Tag Archives: CONTACTS

All Your Contacts Are Belong to Us (IVlast)

(BEING CONTINUED FROM  24/08/11) 5. SUGGESTIONS FOR IMPROVEMENTS  IN SOCIAL NETWORKSITE SECURITY Obviously, the user is the weakest link in social networking  sites. Many are not security-aware and there is oftentoo much implicit trust. However, even advanced users can  be … Continue reading

Posted in Computers and Internet | Tagged , , , | Leave a comment

All Your Contacts Are Belong to Us (III)

(BEING CONTINUED FROM  28/02/11) 4.2 Profile cloning In the first set of profile cloning experiments we performed,we first wanted to test how willing users would be to accept friendship requests from forged profiles of people who were  already on their … Continue reading

Posted in Computers and Internet | Tagged , , , | Leave a comment

All Your Contacts Are Belong to Us (II)

(BEING CONTINUED FROM  18/10/10) 3.2 Cross-site profile cloningIn the cross-site profile cloning attack, our aim is to identify victims who are registered in one social network, butnot in another. Our first aim, from the attacker’s point of  view, is to … Continue reading

Posted in Computers and Internet | Tagged , , , | Leave a comment