Tag: social networking

You could be using your phone to sign in to Facebook on the big screen

Article

Apple TV 4th Generation press picture courtesy of Apple

You could be able to log in to Facebook on this device using your smartphone’s Facebook client

Facebook Login Updated for tvOS, FireTV, Android | AdWeek SocialTimes

From the horse’s mouth

Facebook

Developer News Press Release

Improving Facebook Login For TV and Android

My Comments

A holy grail that is being achieved for online services is to allow users to authenticate with these services when using a device that has a limited user interface.

TV remote control

A typical smart-TV remote control that can only offer “pick-and-choose” or 12-key data entry

An example of this is a Smart TV or set-top device, where the remote control for these devices has a D-pad and a numeric keypad. Similarly, you have a printer where the only interface is a D-pad or touchscreen, with a numeric keypad only for those machines that have fax capabilities.

Here, it would take a long time to enter one’s credentials for these services due to the nature of the interface. This is down to a very small software keyboard on a touchscreen, using “SMS-style” text entry on the keypad or “pick-and-choose” text entry using the D-pad.

Facebook initially looked at this problem by displaying an authentication code on the device’s user interface or printing this code out when you want to use it from that device. Then you go to a Web-enabled computer or mobile device and log in to facebook.com/device and transcribe that code in to the page to authenticate the device with Facebook.

Here, they are realising that these devices have some role with the Social Web, whether to permit single sign-on, allow you to view photos on your account or use it as part of a comment trail. But they also know that most of us are working our Facebook accounts from our smartphones or tablets very frequently and are doing so with their native mobile client app.

But they are taking a leaf out of DIAL (DIscovery And Launch) which is being used as a way to permit us to throw YouTube or Netflix sessions that we start on our mobile devices to the big screen via our home networks. It avoids a long rigmarole of finding a “pairing screen” on both the large-screen and mobile apps, then transcribing a PIN or association code from the large screen to the mobile client to be able to have it on the TV screen,

This is where you will end up authenticating that big-screen app's Facebook login request

This is where you will end up authenticating that big-screen app’s Facebook login request

What Facebook are now doing for the 4th generation Apple TV (tvOS) and Android-based TV/video peripheral platforms (Android TV / Amazon FireTV) is to use the mobile client app to authenticate.

Here, you use a newer version of the Facebook mobile client, the Facebook Lite client or the Google Chrome Custom Tabs to authenticate with the big screen across the home network. The TV or set-top device, along with the mobile device running the Facebook mobile client both have to be on the same logical network which would represent most small networks. It is irrespective of how each device is physically connected to the network such as a mobile device using Wi-Fi wireless and the Apple TV connected via HomePlug AV500 powerline to the router for reliability.

What will happen is that the TV app that wants to use Facebook will show an authentication code on the screen. Then you go to the “hamburger” icon in your Facebook mobile client and select “Device Requests” under Apps. There will be a description of the app and the device that is wanting you to log in, along with the authentication code you saw an the TV screen. Once you are sure, you would tap “Confirm” to effectively log in from the big screen.

At the moment, this functionality is being rolled out to tvOS and Android-based devices with them being the first two to support the addition and improvement of application programming interfaces. But I would see this being rolled out for more of the Smart TV, set-top box and similar device platforms as Facebook works through them all.

Spotify login screen

This kind of single-sign-on could apply to your Smart TV

One issue that may have to crop up would be to cater for group scenarios, which is a reality with consumer electronics that end up being used by all of the household. Here, software developers may want to allow multiple people to log in on the same device, which may be considered important for games with a multiplayer element, or to allow multiple users to be logged in but with one user having priority over the device at a particular time like during an on-screen poll or with a photo app.

Another question that could be raised is where Facebook is used as the “hub” of a user’s single-sign-on experience. Here, an increasing number of online services including games are implementing Facebook as one of the “social sign-on” options and the improved sign-on experience for devices could be implemented as a way to permit this form of social sign-on across the apps and services offered on a Smart TV for example. It could subsequently be feasible to persist current login / logout / active-user status across one device with all the apps following that status.

Other social-media, messaging or similar platforms can use this technology as a way to simplify the login process for client-side devices that use very limited user interfaces. This is especially where the smartphone becomes the core device where the user base interacts with these platforms frequently.

Facebook videos can be thrown from your mobile device to the big screen

Article

AirPlay devices discovered by iPad

Facebook videos can be directed to that Apple TV or Chromecast device

Now you can stream Facebook video on your TV | Mashable

My Comments

You are flicking through what your friends have posted up on Facebook and have come across that interesting video one of them put up from their trip or family event. But you would like to give it the “big screen” treatment by showing it on the large TV in the lounge so everyone can watch.

Now you will be able to with the Facebook native apps for the iOS and Android mobile platforms. Here, you can “throw” the video to a TV that is connected to an Apple TV or Chromecast / Google Cast device on the same home network as your mobile device. This will apply to videos offered by your Friends and Pages that you follow including any of the Facebook Live content that is made available.

A frame from a Facebook video that could be given the big-screen treatment

A frame from a Facebook video that could be given the big-screen treatment

Here, when you see the Facebook video on the latest iteration of your Facebook native client, you will see a TV icon beside the transport controls for the video. When you tap that icon, you will see a list of the Apple TV or Chromecast devices on your network that you can “throw” the video to. Once you select the device you want to stream the video to, then it will appear on the TV.

Facebook also values the idea of you being able to continue browsing the social network while the video plays, something that can be useful for following comments left regarding that videoclip.

Apple TV 4th Generation press picture courtesy of Apple

One of these devices could take Facebook on your iPhone further

The article also reckoned that Facebook exploiting Google Cast and Apple AirPlay rather than creating native apps for the Android TV and Apple TV platforms is a cheaper option. But I also see it as an advantage because you don’t need to support multiple sign-ons which both platforms would require thanks to the large-screen TV being used by many people.

A good question to raise is whether you could do this same activity with photos that have been uploaded to Facebook. This is because, from my experience with Facebook, people who are travelling tend to press their presence on this social network and Instagram, its stablemate, in to service as an always-updated travelogue during the journey by uploading some impressive images from their travels. Here, you may want to show these images from these collections on that big screen in a manner that does them justice.

At least Facebook are making efforts to exploit the big screen in the lounge by using Apple TV and Google Cast technology as a way to throw videos and Facebook Live activity to it.

New online-abuse Website launched in the UK

Articles

UK government tackles online abuse with anti-trolling website | We Live Security blog (ESET)

Cyberbullies: Anti-trolling website launched to help victims | The Independent

Government launches anti-trolling website to help victims of online abuse | The Guardian

Previous Coverage

What can you do about people who use the Social Web to menace

Dealing with Internet trolls

From the horse’s mouth

Stop Online Abuse (UK-based)

My Comments

The UK government have launched a Website focusing on online abuse and how to deal with it, including legal remedies and resources.

It is focused more towards women and the LGBT (gay/lesbian/bi/trans) community who are facing these issues because, from various surveys, these user groups are often copping it the most. This covers online abouse related to domestic violence, sexism and sexual harassment, along with homophobia and related anti-LGBT abuse. But there are other situations where people do suffer in silence such as general racism, issues-focused or business-level disputes.

I see the “Stop Online Abuse” website applying to all situations where the Internet is involved and a lot of the commentary is very generic. But I do see some limitations with the legal remedies because there may be difficulties with applying them when situations happen across jurisdictions as is the norm with the Internet.

For example, the crime of “sending messages using any public electronic communications network such as Twitter or Facebook, which are grossly offensive or of an indecent, obscene or menacing character” that is part of the UK’s Communications Act 2003 may have a legal equivalent in your jurisdiction. This may be in the form of one or more national communications statute that proscribes the use of a communications service or “common carriage service” to harass others. Similarly, there are court injunctions that were cited for the UK like the Family Law Act 1996 Non-Molestation Order or the Protection From Harassment Act 1997 restraining order that have equivalents under your jurisdiction’s criminal, civil or family law but with different names.

It is worth contacting your local citizen’s advice bureau or similar government or voluntary organisation for more resources. Infact, locating an organisation that specialises in your particular circumstances like a domestic-violence support organisation may provide you with better information suited to your exact needs.

Similarly, it is a wise move for these organisations to “bone up” on the issue of online abuse so they can provide the right advice to suit their clients’ situations and needs. National, regional and local governments along with the judiciary can also see this site as a chance to provide a Web-hosted “one-stop shop” for their constituents to know more about these issues. This is in addition to creating legislative remedies for online-abuse problems. As well, as each case is litigated in a family, criminal or civil context, the knowledge created from the legal action can be used to tackle this situation better in the courtroom.

Older people using the Internet to link with relatives and friends

Article

The rise of the ‘GranTechie’: closing the generational gap | NBN Press Releases

My Comments

Skype Android

Skype for Android – one of the popular videoconferencing clients

It is now being identified that older people are finding computers and the Internet as valuable communications tools.

One technology that has allowed for this is videocalling that has been facilitated by Skype and Facetime. Both these popular IP videocalling applications have been engineered for simplified operation such as not needing any setup or configuration as far as the network is concerned. As well, Apple baked Facetime in to newer versions of the iOS mobile platform and made sure it had hooks to the user’s contacts directory on their iPhone as well as providing integrated behaviours for this solution. Similarly, Skype is being written to take advantage of application-programming interfaces that the various platforms offer as regards with directory management and other things are concerned. As well, there are smart-TVs and video peripherals that can work as Skype videophones once you add a camera / microphone accessory. These have made the process of making and taking videocalls more simplified and task-focused.

Lenovo Yoga Tablet 2 tablet

The Lenovo Yoga Tablet 2 tablet – good for Skyping to relatives

As the article has said, the main driver with this is for people and families to communicate with relatives and friends who are separated by distance. An example of this that I have seen for myself was seeing a friend of mine in an armchair at home using their iPhone to engage in a long Facetime videocall conversation with another interstate friend who had a young child. Here, she talked to that friend’s child as though she and the child were in the same room. Similarly, an Italian who is my barber and whose computer I regularly support also makes use of Skype to keep in touch with his family in Italy.

Old lady making a video call at the dinner table press picture courtesy of NBNCo

A video call at the dining table

Other technologies that were being embraced were Facebook and email as ways to share messages and photos. They were also raising the issue of the Internet being used to allow this kind of connection on a highly-frequent basis such as every week. The article also highlighted the smartphone and tablet as an enabling form factor due to their highly-portable nature – they can use these devices from where they are highly comfortable as I have cited before. In some cases, it has become possible to show the distant relative around the house simply by carrying one of these devices around during the videocall.

A technique worth investigating and showing to older people and their families is the use of Dropbox and similar services as a way to distribute high-resolution photos and video footage in a manner that allows the relatives to “take it further” like creating high-resolution prints. I highlighted this in an article about making Dropbox and similar services work with a DLNA-capable NAS highlighting the applications like printing, showing on a DLNA-capable TV, or maintaining occasion-based photo/video content pools consisting of images contributed by many people.

What has been shown in the article is that a killer application has been identified for personal-computing and Internet technology amongst a certain class of users. This killer application is for older people to use this technology to maintain contact with distant relatives and friends in an improved manner.

Beware of fake posts and online scams relating to the Nepal earthquake

Previous coverage

Malaysia Airlines air disaster–another event bringing out the online scams

My Comments

Just lately, a disaster that has affected many people has occurred with many casualties in the form of the Nepal earthquake.

But what follows on the tail of these disasters is an avalanche of spam email and flaky social-media posts that offer extra insight or paths to assistance for people who are touched by these events. As well, it is the time when scams pretending to be charity appeals intending to provide aid to the victims of this earthquake also appear on the Internet. It is something I have drawn attention to previously when there was the Malaysian Airlines MH370 air disaster which drew out these scams and am drawing attention to in relation to the latest earthquake. But they lead you to malware or to harvest users’ personal or financial details. In these situations, it pays to think before you click on that link so you are safe with the Net.

Check for legitimate resources that offer information about your relatives’ or friends’ wellbeing and some of these could include Nepalese consulates in your area, the Red Cross or similar services and work with them “from the horse’s mouth”. That means to deal with official websites that are known to the public and are usually published by the media as part of their coverage on the issue.

Facebook does offer a legitimate Safety Check service which comes in to play during civil emergencies. Here, it would identify if one was in an affected geographical area and allow the person to interact with them to know if they are safe and this status would appear in your Facebook Friends’ news feed. For that concerned person, they would be able to check on the News Feed for their relative’s or friend’s status. But be careful of any “fake friends” that appear around the time of this disaster and any post from a friend of yours that isn’t known to be in the area but is out of order should be questioned.

As for charity appeals, most of the media provide information about legitimate fundraising efforts that are taking place so you don’t get fleeced easily.

What to do is to be aware and careful with using the Internet to find details about who is affected by a major event and check with trusted resources.

What is social sign-on?

Spotify login screen

Spotify login screen with option to login using Facebook

A trend that is being associated with online services or applications is to provide “social sign-on” for new and existing users of these services. This is based around the concept of single sign-on where you use one set of credentials verified by one service to authenticate with one or more other services. This time, the credential pool that is used for authenticating users is your membership with a social network like Facebook or Twitter. The expression is sometimes extended to cover other authentication-data pools like Microsoft’s authentication services associated with Outlook.com/Hotmail, Windows 8 or XBox; or Google’s authentication services used for GMail and YouTube.

TripAdvisor Webpage

TripAdvisor webpage with social sign-on and personalisation from Facebook

In a social sign-on arrangement, your credentials are held and tested at the social-network’s servers and both the online service and the social network create a unique “token” or “key” to link and authenticate your presence on these services. The common methods that these services use are based around the OAuth or OpenID protocols used for single sign-on across multiple services.

Social sign-on concept diagram

Social sign-on concept diagram – relationship between the social network and online service

As well, your social attributes (name, birthdate, etc) that you have stored on the social network’s servers would be copied in to your account on the online service when this account is being provisioned. You will know about this when your social network pops up a screen asking you whether to allow the online service to gain access to your details held at the social network.

Advantages

There are some key advantages with using a social sign-on setup.

One is to benefit from a simplified provisioning process for your online service. This is without the need to key in the same data across multiple services. It also includes use of a pre-authenticated email address which is considered of high value with forums, commenting facilities and the like because most social networks especially Facebook, Google and Microsoft implement strong measures to combat fraudulent identities.

We also benefit because there are fewer sets of credentials to remember. As well, if a social network implements improved user-security measures like multifactor authentication or “trusted-device” operation, this flows on to the online service we use.

Some of the online services also can provide a personalised experience such as granting you birthday wishes on your birthday, including making those “special birthdays” such as the “big zeros” or the 21sts highly special.

Disadvantages

The disadvantages that can occur include weak links in the authentication protocols and a total dependence on access to and the security of a particular social-network account.

This also encompasses situations where a workplace or school may implement measures to shut out access to social networks in the name of productivity or an oppressive regime may shut out access to the popular social networks to curtail free speech. This can limit access to the online service because of its dependence on the social network.

How can it be operated properly

To assure users of their privacy, a social sign-on setup needs to identify any attributes that it is obtaining from a social network and give the user consent to obtain the attributes. As well, the login procedure should allow for one to create a login that is independent of a social network whether in conjunction with a social-network presence or not.

Similarly, the concept of social sign-on could be exploited by social networks and other authentication services to support simple-but-secure login for living-room applications. This is, from my experience, something that needs to be worked on because such devices require a lot of “pick-and-choose” data entry using a remote control’s D-pad to enter user credentials for online services. As well, many different users are likely to use the same living-room device.

You may have to pay special attention to your online services when you move location

Article

House

Keeping your details up to date when you move location may not be difficult

Moving houses can leave you disconnected | The Australian

My Comments

You may be moving house or business location for one of many different reasons but one common mistake many people make especially with their online life is not to factor it in when you do your move. This can lead to problems and customer-support calls when you have established yourself in your new location.

Your communications services

As soon as your move is imminent, make sure that your utilities including your communications services are set up to be connected and enabled at the new address by the day you move. If you can, make sure that you can keep the existing service going at your old address for the weeks that are bracketing the date of your move.

You may have to identify which of the communications services you can carry with you when you are moving. If this is a short move that is happening across town, you may be able to use the same services but longer-distance moves may require you to change operators. This is more so when you are moving in to an area where your current operator doesn’t have a footprint or cannot provide the service with the same level of continuity as before.

Your mobile phone may be a strong ally here

Your mobile phone may be a strong ally here

During the first week of your arrival at your new premises, you may have to spend some time “tweaking” your Wi-Fi network so that it is not clashing with your neighbours’ Wi-Fi networks. Here, you would have to change the channels that the router and/or access points work on, but you don’t have to change your SSID or security parameters.

Online services

As part of your move, you would be updating your contact details with your employer, your bank, the electoral registry, the taxman and similar organisations. But you may also need to manage other details like cloud-based storage services, online subscriptions and similar services. This may, for some services like social networks, require you to update your current physical address, email address or telephone numbers.

Some of these services may have particular dependencies like your email address or telephone number, especially for verification or authentication purposes. Here, they may allow you to supply multiple email addresses as “alternate” addresses and you can make use of this through the weeks or months that are bracketing your move date. As well, services that use an email address rather than a username as the login parameter may allow you to maintain this address as the login parameter even though you have changed email addresses.

Skype with uncluttered Modern user interface

Skype can serve as a temporary telephone service

If your service is dependent on an email address, you may have to supply an email address that isn’t related to a fixed Internet service for the duration of the move. This can be an address related to a Website you create, your workplace’s email address if you work for the same employer or simply a Webmail address like Gmail.com or Outlook.com (formerly Hotmail) . This is important if the fixed Internet service doesn’t operate in the territory you are moving into or you simply want to use your move as an excuse to change Internet-service operators.

If your service is dependent on a phone number, you may need to associate it with a currently-operating mobile phone number. Here, you may be able to add your mobile number to the phone numbers associated with the service or replace any defunct numbers with your working mobile or VoIP number.

For that matter, Skype offers an inbound VoIP service for an extra cost so you can allow people to contact you on your Skype account and software by dialling the equivalent of a landline number that is in a locality of your choosing. But some localities like Germany may make this difficult to preserve the integrity of their landline numbering plan.

Other issues you may look at include the feasibility of having your email and phone calls diverted to your new phone number or email address or, in the case of an email mailbox associated with a fixed broadband provider, keeping that mailbox open for as long as possible independent of you maintaining the broadband service. Depending on the service provider, this may be provided for a modest fee or for free especially if you are moving or your premises is undergoing renovations.

Special cases

Moving to temporary accommodation

Rydges Melbourne

What if you have to move to a hotel or similar location as part of a temporary move?

Some of you may be moving to temporary accommodation like a friend’s home, a short-term rental or a hotel for a significant time. This may be due to various reasons like major repairs or renovations taking place on your home, a project that is part of your work or until you find permanent accommodation when you move in to a new area.

Here, you may have to see if you can gain access to your fixed broadband service’s mailbox or simply shift your mailbox over to a geographically-independent email service like a Webmail or workplace/business account. You could then implement your mobile or VoIP service as the phone number for your online services and use this to receive all your calls.

Some hotels and similar locations may support inbound direct dial to the room’s phone, typically with a standard phone number that has the room number as the last digits. Here, it is worth asking the Front Desk in these places about whether these places offer this service and the number you need to give out. This will play its part as a specific landline number for the duration of your temporary stay there and can work with those services that can work with landline voice services.

Moving overseas

Another special case would be to move to another country. This ma be typically due to work or similar placements or the desire to simply emigrate somewhere else.

This is more about uprooting all your online services. Here, you may have to establish a mobile service in your destination country with a number local to that place and use this as your primary phone service. This can be facilitated with various “SIM-only” plans that most of the local providers have.

As well, you would have to use the geographically-independent email mailbox as your email address. Here, you can keep most of the cloud-based services going using the email address, and you can implement app-based two-factor authentication for those online services that rely on your mobile phone number as the second factor if they support app-based authentication.

Conclusion

When you move between locations, you need to make sure you can move your digital life. This includes having an email address or phone number that you can gain access to through the move associated with your online services and updating your details with these services so you can gain access to them at all times.

As well,it is also about making sure you have continual access to your communications and Internet services whether through the previous provider or a newer provider.

Dealing with Internet trolls

Article

How to kill a troll | Naked Security (Sophos)

My Comments

Anyone who has a personal Internet presence on a message board, social network or similar environment or operates such a presence for their company or other organisation can end up facing the worst side of the Internet.

This is typically in the form of the “Internet trolls” who exist on message boards, social networks, blog comment trails and online chat rooms just to cause trouble. This has manifested in online harassment which is mainly in the form of schoolyard-grade activity like foul names or targeted embarrassment attempts. But there have been acts like physical threats against person, animal and property; stalking, sustained harassment and sexual harassment with young women being the main victims.

It included a situation that I faced regarding a café I regularly visited where their Facebook presence was tarnished with foul comments because the business didn’t permit a protest group to put some flyers about their campaign by their cash register. Here, I was defending the café in their stance regarding what had happened.

But what can you do? You could block the accounts where the behaviour is coming and implement technological measures that do this for you. Here, such measures work on logic like blocking relatively young accounts that mention you, accounts with very few followers that mention you or accounts that generate replies containing certain keywords.

On the other hand, you could embarrass the source of the comments. This plays on various analogies associated with social taboos like in-workplace sexual harassment where a person isn’t just hauled up before law courts but the court of public opinion doesn’t look favourably on them. This would be hard to implement in the online world due to the ease in which one can create an anonymous online presence such as with the use of multiple disposable emails or pseudonyms.

Some countries like the UK have given their online-harassment laws more teeth such as legislating for longer prison terms. To the same extent, we should be encouraged to use all of the civil and criminal laws available to us as a tool to deal with Internet trolls, but a key problem is working with the problem from a cross-jurisdictional angle. This is where you identify that the activity is appearing from another state within the same country in the case of countries like Germany, Australia and USA, or another country; such as someone residing in the UK being harassed by someone using a computer located in New York State in the USA.

As well, there have been various PR activities to pillory the trolls such as Mary Beard’s activity after being victimised by schoolyard-grade online behaviour. She wasn’t afraid to speak her mind on British TV and had her friends and supporters work together to “fight back” against the troublemakers. Businesses and organisations who have been “got at” by trolls can use their loyal support base who have an active online presence such as their regular customers to work together for this same goal. 

Let’s not forget that the channels that exist to report trouble on a social network, bulletin board, chat forum or the like do exist for you to report this kind of trouble.

Personally, I would encourage any campaign to crack down on Internet trolling to be done as a group of many people. They can pool resources and use their contacts to work together to defend the people who are being affected or make life hard for the troublemakers. This can manifest in using technological tools to limit their effect on the affected forums, using civil and criminal legal action against the troublemakers or use online and offline public-relations efforts with a view to pillory them.

Sometimes some disturbing situations that happen with social networking, Internet forums, instant messaging and the like may require you to simply ignore or block trouble on the Internet but others may require you to work actively against it.

Skype to work on concurrent notification annoyances

Article

Skype Just Fixed the Single Most Annoying Thing About Notifications | Gizmodo

From the horse’s mouth

Skype

Blog Post

My Comments

Skype with uncluttered Modern user interface

If you work with Skype on your Windows tablet, your Android smartphone doesn’t beep when your Skype correspondent replies

A common annoyance with instant messaging or social-networking usage is all your devices beeping and lighting up when your correspondent replies to you while you are chatting with them. This is typically because most of us want to install native client-side applications for our favourite instant-messaging services and social networks on each of our devices and have them logged in to the services at the same time.

Skype are tackling this in an application-wide manner by determine which actual Skype client you are actually interacting with at a particular time during a conversation. This then allows the service to mute all other Skype apps that are currently logged in to reduce this problem when it comes to your text messages.

The behaviour will return to normal when you aren’t interacting with Skype or when a call notification comes in so you don’t miss conversation opportunities. A question that can be raised with this functionality is what if you want to “jump” from one device to another such as to instigate your text conversation on your laptop but want to continue it on your tablet which you use while lying on the couch. Here, if you are starting a reply on the second device such as the tablet in the above situation, the app  on the second device should detect the activity and enable its audio prompts.

It may be easy to think of having platform-wide methods of detecting actual interaction so as to, for example, squelch other devices’ alert sounds when you are chatting. But this would have to be achieved on an application level with the application’s server or host knowing which device you are interacting with when you operating that device due to the requirement to work in a cross-platform environment.

At least Skype have answered a situation that ICQ and other instant-messaging systems haven’t anticipated – one owning many different devices for surfing the Internet and having them monitor instant-messaging services.

Malaysia Airlines air disaster–another event bringing out the online scams

Article

Fake Malaysia Airlines links spread malware | CNET News

My Comments

Every time there is a major event that affects many people or brings out mass intrigue, a computer-security situation climbs on to that event’s tail.

What happens is that Websites with a questionable motive pop up like nobody’s business and links to these sites appear in spam emails or on the Social Web. The “link-bait” text draws people to these sites are laden with malware or set up to harvest Web-surfers’ personal or financial information for questionable purposes. The Malaysian Airlines air disaster drew out its own link-bait in the form of fake news links that purport to lead to video footage of the plane being discovered or survivors being found.

A proper practice is to keep the software on personal and other computer equipment “lock-step” with the latest software updates and patches and simply to “think before you click”. This is more so with anything that appears “too good to be true” or “out of the norm” for that situation.

Facebook users also have to be careful about the “fake events” which are being used as a spam-distribution vector. Here, as I previously covered, this causes notifications to appear in the user’s Facebook Notification list with your computer or mobile device popping up messages and sounding an audible alert to these notifications if a Facebook client is running. As well, if a user accepts these events, information appears on their Timeline about that event.