Facebook

VULNERABILITIES
  1. Passwords
  2. Public posts
  3. Privacy Settings
  4. Tags
  5. Check-ins: Check-ins by you or people close to you can disclose your location
  6. Messenger: auto pings location if you double click on a message
  7. Phishing attempts
  8. Photo Recognition
WHAT YOU CAN DO ABOUT IT
  1. Log out when you are not using the account
  2. Don’t upload any photos and ask anyone who takes a photo of you not to share
  3. Disable automatic tagging of your name in status updates & in suggested photos
  4. Disable the option for your friends to check you into places, and set your check-ins as visible only to you - read how here.
  5. Go to the privacy settings (see References) and set them to the highest level.
  6. Deactivate location sharing for messenger app on your phone - see here for instructions.
  7. Don’t login to your account on a public computerUse two-step verification
  8. Click the padlock icon located in the top right corner and select the ‘More Settings’ link or log into facebook on your browser and follow this link or see this video
  9. Use where you’re logged in to tell if someone else is logged into your account.


    High threat level: Download your profile information\/data in case you need it as evidence in a legal case, then deactivate or delete your account.

Privacy Settings

Who can see my stuff?

Who can contact me?

How do I stop someone from bothering me?


Twitter

VULNERABILITIES
  1. Password
  2. Location Settings
  3. Anyone else tagging you
  4. Check-ins
  5. Phishing attempts
  6. Integrating apps
  7. Harassment
WHAT YOU CAN DO ABOUT IT
  1. Two-step verification
  2. Granting apps to your Twitter account may leave you vulnerable - if someone hacks into an app, they can get your Twitter login details as well. Make sure to revoke app access under ‘Apps’ on your Twitter account
  3. Block harassers using Block Together ; The Twitter Safety Center ; Guide to reporting on Twitter ; Abusive behavior and violent threats ; Private information


    High threat level: delete account

Privacy settings


Google Account

VULNERABILITIES
  1. Tracking
  2. Location settings
  3. Privacy settings
  4. Phishing attempts
WHAT YOU CAN DO ABOUT IT
  1. Log out when you are not using the account Two-step verification
  2. Don’t upload any photos and ask anyone who takes a photo of you not to share
  3. Disable automatic tagging
  4. Use highest security settings details in the References Section
  5. Don’t login to your account on a public computer


    High threat level: delete account


Foursquare or other check-in apps

VULNERABILITIES
  1. Password
  2. Anyone else checking you in
  3. Check-ins
WHAT YOU CAN DO ABOUT IT
  1. Delete/uninstall check-in apps from your phone
  2. If you need to use it, access without an account

results matching ""

    No results matching ""