This presentation based on the Social Media Security Professional (SMSP) certification program powered by CompTIA investigates the personal a nd professional risks involved in unauthorized access to social media accounts. Using high profile security breaches as illustrations, we will explore the method and attack vectors used by hackers such as privacy assaults, data leakage and identity theft challenges via access-point spoofing and session hijacking. Dr. Scott Wells will demonstrate how easy it is to take over a social networking account via session hijacking, and will guide you through an evil twin attack to reveal its potential consequences to your personal and your organization's reputation. The presentation concludes with countermeasures such as Google's content based image searching to give you a security checkup and leave you with actionable steps to boost the security of your social media accounts.
Not one day goes by that you don't read about a high profile social media account being hacked into and the damage that was caused. In an attempt to stop the bleeding, social media platforms are responding with quick security fixes, some that work and some that don't. Through the analysis of high profile hacks and a live demonstration, Dr. Scott Wells will reveal system vulnerabilities and explore how well the new security measures address the problems at hand. The presentation concludes with best practices and actionable steps to help you boost the security of your personal and your organization's social media accounts. Click on "play webcast" below to start the presentation.
As Social Media continues to increase its overwhelming number of users and the volume of data continues to rise, the connectivity avenues are changing. According to recent studies, 31% of all smartphone online minutes are spent on social media and access to social media from mobile devices has increased by 63% in 2012, compared to 2011. From a social media security standpoint, this creates and even larger attack surface with new challenges.
Social Network Security on Mobile Devices explores privacy assaults, data leakage and identity theft challenges via access-point spoofing and session hijacking as we take our social media clients on the road.
Explore Social Media Security with UKI's master trainer and delve into the SMSP exam knowledge requirements with this one hour free online webcast. At the end of the session you will have a better understanding of social media technical composition and risks.