Showing posts with label Web. Show all posts
Showing posts with label Web. Show all posts

Tuesday, October 11, 2011

Soome Few Ways Job Seekers Harm Themselves

The IT job market is improving, & CIOs are once again looking to hire permanent, full-time IT staff. But because the labor market is saturated with IT pros looking for work, IT hiring managers are being choosey, say IT staffing industry experts.

Make one mistake on your resume, & you can forget about being called for an interview. Fail to impress during the job interview, & the hiring manager may cut your meeting short. Go dark on a prospective employer after a job interview, & you can kiss your chances of getting a job offer good-bye. Yes, my friends, the stakes are that high.

Experienced & inexperienced job seekers alike make mistakes before, during & after job interviews that can sink their chances of landing a new job. Tracy Cashman, partner & general manager of the information technology group at staffing firm Winter Wyman, says she has seen candidates get eliminated in the past month for making such mistakes as speaking ill of a previous employer & asking about vacation & benefits too soon.

Most of the missteps job seekers make are common & can easily be avoided with a dose of common sense or preparation. Here are seven ways job seekers self-destruct.

1. They lie about their qualifications. If anything will kill your chances of getting a job, it's lying, whether on your resume or in a job interview, whether about your skills, employment history or educational background. [Lying on a resume will get caught on a background check, says Cashman. "We had a candidate, a fresh graduate, lie about their GPA, & the employer rescinded the offer.]

2. They come to the job interview unprepared. Todd Collier, a director with IT recruiting firm Eliassen Group, says his firm spends time prepping candidates for job interviews. He says Eliassen briefs candidates on the project they'll be working on, the employer's business & culture, & the manager's needs & style so that the candidate knows how to sell him or herself during the job interview. [People miss out on job offers when they don't fully understand the company's needs, he says. Adds Cashman, It's so easy to do [research on an employer] these days that if you walk in without knowing basic information about the company, you just look stupid or like you're not interested in the job.]

3. They're negative. Having a negative attitude or speaking ill of a former employer is a common mistake job seekers make during job interviews. It's one that Sam Aruti, managing director of DIBJ Enterprises, made in the past when he was looking for a job, & it cost him an offer.

When a job seeker speaks poorly of a past employer, prospective employers wonder how long it will be before the job seeker begins denouncing them, says Cashman. It also causes employers to worry whether the candidate will ever be satisfied.

Cashman advises job seekers to use caution when speaking about their reasons for leaving an employer, which can easily come across as negative. State one reason & keep the explanation brief.

4. They don't ask the right questions. Job seekers who ask informed, specific questions about the job or the employer during the interview impress hiring managers. [It is always nice to hear people ask questions that are relevant to the company,] says Aruti, speaking as a hiring manager.

Even if every question you could ever want to ask has been answered during the interview, have two more questions, adds Cashman. Otherwise, you look uninterested in the job, & it leaves the hiring manager on edge. Good questions are definitely seen as the sign of a good candidate.

But don't ask about vacation time or benefitsat least not during the first interview. Aruti & Cashman say doing so makes hiring managers think benefits are all you care about, so they won't take you seriously & you'll quickly get passed up for the next candidate.

As someone who'd been out of a job for such a long time, if you have a job opportunity in this economy, focus on job rather than on 'what is in it for me, advises Aruti.

5. They're slow. Aruti always walks with IT professionals he interviews for jobs to see if they can keep up with him. He doesn't hire anyone who can't. People who are slow on their feet will likely be slow on the job. It's a lesson he learned years ago from a former manager who told him not to hire someone who didn't walk right, he says.

6. They don't close the interview. Eliassen's Collier compares job interviews to sales calls. Just as sales professionals work toward closing a sale during a meeting with a prospective client, job seekers should work toward closing a job interview, he says. They can close job interviews in a couple of ways: Either by asking if the hiring manager has any other questions about their background, or if the hiring manager gives the last word to the candidate, the candidate should take the opportunity to reiterate why he or she is an excellent fit for the job & the company.

Ask if the hiring manager has any other questions about their background as it relates to the job opportunity, says Collier. Is there any reason you don't think I'd be a fit for this opportunity? Then, they can expand upon it & position themselves for the opportunity.

7. They go dark. Not following up with a prospective employer after a job interview can be fatal. It sends the message that you're not interested in the job. So at the very least, send a thank-you note after the interview, advises Cashman. It can set you apart, she adds, because most people do not send them.

Though some hiring managers appreciate old-fashioned, hand-written thank-you notes, your best bet is to send a well-written one via e-mail. If an employer is in a rush to fill a position & faced with two equally qualified candidates, delivering a thank-you note quickly via e-mail could make all the difference, as a decision may have to be made before the mailed thank-you note arrives. Cashman has seen it happen.

Responding too slowly to a job offer also sends the wrong signal to a prospective employer, according to executive search firm Korn/Ferry International. They employer might think that the candidate is getting cold feet or has completely lost interest in the job.

Of course, job seekers need time to evaluate offers. They should state up front, upon receiving the offer, that they need time to think about it, & how much time they will need. Candidates can ask for a day to a week to make a decision, depending on the complexity of the offer, the job seeker's career level, & the employer's timeframe.

Job fields are growing up for class of 2012

Now Job fields are growing up.
Jobs are looking up for the class of 2012!!


Employers surveyed by the National Association of Colleges & Employers (NACE) say they plan to hire 9.5 percent more graduates from the class of 2012 than they did from the class of 2011.

Salary offers for recent college grads also continue to inch higher. Students landing jobs from this year's class will be paid more, on average, than the class of 2010. The NACE Fall 2011 Salary Survey shows that this year's class of graduates will make, on average, about 6 percent more than last year's graduates, from just over $48,000 to just over $51,000.

Students earning engineering degrees have seen some of the highest salary offers. As a group, the average salary offered to engineering majors rose 2.8 percent from last year's average, to $60,291. The average salary offered to petroleum engineering graduates grew 7.1 percent to $82,740, making it the highest-paid major, according to the report.

If you're still in college & looking to get a leg up on the competition, another NACE survey reveals that paid interns had the most success attracting job offers in 2011. "Class of 2011 graduates who took part in a paid internship were more likely to get a job offer, have a job in hand by the time they graduated, & receive a higher starting salary offer than their peers who undertook an unpaid internship or no internship at all," according to a NACE press release. More than 61 percent of students who took part in paid internships in the for-profit sector received a job offer.

Many of the openings for the class of 2012 are for "replacement hires," new employees brought in to fill the roles of existing employees who are leaving. In the report, employers expressed the greatest interest in graduates who majored in business, engineering, & tech-related subjects.

Two companies with extensive hiring plans, mostly based on new hires & not on attrition, are accounting firm Ernst & Young & Enterprise Rent-A-Car.

Ernst & Young began a hiring campaign in July, in which it plans to hire 9,000 students from throughout the Americas. Some 5,200 of those hires will come from U.S. campuses. The company plans to hire for a mix of full-time positions (3,000 graduates) & interns (2,200) in the United States alone. This year marks a the first that Ernst & Young's campus hiring level has reached its per-recession highs. "There are a wide range of opportunities that are available," says Dan Black, director of campus recruiting for the Americas at Ernst & Young. He says the company is actively recruiting at about 200 college campuses throughout the Americas.

Car rental company Enterprise is also back to hiring levels in line with it is per-recession efforts. Marie Artim, Enterprise's senior vice president of talent acquisition, says the company plans to hire about 8,500 college graduates for its management training program for the fiscal year starting in August 2011. Artim says Enterprise generally promotes from within the company, & that many company executives, including herself, started in the management training program. [That is really the one way into the company is through our management training program,] Artim says. From there, it is our pipeline to our management path & our future leadership.

Saturday, October 8, 2011

Facebook Marketing uncoverd, unparalle, Tricks & tips, Book & videos!!!

Did you know? There are 500 million potential customers for your product or service – ALL in one spot - & they're waiting for you.

Have you tapped into them yet? Many marketers see Facebook as a giant waste of time, & they don't realize that they are missing out on a huge marketplace. But Facebook has over 500 million active users & accounts for something like 35% of all Internet traffic.

With [Facebook Marketing Uncovered] you'll discover:

* How to use Facebook, step by step
* What marketing methods work on Facebook & which ones don’t
* How to find products to sell if you don’t have your own
* How to use fan pages for maximum profit
* Why groups are useful & when you want to use them
* How to use Facebook advertising for profit
* & much, much more
Download link will be coming very soon....

Friday, October 7, 2011

Free URL submission site list

FREE Search Engine Submission

Free SEO Tools
backlinks



Enter URL:




(e.g. yourwebsite.com)


Powered by: WebToolHub.com


Black List hecker


Enter Mail Server IP:




(e.g. 192.168.3.45)


Powered by: WebToolHub.com

Web design in Spain
Web development company that specialise in real estate websites and developing around the Joomla content management system. Check their impressive portfolio.

Thursday, October 6, 2011

A Florida School District is Taking Attendance by Scanning Students' Fingers

Roll call is going high-tech in Washington County, Fla. Rather than the usual name calling & response, students are now checking into class with finger scanning devices. & to keep better track of students from the minute they come under district supervision until they are delivered safely home again, the scanners are now moving from the school building to the school bus.

The systems have been active inside Washington County schools for roughly two months, but since most of the students in the district ride the bus anyhow, officials have decided the best place for the scanners is on the buses themselves. In the next week, a handful of buses will get the scanners. If the system proves worthwhile, all buses will have them by semester’s end.

At $30 per student per year, the system isn’t necessarily cheap. But considering the uptick in attendance (which means more money from the state in many districts) & the inherent increase in accountability & student safety, it may well be worth the cost. & naturally, parents who don’t want their children fingerprinted coming to & from school for whatever reason can opt to have their kids check in with their teachers in a more analog fashion.

Get your own free virtual mobile phone number to receive & send sms.

Do you want a free virtual phone number from where you can send free sms & even receive sms? Mostly this feature is needed for business purpose but we might also need virtual phone number to receive & send sms in some personal matter also. Below is given how you can get free virtual mobile number from where you can send sms & even can receive sms.

There is a company named “LLEIDANETWORKS SERVEIS TELEMATICS” from Spain, From this website you can get a free virtual phone number of Spain in the format +3497******* from which you can send free sms & can even receive sms on-line. Even if we need credit (Account balance) to send sms & we need to buy credit they give 3 credits for free to new users & sending each sms takes an average of 0.30 credits from your account (but may vary according to the country you send sms to) so each account you sign up with will give you about 10 free sms to send. & you can receive unlimited sms for free. You can also forward the sms you receive in your virtual phone number to your actual number but for doing so you will be charged a credit equal to the credit charged to send sms to your real number. Also they provide you a free online phone book in your account for storing your contacts safely & send sms to those numbers faster.

So to get this service you need to click on “Free Account” At the side bar. You then will see a form, just fill out this form with correct details & click send. After you click send within 2-5 minutes you will receive an email on the email address you provided to them.
Within the email will be your username & password to access your account & a virtual phone number for you where your friends can sms to you & you can check those sms from your account.

After you receive your username, password & virtual phone number you can login to your account by two ways one by websms by going to another by downloading a software to your computer & logging in from there VirtualHandset.exe

Your account will be active for 6 months even if you don’t use your account to buy credits & just use it to receive & send sms. & if you want to buy credits to send more sms from your virtual number you can just login to websms link given above & click on “Recharge”, you will be able to buy credits using your credit cards which will cost you from 0.09 to 0.1202 euro dollars which depends on the volume of credits you buy.

Or if you don’t want to invest money then you can just sign up again with another email address & receive 3 free credits & a new virtual mobile number.


Popular Searches:

virtual mobile number
virtual mobile number for sms receiving
virtual sms number
virtual mobile phone
online phone number for receiving texts
free virtual sms
free virtual mobile number
online phone number to receive texts
free virtual number
virtual cell phone
fake phone number to receive texts
free mobile number
free online mobile number
virtual number for sms
free virtual sms number
virtual cell phone number
virtual phone number sms
free sms number receive
fake mobile number
virtual mobile number sms
virtual mobile number free
free number to receive sms
Virtual Mobile Numbers
free virtual phone number
receive free text message number
virtual phone number for sms
get free sms number
Fake Phone Number to receive text
virtual mobile phone number
virtual sms number free

Apple founder, Steve Jobs, passed away on Wednesday [October 5]

Apple founder, Steve Jobs, passed away on Wednesday [October 5] at the age of 56, succumbing to pancreatic cancer.

The company announced his death this week. However, did not give any specific cause.

We are deeply saddened to announce that Steve Jobs passed away today, the company said in a brief statement. Steve's brilliance, passion & energy were the source of countless innovations that enrich & improve all of our lives. The world is immeasurably better because of Steve.

Jobs had been diagnosed with a rare form of pancreatic cancer called pancreatic neuroendocrine cancer. While those suffering can live as long as 20 years with the disease, it obviously wasn't the case with the Apple visionary.

His cancer eventually spread to his liver, so he was forced to have a liver transplant in 2009 & took an extended medical leave from Apple last January.

Even after a liver transplant, the cancer can recur, which may have been what happened in Jobs' case.

Jobs started Apple with a high school friend in a Silicon Valley garage in 1976, but 10 years later, he was forced out of the company. Eventually, in 1997, he returned to rescue the company he helped build. During his second stint, it grew into the most valuable technology company in the world with a market value of $351 billion.

He's responsible for inventing & masterfully marketing ever-sleeker gadgets that transformed everyday technology, from the personal computer to the iPod & iPhone.

Jobs is survived by his wife Laurene, whom he has two daughters & a son with. He also has another daughter from a previous relationship.

Young Steve Jobs
His death became a trending topic on Wednesday, drawing actions from Apple fans, as well as celebrities & political figures.

Steve was among the greatest of American innovators -- brave enough to think differently, bold enough to believe he could change the world, & talented enough to do it, said President Obama in a statement. Steve was fond of saying that he lived every day like it was his last. Because he did, he transformed our lives, redefined entire industries, & achieved one of the rarest feats in human history: he changed the way each of us sees the world.

I'm truly saddened to learn of Steve Jobs' death, said Microsoft founder, Bill Gates. Melinda & I extend our sincere condolences to his family & friends, & to everyone Steve has touched through his work. Steve & I first met nearly 30 years ago, & have been colleagues, competitors & friends over the course of more than half our lives. The world rarely sees someone who has had the profound impact Steve has had, the effects of which will be felt for many generations to come. For those of us lucky enough to get to work with him, it's been an insanely great honor. I will miss Steve immensely.

Wednesday, October 5, 2011

Tags Added in HTML5 and Sitepoint - HTML5 & CSS3 for the Real World

Free Download

Tag Description Covered in Chapter
<article> Defines an article 11
<audio> Defines sound content 15
<canvas> Defines graphics 16
<command> Defines a command button 14
<datagrid> Defines data in a tree-list 14
<datalist> Defines a drop-down list 14
<datatemplate> Defines a data template 14
<details> Defines details of an element
<dialog> Defines a dialog (conversation)
<embed> Defines external interactive content or plug-in 16
<eventsource> Defines a target for events sent by a server 16
<figure> Defines a group of media content, and their caption 9
<footer> Defines a footer for a section or page 11
<header> Defines a header for a section or page 11
<mark> Defines marked text
<meter> Defines measurement within a predefined range
<nav> Defines navigation links 10
<nest> Defines a nestingpoint in a datatemplate 14
<output> Defines some types of output
<progress> Defines progress of a task of any kind
<rule> Defines the rules for updating a template
<section> Defines a section 11
<source> Defines media resources 15
<time> Defines a date/time
<video> Defines a video 15


Monday, October 3, 2011

IBM Vs Microsoft in tech giants ranking...!!!

For the first time since 1996 IBM's market value has exceeded Microsoft's.

IBM's closing price on 29 September was $214bn (£137.4bn) while Microsoft's was a shade behind at $213.2bn (£136.8bn).

The values cap a sustained period in which IBM's share price has moved steadily upward as Microsoft's has generally been in decline.

The growth means IBM is now the second largest technology company by market value. Apple still holds the top slot with a value of $362bn (£232bn).

Since the beginning of 2011, IBM's share price has made steady gains & is now 22% higher than at the start of the year, according to Bloomberg figures. By contrast, Microsoft's value has dropped 8.8% over the same time period.

Analysts put the switch in the number two slot down to a decision IBM made in 2005 to sell off its PC business to Chinese manufacturer Lenovo to concentrate on software & services.

"IBM went beyond technology," Ted Schadler, a Forrester Research analyst told Bloomberg. "They were early to recognise that computing was moving way beyond these boxes on our desks."

By contrast much of Microsoft's revenue comes from sales of Windows & Office software used on PCs. Also, Microsoft is between releases of Windows which can mean a fallow period for its revenues.

Windows 7 was released in 2009 & Windows 8 is not expected to be released until late 2012 at the earliest.

Many have also claimed that the rise of the web, mobile computing & tablets spells the end of the PC era. In early August, Dr Mark Dean, one of the designers of the original IBM PC, declared that the centre of the computing world had shifted away from the humble desktop.

IBM Vs Microsoft in tech giants ranking...!!!

For the first time since 1996 IBM's market value has exceeded Microsoft's.

IBM's closing price on 29 September was $214bn (£137.4bn) while Microsoft's was a shade behind at $213.2bn (£136.8bn).

The values cap a sustained period in which IBM's share price has moved steadily upward as Microsoft's has generally been in decline.

The growth means IBM is now the second largest technology company by market value. Apple still holds the top slot with a value of $362bn (£232bn).

Since the beginning of 2011, IBM's share price has made steady gains & is now 22% higher than at the start of the year, according to Bloomberg figures. By contrast, Microsoft's value has dropped 8.8% over the same time period.

Analysts put the switch in the number two slot down to a decision IBM made in 2005 to sell off its PC business to Chinese manufacturer Lenovo to concentrate on software & services.

"IBM went beyond technology," Ted Schadler, a Forrester Research analyst told Bloomberg. "They were early to recognise that computing was moving way beyond these boxes on our desks."

By contrast much of Microsoft's revenue comes from sales of Windows & Office software used on PCs. Also, Microsoft is between releases of Windows which can mean a fallow period for its revenues.

Windows 7 was released in 2009 & Windows 8 is not expected to be released until late 2012 at the earliest.

Many have also claimed that the rise of the web, mobile computing & tablets spells the end of the PC era. In early August, Dr Mark Dean, one of the designers of the original IBM PC, declared that the centre of the computing world had shifted away from the humble desktop.

Criminals target mobile devices & social networks !

Smartphones & social networking sites are likely to become the next big target for cyber criminals, according to a security industry report.

Symantec's annual threat analysis warns that the technologies are increasingly being used to spread malicious code.

Users of Facebook, Twitter & Google's mobile operating system, Android, are said to be particularly vulnerable.

However, the number of attacks remains small compared to other online crimes such as e-mail phishing.

According to Symantec, known vulnerabilities in mobile operating systems rose from 115 in 2009 to 163 in 2010.

In several cases, the security holes were exploited & used to install harmful software on Android handsets - suggesting that criminals now view smartphone hacking as a potentially lucrative area .

At least six different varieties of malware were discovered hidden in applications that were distributed through a Chinese download service.

"It is something we have started to see happen, albeit on a small level," said Orla Cox, security operations manager at Symantec.

"It allows people to do a variety of things from intercepting SMS messages to dialling toll numbers. They have opened up the possibility of what is there."

Several pieces of malware were also found on iPhones, however only devices that had been "jailbroken" to bypass Apple's security were affected.

The company's process of pre-vetting all new applications is believed to have spared its devices from a major attack.

Rogue applications

On Facebook & Twitter, Symantec's analysis highlighted several different types of threat.

Among the most prevalent were web links that encourage users to click through to other sites containing malware & rogue applications, designed to collect personal information.

The company estimates that one in six links posted on Facebook pages are connected to malicious software.

User information is said to be particularly valuable in "social engineering" attacks, where criminals use knowledge of an individual to trick them into scams that appear to relate to them personally.

Attack toolkits

Symantec makes its money selling internet security software & services to individuals & corporations

Its annual Internet Security Threat Report - based on data supplied by users around the world - is generally regarded as a reliable measure of changing trends in cyber crime.

Globally, the company recorded a 93% increase in the volume of web-based attacks between 2009 & 2010.

The dramatic rise was largely attributed to the widespread availability of "attack toolkits" - software packages that allow users with relatively little skill to design their own malicious software.

Toolkits are available to buy online for as little as a few pounds & as much as several thousand for the latest versions.

The most popular attack kit was Phoenix, which exploits vulnerabilities in the Java programming language - commonly used for web-based applications.

Symantec's report also notes a rise in the number of targeted attacks, where specific companies, organisations or individuals are singled out.

The most sensational targeted attack of 2010 was undoubtedly Stuxnet. The software worm was designed to take control of mechanical systems used in Iran's nuclear plants.

It has been widely speculated that the USA or Israel may have played a role in its creation.

Despite Stuxnet's headline-grabbing nature, Orla Cox believes that it may not be indicative of things to come.

"It was interesting to see that it is possible to attack physical systems. I think it unlikely that we will see a whole slew of attacks of that nature," she said.

Criminals target mobile devices & social networks !

Smartphones & social networking sites are likely to become the next big target for cyber criminals, according to a security industry report.

Symantec's annual threat analysis warns that the technologies are increasingly being used to spread malicious code.

Users of Facebook, Twitter & Google's mobile operating system, Android, are said to be particularly vulnerable.

However, the number of attacks remains small compared to other online crimes such as e-mail phishing.

According to Symantec, known vulnerabilities in mobile operating systems rose from 115 in 2009 to 163 in 2010.

In several cases, the security holes were exploited & used to install harmful software on Android handsets - suggesting that criminals now view smartphone hacking as a potentially lucrative area .

At least six different varieties of malware were discovered hidden in applications that were distributed through a Chinese download service.

"It is something we have started to see happen, albeit on a small level," said Orla Cox, security operations manager at Symantec.

"It allows people to do a variety of things from intercepting SMS messages to dialling toll numbers. They have opened up the possibility of what is there."

Several pieces of malware were also found on iPhones, however only devices that had been "jailbroken" to bypass Apple's security were affected.

The company's process of pre-vetting all new applications is believed to have spared its devices from a major attack.

Rogue applications

On Facebook & Twitter, Symantec's analysis highlighted several different types of threat.

Among the most prevalent were web links that encourage users to click through to other sites containing malware & rogue applications, designed to collect personal information.

The company estimates that one in six links posted on Facebook pages are connected to malicious software.

User information is said to be particularly valuable in "social engineering" attacks, where criminals use knowledge of an individual to trick them into scams that appear to relate to them personally.

Attack toolkits

Symantec makes its money selling internet security software & services to individuals & corporations

Its annual Internet Security Threat Report - based on data supplied by users around the world - is generally regarded as a reliable measure of changing trends in cyber crime.

Globally, the company recorded a 93% increase in the volume of web-based attacks between 2009 & 2010.

The dramatic rise was largely attributed to the widespread availability of "attack toolkits" - software packages that allow users with relatively little skill to design their own malicious software.

Toolkits are available to buy online for as little as a few pounds & as much as several thousand for the latest versions.

The most popular attack kit was Phoenix, which exploits vulnerabilities in the Java programming language - commonly used for web-based applications.

Symantec's report also notes a rise in the number of targeted attacks, where specific companies, organisations or individuals are singled out.

The most sensational targeted attack of 2010 was undoubtedly Stuxnet. The software worm was designed to take control of mechanical systems used in Iran's nuclear plants.

It has been widely speculated that the USA or Israel may have played a role in its creation.

Despite Stuxnet's headline-grabbing nature, Orla Cox believes that it may not be indicative of things to come.

"It was interesting to see that it is possible to attack physical systems. I think it unlikely that we will see a whole slew of attacks of that nature," she said.

Bad spelling opens up security loopholes...

Facebook has paid $5000 to those who found the biggest security holes in its site. & has spent $40,000 (£25,000) in the first 21 days of a program that rewards the discovery of security bugs.

The bug bounty program aims to encourage security researchers to help harden Facebook against attack.

One security researcher has been rewarded with more than $7,000 for finding six serious bugs in the social networking site.

The program runs alongside Facebook's efforts to police the code it creates that keeps the social site running.

A blog post by Facebook chief security officer Joe Sullivan revealed some information about the early days of the bug bounty program.

He said the program had made Facebook more secure by introducing the networking site to "novel attack vectors, & helping us improve lots of corners in our code".

The minimum amount paid for a bug is $500, said Mr Sullivan, up to a maximum of $5000 for the most serious loopholes. The maximum bounty has already been paid once, he said.

Many cyber criminals & vandals have targeted Facebook in many different ways to extract useful information from people, promote spam or fake goods.
Continue reading the main story
“Start Quote

It's hardly surprising that the service is riddled with rogue apps & viral scams”

Graham Cluley Sophos

Mr Sullivan said Facebook had internal bug-hunting teams, used external auditors to vet its code & ran "bug-a-thons" to hunt out mistakes but it regularly received reports about glitches from independent security researchers.

Facebook set up a system to handle these reports in 2010 which promised not to take legal action against those that find bugs & gave it chance to assess them.

Paying those that report problems was the logical next step for the disclosure system, he said.

Graham Cluley, senior technology consultant at Sophos, said many other firms, including Google & Mozilla, run similar schemes that have proved useful in rooting out bugs.

However, he said, many criminally-minded bug spotters might get more for what they find if they sell the knowledge on an underground market.

He added that the bug bounty scheme might be missing the biggest source of security problems on Facebook.

"They're specifically not going to reward people for identifying rogue third party Facebook apps, clickjacking scams & the like," he said. "It's those sorts of problems which are much more commonly encountered by Facebook users & have arguably impacted more people."

Facebook should consider setting up a "walled garden" that only allowed vetted applications from approved developers to connect to the social networking site, he said.

"Facebook claims there are over one million developers on the Facebook platform, so it's hardly surprising that the service is riddled with rogue apps & viral scams," he said.

Bad spelling opens up security loopholes...

Facebook has paid $5000 to those who found the biggest security holes in its site. & has spent $40,000 (£25,000) in the first 21 days of a program that rewards the discovery of security bugs.

The bug bounty program aims to encourage security researchers to help harden Facebook against attack.

One security researcher has been rewarded with more than $7,000 for finding six serious bugs in the social networking site.

The program runs alongside Facebook's efforts to police the code it creates that keeps the social site running.

A blog post by Facebook chief security officer Joe Sullivan revealed some information about the early days of the bug bounty program.

He said the program had made Facebook more secure by introducing the networking site to "novel attack vectors, & helping us improve lots of corners in our code".

The minimum amount paid for a bug is $500, said Mr Sullivan, up to a maximum of $5000 for the most serious loopholes. The maximum bounty has already been paid once, he said.

Many cyber criminals & vandals have targeted Facebook in many different ways to extract useful information from people, promote spam or fake goods.
Continue reading the main story
“Start Quote

It's hardly surprising that the service is riddled with rogue apps & viral scams”

Graham Cluley Sophos

Mr Sullivan said Facebook had internal bug-hunting teams, used external auditors to vet its code & ran "bug-a-thons" to hunt out mistakes but it regularly received reports about glitches from independent security researchers.

Facebook set up a system to handle these reports in 2010 which promised not to take legal action against those that find bugs & gave it chance to assess them.

Paying those that report problems was the logical next step for the disclosure system, he said.

Graham Cluley, senior technology consultant at Sophos, said many other firms, including Google & Mozilla, run similar schemes that have proved useful in rooting out bugs.

However, he said, many criminally-minded bug spotters might get more for what they find if they sell the knowledge on an underground market.

He added that the bug bounty scheme might be missing the biggest source of security problems on Facebook.

"They're specifically not going to reward people for identifying rogue third party Facebook apps, clickjacking scams & the like," he said. "It's those sorts of problems which are much more commonly encountered by Facebook users & have arguably impacted more people."

Facebook should consider setting up a "walled garden" that only allowed vetted applications from approved developers to connect to the social networking site, he said.

"Facebook claims there are over one million developers on the Facebook platform, so it's hardly surprising that the service is riddled with rogue apps & viral scams," he said.

Warning to Facebook users for over personal data

Computer security experts are warning that Facebook users divulge too much personal information which can potentially be accessed by criminals.

Cyber criminals can use this information to steal people's identities and commit fraud in their name.

IT security consultant Rob Vaughan, who spoke about cyber crime at the University of Glamorgan in Pontypridd on Tuesday, said people should think twice before adding details like their address and date of birth to their Facebook page.

"You can change your privacy settings but people put far, far too much personal information into Facebook and other social networking sites," he said.

"If you just stop and think about what you are doing... ask yourself if you really need to put that level of information in there.

"Also, you don't necessarily know all your [Facebook] friends on there that well."
Continue reading the main story
“Start Quote

You are looking at things like identity theft, harassment, bullying, sexual harassment - all sorts of things”

Det Sgt Andrea Barnard e-Crime Wales police manager

Mr Vaughan, who has just helped set up Electric Cat Cymru which helps businesses and domestic users with IT security, said criminals may use various websites to gather information on an individual, a process known as aggregation.

"I would say if you were looking at trying to pinch somebody's ID or glean as much information about someone, or if you are profiling somebody, you will find a lot of information out there in the public domain," he said.

"Organised crime is using the internet as an easy target."

Facebook, which has more than 750m active users with 50% logging on in any given day, said users were in "complete control" of what they shared, who they shared it with and how much they shared.

Its privacy settings "allow users to easily restrict access to any content that they post, as they post, according to their own comfort level", said a spokesperson.
Continue reading the main story
Facebook safety tips

Block and report anyone who sends you unwanted messages
Beware of suspicious links
Keep your computer's software up to date to beat cyber criminals
Visit the Facebook safety page
Use different passwords for your different online accounts - and keep them secret
Spend a little time reviewing your privacy settings
Be careful when accepting or sending friend requests
Before you post, stop and think about who might see it
Be careful when accessing or sending information over an unsecured public wireless network
Learn how to use tools that allow you to report things that make you feel uncomfortable

"We've made that process even simpler over the last week by introducing smart friend lists.

"Lists have existed for several years but we've made them even easier to use by rolling out smart lists which create themselves and stay up-to-date based on profile info your friends have in common with you - like your work, school, family and city."

Recent figures from a Freedom of Information request to South Wales Police showed that the number of crimes involving Facebook were on the increase.

Det Sgt Andrea Barnard, e-Crime Wales police manager, said: "I collate statistics every month on a pan-Wales basis and I can certainly say crimes on Facebook are always top of the list every month.

"You are looking at things like identity theft, harassment, bullying, sexual harassment - all sorts of things.

"It's all because people are putting up too much information about themselves."

She said businesses also needed to be careful about social networking sites as, for example, viruses and malware (malicious software) could be accidentally downloaded by employees using them during a break.

"If that's happening in the workplace it's very expensive to sort the problem out and you are potentially exposing very important company data," she said.

She said she would always advise businesses to implement an 'acceptable use policy' for social networking sites.
Extract data

Jaime Hindle, business liaison officer at the University of Glamorgan, said more and more businesses were now using social networking sites for commercial purposes, which presented potential pitfalls.

"If you don't take a savvy attitude to your page, you could be compromised," he said.

"It could be personal protection or commercial sabotage from viruses to phishing to spam to hacking into data."

He said cyber crime as a whole was becoming more prevalent as criminals turned away from more high-risk illegal activities.

"The old crimes of mugging and ram raiding, we don't hear of them any more because criminals are looking at less risky and more profitable enterprises like cyber crime," he said.

The University of Glamorgan hosted Tuesday's seminar on cyber crime as part of the Software Alliance Wales project, which promotes Wales' ICT and software sector.

Warning to Facebook users for over personal data

Computer security experts are warning that Facebook users divulge too much personal information which can potentially be accessed by criminals.

Cyber criminals can use this information to steal people's identities and commit fraud in their name.

IT security consultant Rob Vaughan, who spoke about cyber crime at the University of Glamorgan in Pontypridd on Tuesday, said people should think twice before adding details like their address and date of birth to their Facebook page.

"You can change your privacy settings but people put far, far too much personal information into Facebook and other social networking sites," he said.

"If you just stop and think about what you are doing... ask yourself if you really need to put that level of information in there.

"Also, you don't necessarily know all your [Facebook] friends on there that well."
Continue reading the main story
“Start Quote

You are looking at things like identity theft, harassment, bullying, sexual harassment - all sorts of things”

Det Sgt Andrea Barnard e-Crime Wales police manager

Mr Vaughan, who has just helped set up Electric Cat Cymru which helps businesses and domestic users with IT security, said criminals may use various websites to gather information on an individual, a process known as aggregation.

"I would say if you were looking at trying to pinch somebody's ID or glean as much information about someone, or if you are profiling somebody, you will find a lot of information out there in the public domain," he said.

"Organised crime is using the internet as an easy target."

Facebook, which has more than 750m active users with 50% logging on in any given day, said users were in "complete control" of what they shared, who they shared it with and how much they shared.

Its privacy settings "allow users to easily restrict access to any content that they post, as they post, according to their own comfort level", said a spokesperson.
Continue reading the main story
Facebook safety tips

Block and report anyone who sends you unwanted messages
Beware of suspicious links
Keep your computer's software up to date to beat cyber criminals
Visit the Facebook safety page
Use different passwords for your different online accounts - and keep them secret
Spend a little time reviewing your privacy settings
Be careful when accepting or sending friend requests
Before you post, stop and think about who might see it
Be careful when accessing or sending information over an unsecured public wireless network
Learn how to use tools that allow you to report things that make you feel uncomfortable

"We've made that process even simpler over the last week by introducing smart friend lists.

"Lists have existed for several years but we've made them even easier to use by rolling out smart lists which create themselves and stay up-to-date based on profile info your friends have in common with you - like your work, school, family and city."

Recent figures from a Freedom of Information request to South Wales Police showed that the number of crimes involving Facebook were on the increase.

Det Sgt Andrea Barnard, e-Crime Wales police manager, said: "I collate statistics every month on a pan-Wales basis and I can certainly say crimes on Facebook are always top of the list every month.

"You are looking at things like identity theft, harassment, bullying, sexual harassment - all sorts of things.

"It's all because people are putting up too much information about themselves."

She said businesses also needed to be careful about social networking sites as, for example, viruses and malware (malicious software) could be accidentally downloaded by employees using them during a break.

"If that's happening in the workplace it's very expensive to sort the problem out and you are potentially exposing very important company data," she said.

She said she would always advise businesses to implement an 'acceptable use policy' for social networking sites.
Extract data

Jaime Hindle, business liaison officer at the University of Glamorgan, said more and more businesses were now using social networking sites for commercial purposes, which presented potential pitfalls.

"If you don't take a savvy attitude to your page, you could be compromised," he said.

"It could be personal protection or commercial sabotage from viruses to phishing to spam to hacking into data."

He said cyber crime as a whole was becoming more prevalent as criminals turned away from more high-risk illegal activities.

"The old crimes of mugging and ram raiding, we don't hear of them any more because criminals are looking at less risky and more profitable enterprises like cyber crime," he said.

The University of Glamorgan hosted Tuesday's seminar on cyber crime as part of the Software Alliance Wales project, which promotes Wales' ICT and software sector.

Facebook calls on web security firm to combat malware

Users will be warned not to follow links posted on the site which lead to locations known to harbour malware

Facebook has struggled to stem an increase in opportunist scams. Photograph: Dale O'Dell / Alamy/Alamy

Facebook has hired a leading web security firm to help combat a continuing rise in malware on the social network in the past year.

Users of the world's biggest social network will be warned not to follow links posted on the site which lead to locations known to harbour malware, as part of the partnership with US security firm Websense.

Another web security firm, Symantec, said in its annual report in April that malicious links accounted for two-thirds of all shortened links on social networks in 2010, & that almost nine in 10 of them had been clicked at least once.

While Facebook has grown exponentially, it has also struggled to stem an increase in opportunist scams that target the site's 800 million users. Attacks range from tricking users into revealing their password to more serious attempts to extort money from people using plausible-sounding email addresses via information gleaned from their profile pages.

One of the biggest threats on Facebook is shortened links that could unwittingly take users to websites that could infect their computers with viruses. Websense says it will vet out shortened links that hide viruses in "real time", warning users against visiting the site if it is harmful.

"Facebook cares deeply about protecting users from potentially malicious content on the internet," said Dan Rubinstein, Facebook's product manager for site integrity. "We are excited about our partnership with Websense to provide industry leading tools to help our users protect themselves."

The security firm Sophos reported in July that Facebook was increasingly seen as the "biggest risk" online among users, with 81% of survey respondents voting for the website, up from 60% in 2010. Twitter & Myspace received 8% of the votes in the same study.

Graham Cluley, senior technology consultant at Sophos, told the Guardian the partnership was not a "significant change of direction" by Facebook, & said his firm sees "a lot of malicious activity" there.

"Certainly I think there's room for Facebook to improve when it comes to fighting spammy & malicious links," he said. "The likes of [Google's] Gmail, [Microsoft's] Hotmail & Yahoo do a pretty good job at blocking most of the spam in the first place – so it would be good to see Facebook offer a similarly mature approach to the problem. One challenge for Facebook is they have a very laissez-faire attitude to what goes on on their network.

"For instance, anyone can become a Facebook developer & apps are not vetted, which is one avenue for criminals to earn income & access users' personal information."

In May, Facebook announced a similar partnership with the online security firm Web of Trust, whose chief executive Vesa Perala told the Guardian: "Websense work on the traditional technical security, which is quite different compared to what we are doing."

She added: "We know that Facebook is using multiple sources for different purposes. According to my understanding they have two major data providers: McAfee on the anti-virus area & [Web of Trust] in the area of reputation & trustworthiness but are using 'bits & pieces' from other sources as well.

"WOT [Web of Trust] is unique as we combine data from trusted sources (including multiple anti-virus companies & other organisations fighting cyber crime) with real experiences from real users (WOT community of over 25 million users), who rate websites using our safe surfing tools."

Carl Leonard, senior manager of security research at Websense, described Web of Trust as a "very different" system to the real-time Websense technology, which will be integrated into the site from Monday.

He said: "[Web of Trust] is a community-powered free protection system. Users of the tool essentially rate websites in how safe they think they are ... Websense uses the most advanced data identification, content classification, & security filtering available to lessen risks to customer data & productivity."

Facebook calls on web security firm to combat malware

Users will be warned not to follow links posted on the site which lead to locations known to harbour malware

Facebook has struggled to stem an increase in opportunist scams. Photograph: Dale O'Dell / Alamy/Alamy

Facebook has hired a leading web security firm to help combat a continuing rise in malware on the social network in the past year.

Users of the world's biggest social network will be warned not to follow links posted on the site which lead to locations known to harbour malware, as part of the partnership with US security firm Websense.

Another web security firm, Symantec, said in its annual report in April that malicious links accounted for two-thirds of all shortened links on social networks in 2010, & that almost nine in 10 of them had been clicked at least once.

While Facebook has grown exponentially, it has also struggled to stem an increase in opportunist scams that target the site's 800 million users. Attacks range from tricking users into revealing their password to more serious attempts to extort money from people using plausible-sounding email addresses via information gleaned from their profile pages.

One of the biggest threats on Facebook is shortened links that could unwittingly take users to websites that could infect their computers with viruses. Websense says it will vet out shortened links that hide viruses in "real time", warning users against visiting the site if it is harmful.

"Facebook cares deeply about protecting users from potentially malicious content on the internet," said Dan Rubinstein, Facebook's product manager for site integrity. "We are excited about our partnership with Websense to provide industry leading tools to help our users protect themselves."

The security firm Sophos reported in July that Facebook was increasingly seen as the "biggest risk" online among users, with 81% of survey respondents voting for the website, up from 60% in 2010. Twitter & Myspace received 8% of the votes in the same study.

Graham Cluley, senior technology consultant at Sophos, told the Guardian the partnership was not a "significant change of direction" by Facebook, & said his firm sees "a lot of malicious activity" there.

"Certainly I think there's room for Facebook to improve when it comes to fighting spammy & malicious links," he said. "The likes of [Google's] Gmail, [Microsoft's] Hotmail & Yahoo do a pretty good job at blocking most of the spam in the first place – so it would be good to see Facebook offer a similarly mature approach to the problem. One challenge for Facebook is they have a very laissez-faire attitude to what goes on on their network.

"For instance, anyone can become a Facebook developer & apps are not vetted, which is one avenue for criminals to earn income & access users' personal information."

In May, Facebook announced a similar partnership with the online security firm Web of Trust, whose chief executive Vesa Perala told the Guardian: "Websense work on the traditional technical security, which is quite different compared to what we are doing."

She added: "We know that Facebook is using multiple sources for different purposes. According to my understanding they have two major data providers: McAfee on the anti-virus area & [Web of Trust] in the area of reputation & trustworthiness but are using 'bits & pieces' from other sources as well.

"WOT [Web of Trust] is unique as we combine data from trusted sources (including multiple anti-virus companies & other organisations fighting cyber crime) with real experiences from real users (WOT community of over 25 million users), who rate websites using our safe surfing tools."

Carl Leonard, senior manager of security research at Websense, described Web of Trust as a "very different" system to the real-time Websense technology, which will be integrated into the site from Monday.

He said: "[Web of Trust] is a community-powered free protection system. Users of the tool essentially rate websites in how safe they think they are ... Websense uses the most advanced data identification, content classification, & security filtering available to lessen risks to customer data & productivity."

Facebook will check every links for viruses

Facebook will check every web link its users click on for computer viruses & other dangers as part of efforts to improve the security of the world's largest social network.

From today, hundreds of millions of outbound links every day will be passed through a system provided by the web security firm Websense.

It will effectively visit pages on users' behalf, & apply a series of tests for Trojans, phishing attempts, botnets & other threats.

If the system does not detect a problem with a link, the user will be allowed to visit the page as normal, without any sign that it has been checked. When a threat is detected, however, Facebook will present a warning with links to more information. If the user wants to proceed anyway, they will be allowed.

"Facebook is a big target for criminals online," said Spencer Parker of Websense.

"We'll be protecting all 750 million of its users."

 
Develop by SEO Booster Tips | Estates For Sales | Expert Zone