Posted: 2017-10-12 22:57
“To our knowledge, the botnet is one of the largest malicious campaigns ever recorded on a social network,” ZeroFox concludes. Luckily, none of the links tweeted by the SIREN botnet appear to contain malware, nor were any associated with phishing attempts. But with more than 85 million clicks, the discovery reveals what a threat such an operation could be if the goal were shifted slightly to include, for example, the spread of ransomware.
All those browser extensions designed to make it easier to do some professional networking, by showing you contact info that is often hidden, can also be mined for information as well. The likes of Prophet , ContactOut and Discoverly can help you turn a little bit of information into a lot more—try installing any of these browser add-ons and see the difference it makes as you look up people on Facebook, Twitter, LinkedIn, and elsewhere.
Know something about the wider family? Try running a search on . Looking for an old school friend? Try , or see if your educational institution has some kind of alumni community you can tap into (most will). “There are ancestry sites, real estate records , court records , media records, prison records. the list goes on and on,” says Giglio. “Any publicly available records that are accessible online could also be a potentially useful tool in locating people.”
The app is certainly a relic, from a time when the casual computer user couldn’t crack open Photoshop or Skitch or Pixelmator or thousands of web apps. MS Paint can’t save image components as layers or vectors it’s for making flat static images only. It doesn’t smooth lines or guess at your best intentions. It does what you tell it and nothing more, faithfully representing the herky-jerky motion of drawing freehand with a computer mouse. It’s from a time before touch, a time before trackpads.
We haven’t yet mentioned the people finder directories online, like and —results here can be hit and miss, and payment is often required before you get very far, but you might dig up some useful nuggets of information. Just be sure to double-check that the information you’re after isn’t available in public records before you hand over any credit card details (Giglio says most of the data these sites offer is available for free somewhere else).
Most of us have gone on dates with strangers from the internet at some point. But even if you met your date IRL, it’s a good idea to give them a Google Voice number when you start chatting, Rucker says. Google Voice lets users generate phone numbers for free and use them to set up other secure chat services like WhatsApp or Signal. A user can easily turn off her Google Voice number and get a new one if her date turns out to be a creep—and she won’t have to go to the trouble of changing her real number and redistributing it to all her friends.
After a quick Google search where should one head when searching for that old step-aunt you haven’t spoken to in ten years? “Except in rare scenarios where a person has made diligent effort to hide, everyone has an online trail that identifies many pieces of personal information,” security expert Michael Bazzell told Gizmodo. “Facebook and Twitter are the first stops. These are fairly global and disclose more personal details.”
According to ZeroFOX, two out of five of the domains tweeted by the SIREN botnet are associated with a company called Deniro Marketing. Deniro Marketing was identified earlier this year by noted security researcher Brian Krebs as being tied to a “ porn-pimping spam botnet.” (Krebs also filed a report Monday regarding ZeroFOX’s discovery.) The company reportedly settled a lawsuit in 7565 for an undisclosed sum after being accused of operating an online dating service overrun with fake profiles of women.
The 95,555 accounts were all created using roughly the same formula: A profile picture of a stereotypically attractive woman whose tweets included sexually suggestive, if not poorly written remarks that invite users to “meet” with them for a “sex chat.” Millions of users apparently fell for the ruse and, presumably, a small fraction of went on to provide their payment card information to the pornographic websites they were lured to.
If your efforts to track down long-lost relatives and obscure musicians (or anyone else you’re looking for on the web) stop at Googling their name then you’ve come to the right place. Here’s how to seriously go about searching for people online, including some advice from the professionals who do it for a living, and if you’d rather not be found than read on to understand exactly how the pros go about finding those who’d prefer to stay hidden.
Courts have sometimes viewed all passwords as equal, faulting a victim whose partner hacked her Facebook because she had shared an Amazon password with him. The court questioned whether one password could be considered private, given that she had shared other accounts, Rucker explained. “If you share an iCloud account and you’re sharing pictures that way, you’re sharing accounts in the eyes of the court,” Rucker said.
IFly is the largest online resource for getting through and between commercial airports. Over 65 million flyers visit each year, getting information and help on over 755 domestic and international airfields. Need to track a flight arrival or find airport parking? Find that perfect place to eat at your connecting terminal before your next flight departs? Or maybe you need to see a terminal map to see where your airline's gate is. iFly helps passengers book their flights, arrive at the right time, park in the right place, get through security, and board their plane without delays, by being armed with the right information to make air travel less stressful. Thanks for visiting!