Categories
Entradas Redes Sociales

Do you know how valuable your Facebook data really is?

The real value of Facebook data

As we have mentioned, an estimated 87 million Facebook profiles have been sharing information with third-party applications. In short, the social network has profited from this data. This has caused our data to be sold on the Internet for a few euros.

Exactly, and as collected in Market Watch, a user’s Facebook data can only be worth $ 5.20 on the Dark Web. If we translate it into euros we are talking about 4.25 euros at the current exchange rate.

Data such as the “likes” or even more personal such as the ID number or driving license, have been exposed and may even be for sale.

As we know, the Dark web it is a small part of the internet. It should not be confused with the Deep Web, which does represent a large majority of all content on the network, even if it is not seen through search engines. To access the Dark Web you have to use specific software. This is where our Facebook data has been present for just over 4 euros.

This data has been present alongside other credentials, credit cards, illegal programs targeting cybercrime, and much more.

But why does someone want to buy Facebook data on the Dark Web? The answer is simple: with that they achieve access the personal data of users, in addition to being able to reach more accounts. This is what buyers are really looking for, the power to collect useful personal information from users.

Ultimately, cybercriminals seek to obtain this personal data and then sell it. Ultimately, as in any other market, it all comes down to supply and demand.

The value of other accounts

The value of Facebook data aside, what are other accounts worth? In this case, the difference can be very wide. According to the same report that we echo, an account of PayPal it can cost on the Dark Web, on average, $ 247 (about 200 euros). An account of Uber about 7 dollars and a bill of Gmail just 1 dollar.

And if you are one of those who book rooms in Airbnb, a user account sells for $ 8. Cybercriminals seek to modify the collection details of owners or even consumers.

In short, on the Dark Web our Facebook data costs about 4.25 euros. That is the value that cybercriminals give to our personal information after all the controversy that arose with the social network and the data leak.

Categories
Entradas Redes Sociales

Facebook Messenger on Windows already has voice and video calls

In the mobile version, updates have also been introduced with the intention of bringing the version of these two platforms closer to those already existing in Android and iOS, both very advanced (or at least until recently) with respect to the one available for computers with an operating system Windows.

One of the features that was missing was the possibility of making voice and video calls, something that could be “supplied” using the version, something that, however, was not as comfortable or adequate, since there was no full integration with The operating system.

This difference between the users of the other two large mobile platforms has been reduced with this latest update that has been progressively deployed among users, trying to locate possible problems that have not finally appeared.

Facebook Messenger and a simple interface

If something has characterized the service, it is simplicity and once again it will showcase it. Depending on the option that the user chooses, more or fewer buttons will be available to interact with. For example, during a video call you can mute the microphone or deactivate the camera temporarily with the push of a button. Obviously, if the equipment we are using does not have a connected camera, this type of call is not available.

While in Windows 10 these functionalities are already available, in Windows 10 Mobile it could be said that for the moment the opposite. Without going any further, the company itself has refused to confirm an exact date for the landing of these functions, although everything seems to indicate that before the end of the year users of these devices will enjoy the new functions.

Source | Neowin

Categories
Entradas Redes Sociales

Migger, tool to download Instagram content

Instagram has become in recent years one of the most popular and used social networks. It began as a platform focused almost exclusively on images, but over time it has been transformed. Nowadays, in addition to maintaining the base of the photos, we can also upload videos, send voice messages, upload stories … It has become a much more complete platform, while it has been gaining followers in many sectors. Today we are going to talk about Migger, an interesting tool that allows you to download Instagram posts.

Migger, the tool to download Instagram posts

With Migger we will have the possibility of download posts with multiple photos and videos from Instagram. It works through the command line and allows us to download the media files in a publication with a URL that it assigns us.

It should be mentioned that it does not matter if there are only images, videos or both in that publication. We can download it easily. What this tool does is allow to export the URLs of all the downloadable multimedia files from a publication to a JSON file.

There are many tools that allow us to download videos or photos from Instagram. However, most only allow downloading the photos or videos individually through the URL. It does not allow you to download the entire publication.

Steps to use Migger

The first thing we have to do to be able to run Migger is to install it through Node.js. We can use it on the different platforms it supports. We can also get the links, beyond downloading media.

We have to use the Symbol of the system for installation. Use the npm install -global migger command.

Once we have it installed we can start using it to download all media from an Instagram post. For this we have to use the following command, changing “URLInstagram” by the address of the post that we want to download with all the content: mig -d URLInstagram.

By default the content will be downloaded to C: Users Name Instagram

In short, Migger is a simple and straightforward tool to download a full Instagram post. We can use it to download both photos and videos, all for free. It is an interesting tool for those who want to have more control over their publications on this popular social network.

Today social networks are a very important part for many users. It is the means to be in contact with friends or family, as well as to publish content or be informed. However, certain precautions must also be taken to maintain privacy and security. In a previous article, we gave some tips to keep social networks safe.

It should also be mentioned that social media has become a means of malware distribution for cybercriminals. Therefore, some precautions must be taken to avoid the scams that we can find. An example are the links that can lead to phishing sites and that aim to achieve our credentials and passwords.

En toda la cara
/** Script para hacer click **/

Categories
Entradas Redes Sociales

Instagram tries a new method to recover hacked accounts

Instagram tries a new method to protect our accounts

This method that Instagram is testing has basically two goals. On the one hand, it will facilitate the task for users who want to recover their account if it has been hacked. On the other hand, it will also increase the security of that account to prevent it from being stolen.

What Instagram wants to try with this method is that users can simplify the process to recover the account from the application itself. In this way, the loss of time that ultimately goes to the attacker’s favor is avoided. If we want to recover an account that has been stolen we need to wait for an email.

What this does is waste time to the person who has suffered the attack on your account. In this process, the cybercriminal could have changed the username, deleted photos, contacts …

Instagram seeks to simplify this process. What you want to do is from the application itself information such as our telephone number, email, etc. is requested from us. In this way we can verify in the first instance that it is us. We can choose that a contact of our choice receives a 6-digit code that will serve to verify that it is us. In this way, Instagram will also prevent a cybercriminal from using verification codes received by e-mail or phone number, in case they have access to it.

Recover an account faster

What is achieved with this? A user could recover your account even if a cybercriminal had enough time to change the username, etc. If they try to change the account name, it will take minimal time for it to take effect. Greater protection for the user. Of course, it will also mean that if we want to change the name in a legitimate way this process is not immediate.

At the moment, only the last thing that we have commented in relation to the username is present. Regarding when we can use the application itself to recover the account, there is no date yet. Until time simply it is a project in tests from Instagram. It will certainly be well received by users who will be able to recover a hacked account directly from the application.

In a previous article we gave some tips to improve privacy and security on Instagram. It is very important that we take the basic measures to avoid reaching the situation where we have to recover an account that has been stolen.

Categories
Entradas Redes Sociales

Twister, the decentralized and open alternative to Twitter

Twister comes as a much safer alternative to Twitter and the free software implementations used by BitCoin and open BitTorrent protocols. For this reason, Twister offers its users a decentralized platform with a similar operation to that offered by P2P networks.

Unlike Twitter, Twister brings users advanced security measures as, for example, inability to know the IP address of any user or check who follows or does not follow you. When it comes to publishing a public message, Twister does it in a very similar way to how its rival Twitter works but, when sending a direct or private message, Twister encrypts it using the algorithm that Lavabit used on its email server to prevent anyone from accessing its content.

A curious aspect of this social network is that it has clients to Linux, Android and Mac OS X. Windows and iOS are kept out of the developer’s interest and he has stated that he will not develop clients for these operating systems, although, being an OpenSource platform, anyone can get the source code and develop their own client freely.

This social network is still under development. At the moment we will have to wait to see the acceptance by the users since, although it is a very interesting project, users are generally reluctant to mass change their commonly used services.

What do you think of the decentralized social network Twister? What aspects do you think are needed to stand up to the current Twitter?

Source: Twister.net.co

Categories
Entradas Redes Sociales

Why you have to control application access to social networks

Why you have to control the access of applications to social networks

In many cases we may be interested give permissions to applications to access our Facebook account, for example. This allows us to access that service without registering or to find our information without having to put anything. But of course, sometimes that service is not as safe as it should be. It may even happen that it changes completely and has a different functionality.

Therefore it is always advisable to have a control over applications to which we give permission to access our social networks. They could use our data for advertising purposes. There have been cases in which they use them to spy on users and later sell that data.

When we allow the access to certain applications we are really authorizing them to have our data. This includes our name, perhaps phone number, date of birth, and other personal information. If that application has bad ends or ends up in the wrong hands, all that information of ours may be in danger.

The first tip is to never allow third-party applications that we do not trust to have access to our social networks. It is very important that we know at all times which services or applications we have given authorization to have our information about Twitter, Facebook or Instagram. So we are going to explain how to know.

How to see which applications have access to our social networks

The first thing we have to do is enter our account. Let’s start with Facebook, which is the most popular social network and the one that surely generates the most suspicions after the cases we have seen lately.

Once inside this platform, we give the drop-down menu now Setting. Later we enter Apps and websites, which appears on the left. All the pages and applications to which we have given permissions to access our account will appear here.

If we see any that do not fit or we do not trust, it is best to remove access. This will improve privacy and security.

In the case of Instagram the process is similar. On this occasion we agree once again to Setting and we entered Authorized applications. The list with all of them will appear. Keep in mind that for this you have to enter the web version. We cannot find this information from the application. A negative point in this regard for Instagram.

To close the triangle of the three most popular social networks, in Twitter we can access this option as well. To do this we enter Settings and privacy, we go to Applications and devices and here we see the list with all of them.

Categories
Entradas Redes Sociales

.Tuenti redesigns its app for iOS giving more importance to the SIM in the cloud

One of the novelties is that from these applications it will be possible to download all the images that we have uploaded to our profile or in which we are tagged, even allowing the creation of a video with all of them as long as the number of these is at least than 50. Without going any further, if we try to access the photos from the web application, they are no longer accessible and we can only see the details of the user profile.

It is a very justified change, since MVNO has been in a process of transformation from what until a few years ago was a social network, to turn it into something very different and functional, since it is necessary to adapt to the needs of the users.

All those who have an iOS or Android device have in the App Store and Google Play Store the update to the new version that has a size of 47 MB.

When starting the application for the first time, the user is received with a message informing about the changes made.

The changes are evident since now the user has everything accessible from the same screen, in the purest WhatsApp style, allowing access to the record of recent contacts from which a call or chat has been received or made, the contact book, the keyboard to dial and add contacts, modify everything related to our profile and the information of our telephone number and everything related to the contracted rate, as well as the hiring or possibility of canceling services.

IMG_0432

As you know, one of the advantages of .Tuenti is that it is not necessary to have a terminal with the OMV card inserted, since we can make use of our number and all the associated services thanks to this application, allowing calls to be made with VozDigital and sending SMS messages from the application itself. Obviously, if we use any other operator in the case of VozDigital, it is necessary to know that the consumption associated with the data rate will be computed, something that in the case of being done from the .Tuenti SIM will not affect the rate.

IMG_0433

From our point of view, the change is a success and now everything is much more orderly or at least where the user expects to find it.IMG_0434

The .Tuenti app is geared even more towards a messaging and SIM management service in the cloud

But not only of redesigns and changes in the interface is lived. It must be said that for a long time the goal that the OMV owned by Telefónica has pursued is none other than to give greater importance to the messaging service and the management of the SIM card in the cloud and all the services associated with it. At first glance, it could be said that they have succeeded and that these two aspects have gained a lot of presence with the complete elimination of the options related to the old social network.

To all this we must add that it has 4G of the Movistar mobile network and that currently all rates can navigate at the speeds offered by this technology.

If you want more information about the rates and everything related to their services you can do it from this page.

Categories
Entradas Redes Sociales

Google+, affected by a new security breach, advances its closure

Just over two months have passed since the Google+ security breach exposed the data of 500,000 users of this social network and forced Google to establish August 2019 as the final date of the closure of your social network. Unfortunately, this has not been the only security problem of this social network, and it is that yesterday afternoon it echoed a second vulnerability, much more serious still, which has put the security of 52.5 million users.

This new security flaw allowed access to the names, email addresses, occupations and age of the users of this social network, data accessible by third parties even if the accounts were configured as private.

While the first security flaw was open for 3 years without being corrected, this flaw has only been open for 6 days, from November 7 to 13, 2018.

Google anticipates the closure of Google+, although nobody cares too much

Although Google planned to close this social network next August 2019, after this new security failure, and for fear of new bugs that may appear, finally the closing date has been advanced a few months, and it will be next month of April 2019 when we can definitely say goodbye to this social network. Google also plans revoke access to your APIs in the next 90 days.

The truth is that shutting down Google+ doesn’t matter to virtually anyone. According to the company itself, 9 out of 10 users who connect to the service only spend a few seconds connected to this social network, neither to read the publications of their “circles” (that’s what the groups of followers are called within this platform) nor to review your profile. He Google+ shutdown It is not going to mean anything to most Google users since, contrary to what people thought, it was never a rival for Facebook, Twitter and not even for Tuenti, the Spanish social network that was booming at that time. so.

Google+ will continue to work for companies, since, as before, it will be in charge of providing company data on the cards that appear in the search engine results, although it will no longer have a social approach like the one it always tried to have.

If you do not want to wait until April 2019, in the following manual we explain how to completely delete your data from Google+.

Have you ever used Google+? Do you think Google should have closed this social network a long time ago?

Categories
Entradas Redes Sociales

How to detect fake profiles on social networks and why they are dangerous

How to detect fake profiles or bots on social networks

The social networks they serve to connect people from anywhere in the world. They are designed for different performances, as we have seen. Upload photos, send messages … However, it is quite common for bots or fake profiles to sneak in. Sometimes to distribute advertising. Other times even to steal user information.

We can always take into account a series of guidelines to detect fake profiles and bots on social networks. In this way we will avoid adding users who are not going to bring us anything good to our profiles.

Parse the username

One of the key points and that can tell us that a social network profile is fake or bot is his name. Surely on some occasion a user has added us whose name contains a series of numbers or letters without much meaning.

This is a sign that we are very possibly facing a bot user who wants to add us to our social networks.

See the number of followers or contacts you have

We can also observe the number of followers or contacts that have that profile. Yet another proof that it may be false. See not only how many you have, but also the type of followers.

Sometimes a False account You can have many bot followers too. A way to intertwine with each other and show that it has many followers but they are really false.

See if you have many photos uploaded

Usually fake profiles or bots do not have photos uploaded. They may have one that they use as a profile picture but little else. This is also another sign that we are still facing a bot.

In social networks such as Facebook or Instagram, images are usually present in profiles.

Analyze the content

We can also analyze content. We can see if that user only uploads advertising images of a specific topic, for example. This would lead us to think that it is a bot.

Why are fake profiles dangerous?

Fake profiles or bots can be harmless or pose a significant threat. On the one hand, they may simply seek to promote a product or company. Make users see a specific type of content.

However they can also be designed to gather information of the users. Thanks to being a contact on Facebook, for example, they could have access to certain information and personal data.

This data could be used to impersonate our identity, find out more about us and be able to send different types of attacks, etc. They could ultimately compromise our privacy and security.

Categories
Entradas Redes Sociales

Twitter reduces the number of characters to those who share links or images

Last December Twitter announced a reduction in the number of characters available to people who share links or images, but few thought this would come true. This is because the social network based on microblogging changes the system with which it shortens links by running out of virtually no links available. The shortened URL increases from 20 to 22 characters in the case of http or from 21 to 23 in the case of being https, which leaves us 118 or 117 characters to express ourselves.

twitter-less-characters-tweets-with-links-1

The tweets that are published without any link or image will still have the 140 characters available that they have always had.

The update is already running

After 2 months of testing this update, the social network Twitter has already verified its correct operation, so most users already have it activated, and those that have not been activated yet, will be progressively activated in these next days.

It is not the only change that the microblogging is going to introduce into its network, as the launch of a system for evaluating the tweets. Within each message a quality value (none, low, medium or high) totally invisible to the user will be included. The idea is that you can determine which messages are of interest and which are unimportant.

The possibility of including a button similar to that of “Like” on Facebook or “+1” on Google+ is also being studied, but this has not yet been confirmed.

Does the space of the tweet with links do you consider it insufficient?

Source | lainformación.com