whether about your skills, employment history or educational background. [Lying on a resume will get caught on a background check, says Cashman. "We had a candidate, a fresh graduate, lie about their GPA, & the employer rescinded the offer.]

2. They come to the job interview unprepared. Todd Collier, a director with IT recruiting firm Eliassen Group, says his firm spends time prepping candidates for job interviews. He says Eliassen briefs candidates on the project they'll be working on, the employer's business & culture, & the manager's needs & style so that the candidate knows how to sell him or herself during the job interview. [People miss out on job offers when they don't fully understand the company's needs, he says. Adds Cashman, It's so easy to do [research on an employer] these days that if you walk in without knowing basic information about the company, you just look stupid or like you're not interested in the job.]

3. They're negative. Having a negative attitude or speaking ill of a former employer is a common mistake job seekers make during job interviews. It's one that Sam Aruti, managing director of DIBJ Enterprises, made in the past when he was looking for a job, & it cost him an offer.

When a job seeker speaks poorly of a past employer, prospective employers wonder how long it will be before the job seeker begins denouncing them, says Cashman. It also causes employers to worry whether the candidate will ever be satisfied.

Cashman advises job seekers to use caution when speaking about their reasons for leaving an employer, which can easily come across as negative. State one reason & keep the explanation brief.

4. They don't ask the right questions. Job seekers who ask informed, specific questions about the job or the employer during the interview impress hiring managers. [It is always nice to hear people ask questions that are relevant to the company,] says Aruti, speaking as a hiring manager.

Even if every question you could ever want to ask has been answered during the interview, have two more questions, adds Cashman. Otherwise, you look uninterested in the job, & it leaves the hiring manager on edge. Good questions are definitely seen as the sign of a good candidate.

But don't ask about vacation time or benefitsat least not during the first interview. Aruti & Cashman say doing so makes hiring managers think benefits are all you care about, so they won't take you seriously & you'll quickly get passed up for the next candidate.

As someone who'd been out of a job for such a long time, if you have a job opportunity in this economy, focus on job rather than on 'what is in it for me, advises Aruti.

5. They're slow. Aruti always walks with IT professionals he interviews for jobs to see if they can keep up with him. He doesn't hire anyone who can't. People who are slow on their feet will likely be slow on the job. It's a lesson he learned years ago from a former manager who told him not to hire someone who didn't walk right, he says.

6. They don't close the interview. Eliassen's Collier compares job interviews to sales calls. Just as sales professionals work toward closing a sale during a meeting with a prospective client, job seekers should work toward closing a job interview, he says. They can close job interviews in a couple of ways: Either by asking if the hiring manager has any other questions about their background, or if the hiring manager gives the last word to the candidate, the candidate should take the opportunity to reiterate why he or she is an excellent fit for the job & the company.

Ask if the hiring manager has any other questions about their background as it relates to the job opportunity, says Collier. Is there any reason you don't think I'd be a fit for this opportunity? Then, they can expand upon it & position themselves for the opportunity.

7. They go dark. Not following up with a prospective employer after a job interview can be fatal. It sends the message that you're not interested in the job. So at the very least, send a thank-you note after the interview, advises Cashman. It can set you apart, she adds, because most people do not send them.

Though some hiring managers appreciate old-fashioned, hand-written thank-you notes, your best bet is to send a well-written one via e-mail. If an employer is in a rush to fill a position & faced with two equally qualified candidates, delivering a thank-you note quickly via e-mail could make all the difference, as a decision may have to be made before the mailed thank-you note arrives. Cashman has seen it happen.

Responding too slowly to a job offer also sends the wrong signal to a prospective employer, according to executive search firm Korn/Ferry International. They employer might think that the candidate is getting cold feet or has completely lost interest in the job.

Of course, job seekers need time to evaluate offers. They should state up front, upon receiving the offer, that they need time to think about it, & how much time they will need. Candidates can ask for a day to a week to make a decision, depending on the complexity of the offer, the job seeker's career level, & the employer's timeframe.

Job fields are growing up for class of 2012

Now Job fields are growing up.
Jobs are looking up for the class of 2012!!


Employers surveyed by the National Association of Colleges & Employers (NACE) say they plan to hire 9.5 percent more graduates from the class of 2012 than they did from the class of 2011.

Salary offers for recent college grads also continue to inch higher. Students landing jobs from this year's class will be paid more, on average, than the class of 2010. The NACE Fall 2011 Salary Survey shows that this year's class of graduates will make, on average, about 6 percent more than last year's graduates, from just over $48,000 to just over $51,000.

Students earning engineering degrees have seen some of the highest salary offers. As a group, the average salary offered to engineering majors rose 2.8 percent from last year's average, to $60,291. The average salary offered to petroleum engineering graduates grew 7.1 percent to $82,740, making it the highest-paid major, according to the report.

If you're still in college & looking to get a leg up on the competition, another NACE survey reveals that paid interns had the most success attracting job offers in 2011. "Class of 2011 graduates who took part in a paid internship were more likely to get a job offer, have a job in hand by the time they graduated, & receive a higher starting salary offer than their peers who undertook an unpaid internship or no internship at all," according to a NACE press release. More than 61 percent of students who took part in paid internships in the for-profit sector received a job offer.

Many of the openings for the class of 2012 are for "replacement hires," new employees brought in to fill the roles of existing employees who are leaving. In the report, employers expressed the greatest interest in graduates who majored in business, engineering, & tech-related subjects.

Two companies with extensive hiring plans, mostly based on new hires & not on attrition, are accounting firm Ernst & Young & Enterprise Rent-A-Car.

Ernst & Young began a hiring campaign in July, in which it plans to hire 9,000 students from throughout the Americas. Some 5,200 of those hires will come from U.S. campuses. The company plans to hire for a mix of full-time positions (3,000 graduates) & interns (2,200) in the United States alone. This year marks a the first that Ernst & Young's campus hiring level has reached its per-recession highs. "There are a wide range of opportunities that are available," says Dan Black, director of campus recruiting for the Americas at Ernst & Young. He says the company is actively recruiting at about 200 college campuses throughout the Americas.

Car rental company Enterprise is also back to hiring levels in line with it is per-recession efforts. Marie Artim, Enterprise's senior vice president of talent acquisition, says the company plans to hire about 8,500 college graduates for its management training program for the fiscal year starting in August 2011. Artim says Enterprise generally promotes from within the company, & that many company executives, including herself, started in the management training program. [That is really the one way into the company is through our management training program,] Artim says. From there, it is our pipeline to our management path & our future leadership.

Saturday, October 8, 2011

Facebook Marketing uncoverd, unparalle, Tricks & tips, Book & videos!!!

Did you know? There are 500 million potential customers for your product or service – ALL in one spot - & they're waiting for you.

Have you tapped into them yet? Many marketers see Facebook as a giant waste of time, & they don't realize that they are missing out on a huge marketplace. But Facebook has over 500 million active users & accounts for something like 35% of all Internet traffic.

With [Facebook Marketing Uncovered] you'll discover:

* How to use Facebook, step by step
* What marketing methods work on Facebook & which ones don’t
* How to find products to sell if you don’t have your own
* How to use fan pages for maximum profit
* Why groups are useful & when you want to use them
* How to use Facebook advertising for profit
* & much, much more
Download link will be coming very soon....

Thursday, October 6, 2011

Apple founder, Steve Jobs, passed away on Wednesday [October 5]

Apple founder, Steve Jobs, passed away on Wednesday [October 5] at the age of 56, succumbing to pancreatic cancer.

The company announced his death this week. However, did not give any specific cause.

We are deeply saddened to announce that Steve Jobs passed away today, the company said in a brief statement. Steve's brilliance, passion & energy were the source of countless innovations that enrich & improve all of our lives. The world is immeasurably better because of Steve.

Jobs had been diagnosed with a rare form of pancreatic cancer called pancreatic neuroendocrine cancer. While those suffering can live as long as 20 years with the disease, it obviously wasn't the case with the Apple visionary.

His cancer eventually spread to his liver, so he was forced to have a liver transplant in 2009 & took an extended medical leave from Apple last January.

Even after a liver transplant, the cancer can recur, which may have been what happened in Jobs' case.

Jobs started Apple with a high school friend in a Silicon Valley garage in 1976, but 10 years later, he was forced out of the company. Eventually, in 1997, he returned to rescue the company he helped build. During his second stint, it grew into the most valuable technology company in the world with a market value of $351 billion.

He's responsible for inventing & masterfully marketing ever-sleeker gadgets that transformed everyday technology, from the personal computer to the iPod & iPhone.

Jobs is survived by his wife Laurene, whom he has two daughters & a son with. He also has another daughter from a previous relationship.

Young Steve Jobs
His death became a trending topic on Wednesday, drawing actions from Apple fans, as well as celebrities & political figures.

Steve was among the greatest of American innovators -- brave enough to think differently, bold enough to believe he could change the world, & talented enough to do it, said President Obama in a statement. Steve was fond of saying that he lived every day like it was his last. Because he did, he transformed our lives, redefined entire industries, & achieved one of the rarest feats in human history: he changed the way each of us sees the world.

I'm truly saddened to learn of Steve Jobs' death, said Microsoft founder, Bill Gates. Melinda & I extend our sincere condolences to his family & friends, & to everyone Steve has touched through his work. Steve & I first met nearly 30 years ago, & have been colleagues, competitors & friends over the course of more than half our lives. The world rarely sees someone who has had the profound impact Steve has had, the effects of which will be felt for many generations to come. For those of us lucky enough to get to work with him, it's been an insanely great honor. I will miss Steve immensely.

Wednesday, October 5, 2011

Tags Added in HTML5 and Sitepoint - HTML5 & CSS3 for the Real World

Free Download

Tag Description Covered in Chapter
<article> Defines an article 11
<audio> Defines sound content 15
<canvas> Defines graphics 16
<command> Defines a command button 14
<datagrid> Defines data in a tree-list 14
<datalist> Defines a drop-down list 14
<datatemplate> Defines a data template 14
<details> Defines details of an element
<dialog> Defines a dialog (conversation)
<embed> Defines external interactive content or plug-in 16
<eventsource> Defines a target for events sent by a server 16
<figure> Defines a group of media content, and their caption 9
<footer> Defines a footer for a section or page 11
<header> Defines a header for a section or page 11
<mark> Defines marked text
<meter> Defines measurement within a predefined range
<nav> Defines navigation links 10
<nest> Defines a nestingpoint in a datatemplate 14
<output> Defines some types of output
<progress> Defines progress of a task of any kind
<rule> Defines the rules for updating a template
<section> Defines a section 11
<source> Defines media resources 15
<time> Defines a date/time
<video> Defines a video 15


Monday, October 3, 2011

Criminals target mobile devices & social networks !

Smartphones & social networking sites are likely to become the next big target for cyber criminals, according to a security industry report.

Symantec's annual threat analysis warns that the technologies are increasingly being used to spread malicious code.

Users of Facebook, Twitter & Google's mobile operating system, Android, are said to be particularly vulnerable.

However, the number of attacks remains small compared to other online crimes such as e-mail phishing.

According to Symantec, known vulnerabilities in mobile operating systems rose from 115 in 2009 to 163 in 2010.

In several cases, the security holes were exploited & used to install harmful software on Android handsets - suggesting that criminals now view smartphone hacking as a potentially lucrative area .

At least six different varieties of malware were discovered hidden in applications that were distributed through a Chinese download service.

"It is something we have started to see happen, albeit on a small level," said Orla Cox, security operations manager at Symantec.

"It allows people to do a variety of things from intercepting SMS messages to dialling toll numbers. They have opened up the possibility of what is there."

Several pieces of malware were also found on iPhones, however only devices that had been "jailbroken" to bypass Apple's security were affected.

The company's process of pre-vetting all new applications is believed to have spared its devices from a major attack.

Rogue applications

On Facebook & Twitter, Symantec's analysis highlighted several different types of threat.

Among the most prevalent were web links that encourage users to click through to other sites containing malware & rogue applications, designed to collect personal information.

The company estimates that one in six links posted on Facebook pages are connected to malicious software.

User information is said to be particularly valuable in "social engineering" attacks, where criminals use knowledge of an individual to trick them into scams that appear to relate to them personally.

Attack toolkits

Symantec makes its money selling internet security software & services to individuals & corporations

Its annual Internet Security Threat Report - based on data supplied by users around the world - is generally regarded as a reliable measure of changing trends in cyber crime.

Globally, the company recorded a 93% increase in the volume of web-based attacks between 2009 & 2010.

The dramatic rise was largely attributed to the widespread availability of "attack toolkits" - software packages that allow users with relatively little skill to design their own malicious software.

Toolkits are available to buy online for as little as a few pounds & as much as several thousand for the latest versions.

The most popular attack kit was Phoenix, which exploits vulnerabilities in the Java programming language - commonly used for web-based applications.

Symantec's report also notes a rise in the number of targeted attacks, where specific companies, organisations or individuals are singled out.

The most sensational targeted attack of 2010 was undoubtedly Stuxnet. The software worm was designed to take control of mechanical systems used in Iran's nuclear plants.

It has been widely speculated that the USA or Israel may have played a role in its creation.

Despite Stuxnet's headline-grabbing nature, Orla Cox believes that it may not be indicative of things to come.

"It was interesting to see that it is possible to attack physical systems. I think it unlikely that we will see a whole slew of attacks of that nature," she said.

Criminals target mobile devices & social networks !

Smartphones & social networking sites are likely to become the next big target for cyber criminals, according to a security industry report.

Symantec's annual threat analysis warns that the technologies are increasingly being used to spread malicious code.

Users of Facebook, Twitter & Google's mobile operating system, Android, are said to be particularly vulnerable.

However, the number of attacks remains small compared to other online crimes such as e-mail phishing.

According to Symantec, known vulnerabilities in mobile operating systems rose from 115 in 2009 to 163 in 2010.

In several cases, the security holes were exploited & used to install harmful software on Android handsets - suggesting that criminals now view smartphone hacking as a potentially lucrative area .

At least six different varieties of malware were discovered hidden in applications that were distributed through a Chinese download service.

"It is something we have started to see happen, albeit on a small level," said Orla Cox, security operations manager at Symantec.

"It allows people to do a variety of things from intercepting SMS messages to dialling toll numbers. They have opened up the possibility of what is there."

Several pieces of malware were also found on iPhones, however only devices that had been "jailbroken" to bypass Apple's security were affected.

The company's process of pre-vetting all new applications is believed to have spared its devices from a major attack.

Rogue applications

On Facebook & Twitter, Symantec's analysis highlighted several different types of threat.

Among the most prevalent were web links that encourage users to click through to other sites containing malware & rogue applications, designed to collect personal information.

The company estimates that one in six links posted on Facebook pages are connected to malicious software.

User information is said to be particularly valuable in "social engineering" attacks, where criminals use knowledge of an individual to trick them into scams that appear to relate to them personally.

Attack toolkits

Symantec makes its money selling internet security software & services to individuals & corporations

Its annual Internet Security Threat Report - based on data supplied by users around the world - is generally regarded as a reliable measure of changing trends in cyber crime.

Globally, the company recorded a 93% increase in the volume of web-based attacks between 2009 & 2010.

The dramatic rise was largely attributed to the widespread availability of "attack toolkits" - software packages that allow users with relatively little skill to design their own malicious software.

Toolkits are available to buy online for as little as a few pounds & as much as several thousand for the latest versions.

The most popular attack kit was Phoenix, which exploits vulnerabilities in the Java programming language - commonly used for web-based applications.

Symantec's report also notes a rise in the number of targeted attacks, where specific companies, organisations or individuals are singled out.

The most sensational targeted attack of 2010 was undoubtedly Stuxnet. The software worm was designed to take control of mechanical systems used in Iran's nuclear plants.

It has been widely speculated that the USA or Israel may have played a role in its creation.

Despite Stuxnet's headline-grabbing nature, Orla Cox believes that it may not be indicative of things to come.

"It was interesting to see that it is possible to attack physical systems. I think it unlikely that we will see a whole slew of attacks of that nature," she said.

Samaritans Help Troubled Facebook Users......!!!

The Samaritans & Facebook are teaming up to allow users to get help for friends they think might be having serious problems.

Facebook has 30 million users in the UK & anyone concerned about people struggling to cope or with possible suicidal thoughts will be able to get help through the Help Centre.

The feature enables users to report specific content, like status updates or wall posts.

For instance, typing the word "worried" into the help centre search engine will bring up a list of places to find advice as well as the option to report suicidal content.

Once a report about suicidal content has been processed, the distressed person will be sent a message with information on how they can contact the Samaritans if they need help.

Samaritans cheif executive Catherine Johnstone said: "We want to remind people that if a friend says that life isn't worth living, they should always be taken seriously.

"Facebook is a part of daily life for so many of us & we must make sure that people online have support when they need it."
By - Lulu

Samaritans Help Troubled Facebook Users......!!!

The Samaritans & Facebook are teaming up to allow users to get help for friends they think might be having serious problems.

Facebook has 30 million users in the UK & anyone concerned about people struggling to cope or with possible suicidal thoughts will be able to get help through the Help Centre.

The feature enables users to report specific content, like status updates or wall posts.

For instance, typing the word "worried" into the help centre search engine will bring up a list of places to find advice as well as the option to report suicidal content.

Once a report about suicidal content has been processed, the distressed person will be sent a message with information on how they can contact the Samaritans if they need help.

Samaritans cheif executive Catherine Johnstone said: "We want to remind people that if a friend says that life isn't worth living, they should always be taken seriously.

"Facebook is a part of daily life for so many of us & we must make sure that people online have support when they need it."
By - Lulu

Bad spelling opens up security loopholes...

Facebook has paid $5000 to those who found the biggest security holes in its site. & has spent $40,000 (£25,000) in the first 21 days of a program that rewards the discovery of security bugs.

The bug bounty program aims to encourage security researchers to help harden Facebook against attack.

One security researcher has been rewarded with more than $7,000 for finding six serious bugs in the social networking site.

The program runs alongside Facebook's efforts to police the code it creates that keeps the social site running.

A blog post by Facebook chief security officer Joe Sullivan revealed some information about the early days of the bug bounty program.

He said the program had made Facebook more secure by introducing the networking site to "novel attack vectors, & helping us improve lots of corners in our code".

The minimum amount paid for a bug is $500, said Mr Sullivan, up to a maximum of $5000 for the most serious loopholes. The maximum bounty has already been paid once, he said.

Many cyber criminals & vandals have targeted Facebook in many different ways to extract useful information from people, promote spam or fake goods.
Continue reading the main story
“Start Quote

It's hardly surprising that the service is riddled with rogue apps & viral scams”

Graham Cluley Sophos

Mr Sullivan said Facebook had internal bug-hunting teams, used external auditors to vet its code & ran "bug-a-thons" to hunt out mistakes but it regularly received reports about glitches from independent security researchers.

Facebook set up a system to handle these reports in 2010 which promised not to take legal action against those that find bugs & gave it chance to assess them.

Paying those that report problems was the logical next step for the disclosure system, he said.

Graham Cluley, senior technology consultant at Sophos, said many other firms, including Google & Mozilla, run similar schemes that have proved useful in rooting out bugs.

However, he said, many criminally-minded bug spotters might get more for what they find if they sell the knowledge on an underground market.

He added that the bug bounty scheme might be missing the biggest source of security problems on Facebook.

"They're specifically not going to reward people for identifying rogue third party Facebook apps, clickjacking scams & the like," he said. "It's those sorts of problems which are much more commonly encountered by Facebook users & have arguably impacted more people."

Facebook should consider setting up a "walled garden" that only allowed vetted applications from approved developers to connect to the social networking site, he said.

"Facebook claims there are over one million developers on the Facebook platform, so it's hardly surprising that the service is riddled with rogue apps & viral scams," he said.

Bad spelling opens up security loopholes...

Facebook has paid $5000 to those who found the biggest security holes in its site. & has spent $40,000 (£25,000) in the first 21 days of a program that rewards the discovery of security bugs.

The bug bounty program aims to encourage security researchers to help harden Facebook against attack.

One security researcher has been rewarded with more than $7,000 for finding six serious bugs in the social networking site.

The program runs alongside Facebook's efforts to police the code it creates that keeps the social site running.

A blog post by Facebook chief security officer Joe Sullivan revealed some information about the early days of the bug bounty program.

He said the program had made Facebook more secure by introducing the networking site to "novel attack vectors, & helping us improve lots of corners in our code".

The minimum amount paid for a bug is $500, said Mr Sullivan, up to a maximum of $5000 for the most serious loopholes. The maximum bounty has already been paid once, he said.

Many cyber criminals & vandals have targeted Facebook in many different ways to extract useful information from people, promote spam or fake goods.
Continue reading the main story
“Start Quote

It's hardly surprising that the service is riddled with rogue apps & viral scams”

Graham Cluley Sophos

Mr Sullivan said Facebook had internal bug-hunting teams, used external auditors to vet its code & ran "bug-a-thons" to hunt out mistakes but it regularly received reports about glitches from independent security researchers.

Facebook set up a system to handle these reports in 2010 which promised not to take legal action against those that find bugs & gave it chance to assess them.

Paying those that report problems was the logical next step for the disclosure system, he said.

Graham Cluley, senior technology consultant at Sophos, said many other firms, including Google & Mozilla, run similar schemes that have proved useful in rooting out bugs.

However, he said, many criminally-minded bug spotters might get more for what they find if they sell the knowledge on an underground market.

He added that the bug bounty scheme might be missing the biggest source of security problems on Facebook.

"They're specifically not going to reward people for identifying rogue third party Facebook apps, clickjacking scams & the like," he said. "It's those sorts of problems which are much more commonly encountered by Facebook users & have arguably impacted more people."

Facebook should consider setting up a "walled garden" that only allowed vetted applications from approved developers to connect to the social networking site, he said.

"Facebook claims there are over one million developers on the Facebook platform, so it's hardly surprising that the service is riddled with rogue apps & viral scams," he said.

Facebook calls on web security firm to combat malware

Users will be warned not to follow links posted on the site which lead to locations known to harbour malware

Facebook has struggled to stem an increase in opportunist scams. Photograph: Dale O'Dell / Alamy/Alamy

Facebook has hired a leading web security firm to help combat a continuing rise in malware on the social network in the past year.

Users of the world's biggest social network will be warned not to follow links posted on the site which lead to locations known to harbour malware, as part of the partnership with US security firm Websense.

Another web security firm, Symantec, said in its annual report in April that malicious links accounted for two-thirds of all shortened links on social networks in 2010, & that almost nine in 10 of them had been clicked at least once.

While Facebook has grown exponentially, it has also struggled to stem an increase in opportunist scams that target the site's 800 million users. Attacks range from tricking users into revealing their password to more serious attempts to extort money from people using plausible-sounding email addresses via information gleaned from their profile pages.

One of the biggest threats on Facebook is shortened links that could unwittingly take users to websites that could infect their computers with viruses. Websense says it will vet out shortened links that hide viruses in "real time", warning users against visiting the site if it is harmful.

"Facebook cares deeply about protecting users from potentially malicious content on the internet," said Dan Rubinstein, Facebook's product manager for site integrity. "We are excited about our partnership with Websense to provide industry leading tools to help our users protect themselves."

The security firm Sophos reported in July that Facebook was increasingly seen as the "biggest risk" online among users, with 81% of survey respondents voting for the website, up from 60% in 2010. Twitter & Myspace received 8% of the votes in the same study.

Graham Cluley, senior technology consultant at Sophos, told the Guardian the partnership was not a "significant change of direction" by Facebook, & said his firm sees "a lot of malicious activity" there.

"Certainly I think there's room for Facebook to improve when it comes to fighting spammy & malicious links," he said. "The likes of [Google's] Gmail, [Microsoft's] Hotmail & Yahoo do a pretty good job at blocking most of the spam in the first place – so it would be good to see Facebook offer a similarly mature approach to the problem. One challenge for Facebook is they have a very laissez-faire attitude to what goes on on their network.

"For instance, anyone can become a Facebook developer & apps are not vetted, which is one avenue for criminals to earn income & access users' personal information."

In May, Facebook announced a similar partnership with the online security firm Web of Trust, whose chief executive Vesa Perala told the Guardian: "Websense work on the traditional technical security, which is quite different compared to what we are doing."

She added: "We know that Facebook is using multiple sources for different purposes. According to my understanding they have two major data providers: McAfee on the anti-virus area & [Web of Trust] in the area of reputation & trustworthiness but are using 'bits & pieces' from other sources as well.

"WOT [Web of Trust] is unique as we combine data from trusted sources (including multiple anti-virus companies & other organisations fighting cyber crime) with real experiences from real users (WOT community of over 25 million users), who rate websites using our safe surfing tools."

Carl Leonard, senior manager of security research at Websense, described Web of Trust as a "very different" system to the real-time Websense technology, which will be integrated into the site from Monday.

He said: "[Web of Trust] is a community-powered free protection system. Users of the tool essentially rate websites in how safe they think they are ... Websense uses the most advanced data identification, content classification, & security filtering available to lessen risks to customer data & productivity."

Facebook calls on web security firm to combat malware

Users will be warned not to follow links posted on the site which lead to locations known to harbour malware

Facebook has struggled to stem an increase in opportunist scams. Photograph: Dale O'Dell / Alamy/Alamy

Facebook has hired a leading web security firm to help combat a continuing rise in malware on the social network in the past year.

Users of the world's biggest social network will be warned not to follow links posted on the site which lead to locations known to harbour malware, as part of the partnership with US security firm Websense.

Another web security firm, Symantec, said in its annual report in April that malicious links accounted for two-thirds of all shortened links on social networks in 2010, & that almost nine in 10 of them had been clicked at least once.

While Facebook has grown exponentially, it has also struggled to stem an increase in opportunist scams that target the site's 800 million users. Attacks range from tricking users into revealing their password to more serious attempts to extort money from people using plausible-sounding email addresses via information gleaned from their profile pages.

One of the biggest threats on Facebook is shortened links that could unwittingly take users to websites that could infect their computers with viruses. Websense says it will vet out shortened links that hide viruses in "real time", warning users against visiting the site if it is harmful.

"Facebook cares deeply about protecting users from potentially malicious content on the internet," said Dan Rubinstein, Facebook's product manager for site integrity. "We are excited about our partnership with Websense to provide industry leading tools to help our users protect themselves."

The security firm Sophos reported in July that Facebook was increasingly seen as the "biggest risk" online among users, with 81% of survey respondents voting for the website, up from 60% in 2010. Twitter & Myspace received 8% of the votes in the same study.

Graham Cluley, senior technology consultant at Sophos, told the Guardian the partnership was not a "significant change of direction" by Facebook, & said his firm sees "a lot of malicious activity" there.

"Certainly I think there's room for Facebook to improve when it comes to fighting spammy & malicious links," he said. "The likes of [Google's] Gmail, [Microsoft's] Hotmail & Yahoo do a pretty good job at blocking most of the spam in the first place – so it would be good to see Facebook offer a similarly mature approach to the problem. One challenge for Facebook is they have a very laissez-faire attitude to what goes on on their network.

"For instance, anyone can become a Facebook developer & apps are not vetted, which is one avenue for criminals to earn income & access users' personal information."

In May, Facebook announced a similar partnership with the online security firm Web of Trust, whose chief executive Vesa Perala told the Guardian: "Websense work on the traditional technical security, which is quite different compared to what we are doing."

She added: "We know that Facebook is using multiple sources for different purposes. According to my understanding they have two major data providers: McAfee on the anti-virus area & [Web of Trust] in the area of reputation & trustworthiness but are using 'bits & pieces' from other sources as well.

"WOT [Web of Trust] is unique as we combine data from trusted sources (including multiple anti-virus companies & other organisations fighting cyber crime) with real experiences from real users (WOT community of over 25 million users), who rate websites using our safe surfing tools."

Carl Leonard, senior manager of security research at Websense, described Web of Trust as a "very different" system to the real-time Websense technology, which will be integrated into the site from Monday.

He said: "[Web of Trust] is a community-powered free protection system. Users of the tool essentially rate websites in how safe they think they are ... Websense uses the most advanced data identification, content classification, & security filtering available to lessen risks to customer data & productivity."

Facebook will check every links for viruses

Facebook will check every web link its users click on for computer viruses & other dangers as part of efforts to improve the security of the world's largest social network.

From today, hundreds of millions of outbound links every day will be passed through a system provided by the web security firm Websense.

It will effectively visit pages on users' behalf, & apply a series of tests for Trojans, phishing attempts, botnets & other threats.

If the system does not detect a problem with a link, the user will be allowed to visit the page as normal, without any sign that it has been checked. When a threat is detected, however, Facebook will present a warning with links to more information. If the user wants to proceed anyway, they will be allowed.

"Facebook is a big target for criminals online," said Spencer Parker of Websense.

"We'll be protecting all 750 million of its users."

Facebook will check every links for viruses

Facebook will check every web link its users click on for computer viruses & other dangers as part of efforts to improve the security of the world's largest social network.

From today, hundreds of millions of outbound links every day will be passed through a system provided by the web security firm Websense.

It will effectively visit pages on users' behalf, & apply a series of tests for Trojans, phishing attempts, botnets & other threats.

If the system does not detect a problem with a link, the user will be allowed to visit the page as normal, without any sign that it has been checked. When a threat is detected, however, Facebook will present a warning with links to more information. If the user wants to proceed anyway, they will be allowed.

"Facebook is a big target for criminals online," said Spencer Parker of Websense.

"We'll be protecting all 750 million of its users."

To add phishing safety net, Facebook works with Websense

Users will see this notice if they are about to visit a potentially harmful website, giving them the option to go back to the previous page.

Facebook have stepped up their battle against phishing & malware scammers by partnering with security firm Websense.

As of next week, users will be warned if they are about to be taken to a malicious website.

The social network has suffered to date as many of its 700 million users unwittingly click on dangerous links supposedly posted by their friends.

Such attacks usually trick users into sharing passwords or data.

Facebook already tells users if they are about to visit an external site, but the current set up makes no distinction between friendly & dangerous sites.

The new technology will present a warning screen whenever it suspects a page poses a threat to the users, giving details of the risk.

From here, users are encouraged to return to the previous page.

If they wish, users can continue to the intended page, albeit very much at their own risk.
'Profitable target'

Both Facebook & Websense will hope the extra measures will be enough to deter potential scammers from focusing their efforts on the network.

Scams regularly catch out hundreds of thousands of users at a time.
Continue reading the main story
“Start Quote

As more of these 'friend in the middle' attacks happen, you start to trust your friends less.”

Spencer Parker Websense

"There's over 700 million users on Facebook," Websense's Spencer Parker told the BBC.


"As a piece of real estate, it's extremely profitable to be targeted by malware writers."


The protection will be powered by Websense's "Threatseeker Cloud", a system which stores a database of known malicious URLs.


The system can also detect unknown dangerous URLs by assessing threats in real-time.


This means harmful URLs can be blocked even before they are known to the company - cutting off a key tactic used by phishers in which constantly changing URLs fool database-driven protection.


In addition, the system will "follow" links made using popular URL shorteners - such as bit.ly & ow.ly - to verify their safety.

Due to the nature of how we interact with our friends, Mr Parker says phishing attacks on Facebook are much harder to prevent than other commonly used techniques.

"One of the things with Facebook, of course, is that you have that element of trust in a social network. If one of your friends posts something, you automatically trust it more than if it just received as a spam email.

"As more of these 'friend in the middle' attacks happen, you start to trust your friends less."

To add phishing safety net, Facebook works with Websense

Users will see this notice if they are about to visit a potentially harmful website, giving them the option to go back to the previous page.

Facebook have stepped up their battle against phishing & malware scammers by partnering with security firm Websense.

As of next week, users will be warned if they are about to be taken to a malicious website.

The social network has suffered to date as many of its 700 million users unwittingly click on dangerous links supposedly posted by their friends.

Such attacks usually trick users into sharing passwords or data.

Facebook already tells users if they are about to visit an external site, but the current set up makes no distinction between friendly & dangerous sites.

The new technology will present a warning screen whenever it suspects a page poses a threat to the users, giving details of the risk.

From here, users are encouraged to return to the previous page.

If they wish, users can continue to the intended page, albeit very much at their own risk.
'Profitable target'

Both Facebook & Websense will hope the extra measures will be enough to deter potential scammers from focusing their efforts on the network.

Scams regularly catch out hundreds of thousands of users at a time.
Continue reading the main story
“Start Quote

As more of these 'friend in the middle' attacks happen, you start to trust your friends less.”

Spencer Parker Websense

"There's over 700 million users on Facebook," Websense's Spencer Parker told the BBC.


"As a piece of real estate, it's extremely profitable to be targeted by malware writers."


The protection will be powered by Websense's "Threatseeker Cloud", a system which stores a database of known malicious URLs.


The system can also detect unknown dangerous URLs by assessing threats in real-time.


This means harmful URLs can be blocked even before they are known to the company - cutting off a key tactic used by phishers in which constantly changing URLs fool database-driven protection.


In addition, the system will "follow" links made using popular URL shorteners - such as bit.ly & ow.ly - to verify their safety.

Due to the nature of how we interact with our friends, Mr Parker says phishing attacks on Facebook are much harder to prevent than other commonly used techniques.

"One of the things with Facebook, of course, is that you have that element of trust in a social network. If one of your friends posts something, you automatically trust it more than if it just received as a spam email.

"As more of these 'friend in the middle' attacks happen, you start to trust your friends less."

Friday, September 30, 2011

Swimming in Data

Dropped into an aquarium, this USB-powered sensor will detect temperature & pH & ammonia levels. It comes with PC software that can predict if the water quality is likely to become a problem & send alerts to a smart-phone app.
Product: Seneye

Cost: $96 to $162
Availability: Fall 2011
Source: www.seneye.com
Company: Seneye

Swimming in Data

Dropped into an aquarium, this USB-powered sensor will detect temperature & pH & ammonia levels. It comes with PC software that can predict if the water quality is likely to become a problem & send alerts to a smart-phone app.
Product: Seneye

Cost: $96 to $162
Availability: Fall 2011
Source: www.seneye.com
Company: Seneye

Camera Ready

This wearable camera can record events continuously for up to 10 hours. If something interesting happens, pressing a button sends the last 30 seconds of video to Facebook, Twitter, or YouTube via the user’s smart phone.

 
Develop by SEO Booster Tips | Estates For Sales | Expert Zone