SlideShare una empresa de Scribd logo
1 de 13
Hosted by:
        Jeffrey Fox
        Technology Editor
Since 2004, Consumer Reports
   has published its annual
 State of the Net report
Some of this year’s findings …




   Where to find 2010 Consumer Reports State of the Net survey:
June 2010 issue of CONSUMER REPORTS or ConsumerReports.org
Key threat projections from the survey

* Cybercrime cost U.S. consumers $4.5 billion over the past two years

* 40 percent of households experienced at least one virus infection over the
past two years, a significant increase

* 2.1 million computers were replaced due to viruses and spyware during the
past two years

* 5.4 million online consumers submitted personal information to e-mail
(phishing) scammers during the past two years
Online identity theft
1.7 million online households identified an online source of ID theft in past year


                    Sources of online ID theft*
                                                                               Retail purchase

                                                  Financial transaction
                                     E-mail scam I responded
                                                to
                                Someone hacked into my
                                      computer
                       Social network site

                0           2             4            6            8     10       12
                                         % citing this source


          *Among respondents at least somewhat confident they knew source of theft




               Source: Consumer Reports 2010 State of the Net
                 Consumer Reports National Research Center
Social networks:
            Some common risky behaviors
* 52% of social network users disclose at least one piece of personal
information that could lead to identity theft or jeopardize their family
     38% post their full birth date (including the year)
     45% of those with children at home post photos of their children
     8% post their own street address

* Networks can be risky: 9 percent of online households experienced abuse
on a social network during the past year




                                           Projections from the 2010 survey
Abuse on social networks
• 5.1 million online households in the past year
                               Social network abuses*
                                                                                      Infected by malware from app
                                               Someone used my friends list to
                                                          spread virus
                                       Shared invitation with friends that
                                                  was a scam
                                     Shared app that infected friends
                                     Unauthorized use of log-in and
                                                identity
                                     I was harrassed or threatened
                      Someone solicted money in my
                                    name
            Submitted personal info to
               fraudulent "friend"
            Someone harmed my reputation

                                     Other

     0     5              10               15               20             25    30   35              40
                                           % reporting this type of abuse


                               *Among respondents reporting at least one abuse




           Source: Consumer Reports 2010 State of the Net
             Consumer Reports National Research Center
Social network privacy controls
                                                    Facebook

                                              MySpace

                                        Linked In

                              Twitter

                          Classmates

    0         20         40             60          80         100
 Percent of each service's users who have used privacy controls




    Source: Consumer Reports 2010 State of the Net
    Consumer Reports National Research Center
Social networks are becoming
         a new platform for cybercrime
Twitter spam

                                  Fake celebrity postings on
                                  “LinkedIn” leads users
                                   to malware




 Source: Personal e-mail In-box
This is not
                                             the first time
                                             that we’ve
                                             had to
                                             scrutinize
                                             Facebook’s
                                             policies



When our sister publication The
Consumerist disclosed the above
change in Facebook terms of service in
Feb 2009, it ignited a revolt and the site
was forced to back down (right)
Security and privacy on
          Projections from the 2010 survey
56% of Facebook users disclosed at least one piece of personal information that
could lead to identity theft or jeopardize their family

42% posted their birth date (including year)

7% posted their own street address

3% disclosed when they will be away from home

26% of Facebook users with children posted their children’s photos and names

23% of Facebook users didn’t use or didn’t know about the service’s privacy controls

18.4 million Facebook members used apps
    38% of app users were confident apps are secure--or haven’t thought about it

1.8 million computers were infected by apps obtained through one or another social
network in the past year
Facebook’s new instant personalization program:
How to block your friends from divulging info about you:




    1    2




                                     3




                                                           6




4
                            5
Thank you!
Jeffrey Fox, Technology Editor, foxjef@consumer.org




                Hosted by:

Más contenido relacionado

La actualidad más candente

Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
Patricia M Watson
 
Lawyers Suing China For 2 2 Billion Us Dollars
Lawyers Suing China For 2 2 Billion Us DollarsLawyers Suing China For 2 2 Billion Us Dollars
Lawyers Suing China For 2 2 Billion Us Dollars
MaximumHit Ltd
 

La actualidad más candente (20)

Rpt repeating-history
Rpt repeating-historyRpt repeating-history
Rpt repeating-history
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
Symantec Website Security Threat Report
Symantec Website Security Threat ReportSymantec Website Security Threat Report
Symantec Website Security Threat Report
 
Lawyers Suing China For 2 2 Billion Us Dollars
Lawyers Suing China For 2 2 Billion Us DollarsLawyers Suing China For 2 2 Billion Us Dollars
Lawyers Suing China For 2 2 Billion Us Dollars
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revista
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
Sanchez & Andaya - Etech
Sanchez & Andaya - EtechSanchez & Andaya - Etech
Sanchez & Andaya - Etech
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
 
My presentation
My presentationMy presentation
My presentation
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 

Destacado

As ms 3 10-2012
As ms 3 10-2012As ms 3 10-2012
As ms 3 10-2012
SpaanIt
 
Describe the situation with the greatest ethical complexity that you have faced
Describe the situation with the greatest ethical complexity that you have facedDescribe the situation with the greatest ethical complexity that you have faced
Describe the situation with the greatest ethical complexity that you have faced
Tolulope Osho
 
Must vs Don't have to IIº ppt
Must  vs  Don't have to  IIº   pptMust  vs  Don't have to  IIº   ppt
Must vs Don't have to IIº ppt
mluisa007
 

Destacado (20)

Listado de Premios de la campaña "Hologramas por la libertad"
Listado de Premios de la campaña "Hologramas por la libertad"Listado de Premios de la campaña "Hologramas por la libertad"
Listado de Premios de la campaña "Hologramas por la libertad"
 
Contribution to Migration, Displacement an Changing Mobiltiy Patterns - Impli...
Contribution to Migration, Displacement an Changing Mobiltiy Patterns - Impli...Contribution to Migration, Displacement an Changing Mobiltiy Patterns - Impli...
Contribution to Migration, Displacement an Changing Mobiltiy Patterns - Impli...
 
How to Publicize e-Learning Technology for Disaster Prevention Education
How to Publicize e-Learning Technology for Disaster Prevention EducationHow to Publicize e-Learning Technology for Disaster Prevention Education
How to Publicize e-Learning Technology for Disaster Prevention Education
 
การเชื่อม Mag
การเชื่อม Magการเชื่อม Mag
การเชื่อม Mag
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Spatial approximate string search
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Spatial approximate string searchJAVA 2013 IEEE CLOUDCOMPUTING PROJECT Spatial approximate string search
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Spatial approximate string search
 
p 910
p 910p 910
p 910
 
What Santa Can Teach You About E-mail Marketing
What Santa Can Teach You About E-mail MarketingWhat Santa Can Teach You About E-mail Marketing
What Santa Can Teach You About E-mail Marketing
 
Istiqomah
IstiqomahIstiqomah
Istiqomah
 
As ms 3 10-2012
As ms 3 10-2012As ms 3 10-2012
As ms 3 10-2012
 
FDI Risk Assessment: Toward best principle and best practice
FDI Risk Assessment: Toward best principle and best practiceFDI Risk Assessment: Toward best principle and best practice
FDI Risk Assessment: Toward best principle and best practice
 
City Marketing Plan : Cabarete
City Marketing Plan : CabareteCity Marketing Plan : Cabarete
City Marketing Plan : Cabarete
 
Efma journal2013 digital d_villaseca
Efma journal2013 digital d_villasecaEfma journal2013 digital d_villaseca
Efma journal2013 digital d_villaseca
 
Geomite carbon sequestration
Geomite carbon sequestrationGeomite carbon sequestration
Geomite carbon sequestration
 
Bwana mungu nashangaa kabisa - Swahili & English
Bwana mungu nashangaa kabisa - Swahili  & EnglishBwana mungu nashangaa kabisa - Swahili  & English
Bwana mungu nashangaa kabisa - Swahili & English
 
Tugas individu sik
Tugas individu sikTugas individu sik
Tugas individu sik
 
Energy Resources
Energy ResourcesEnergy Resources
Energy Resources
 
Built up Wood Beams
Built up Wood BeamsBuilt up Wood Beams
Built up Wood Beams
 
Digital Marketing Types
Digital Marketing TypesDigital Marketing Types
Digital Marketing Types
 
Describe the situation with the greatest ethical complexity that you have faced
Describe the situation with the greatest ethical complexity that you have facedDescribe the situation with the greatest ethical complexity that you have faced
Describe the situation with the greatest ethical complexity that you have faced
 
Must vs Don't have to IIº ppt
Must  vs  Don't have to  IIº   pptMust  vs  Don't have to  IIº   ppt
Must vs Don't have to IIº ppt
 

Similar a Social Insecurity Panel, Jeff Fox, Consumer Reports

Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpna
delamm2
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
Ray Brannon
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
Gerard1990
 
Increasing Vulnerability of the user Data at Cyberspace
Increasing Vulnerability of the user Data at CyberspaceIncreasing Vulnerability of the user Data at Cyberspace
Increasing Vulnerability of the user Data at Cyberspace
ijtsrd
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
todd521
 

Similar a Social Insecurity Panel, Jeff Fox, Consumer Reports (20)

Spam identification fake profile
Spam identification fake profileSpam identification fake profile
Spam identification fake profile
 
Users and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityUsers and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & Security
 
Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpna
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Users and Behaviors- Social Internet
Users and Behaviors- Social InternetUsers and Behaviors- Social Internet
Users and Behaviors- Social Internet
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Increasing Vulnerability of the user Data at Cyberspace
Increasing Vulnerability of the user Data at CyberspaceIncreasing Vulnerability of the user Data at Cyberspace
Increasing Vulnerability of the user Data at Cyberspace
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Darkside
DarksideDarkside
Darkside
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
Facebook
FacebookFacebook
Facebook
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Social Insecurity Panel, Jeff Fox, Consumer Reports

  • 1. Hosted by: Jeffrey Fox Technology Editor
  • 2. Since 2004, Consumer Reports has published its annual State of the Net report
  • 3. Some of this year’s findings … Where to find 2010 Consumer Reports State of the Net survey: June 2010 issue of CONSUMER REPORTS or ConsumerReports.org
  • 4. Key threat projections from the survey * Cybercrime cost U.S. consumers $4.5 billion over the past two years * 40 percent of households experienced at least one virus infection over the past two years, a significant increase * 2.1 million computers were replaced due to viruses and spyware during the past two years * 5.4 million online consumers submitted personal information to e-mail (phishing) scammers during the past two years
  • 5. Online identity theft 1.7 million online households identified an online source of ID theft in past year Sources of online ID theft* Retail purchase Financial transaction E-mail scam I responded to Someone hacked into my computer Social network site 0 2 4 6 8 10 12 % citing this source *Among respondents at least somewhat confident they knew source of theft Source: Consumer Reports 2010 State of the Net Consumer Reports National Research Center
  • 6. Social networks: Some common risky behaviors * 52% of social network users disclose at least one piece of personal information that could lead to identity theft or jeopardize their family 38% post their full birth date (including the year) 45% of those with children at home post photos of their children 8% post their own street address * Networks can be risky: 9 percent of online households experienced abuse on a social network during the past year Projections from the 2010 survey
  • 7. Abuse on social networks • 5.1 million online households in the past year Social network abuses* Infected by malware from app Someone used my friends list to spread virus Shared invitation with friends that was a scam Shared app that infected friends Unauthorized use of log-in and identity I was harrassed or threatened Someone solicted money in my name Submitted personal info to fraudulent "friend" Someone harmed my reputation Other 0 5 10 15 20 25 30 35 40 % reporting this type of abuse *Among respondents reporting at least one abuse Source: Consumer Reports 2010 State of the Net Consumer Reports National Research Center
  • 8. Social network privacy controls Facebook MySpace Linked In Twitter Classmates 0 20 40 60 80 100 Percent of each service's users who have used privacy controls Source: Consumer Reports 2010 State of the Net Consumer Reports National Research Center
  • 9. Social networks are becoming a new platform for cybercrime Twitter spam Fake celebrity postings on “LinkedIn” leads users to malware Source: Personal e-mail In-box
  • 10. This is not the first time that we’ve had to scrutinize Facebook’s policies When our sister publication The Consumerist disclosed the above change in Facebook terms of service in Feb 2009, it ignited a revolt and the site was forced to back down (right)
  • 11. Security and privacy on Projections from the 2010 survey 56% of Facebook users disclosed at least one piece of personal information that could lead to identity theft or jeopardize their family 42% posted their birth date (including year) 7% posted their own street address 3% disclosed when they will be away from home 26% of Facebook users with children posted their children’s photos and names 23% of Facebook users didn’t use or didn’t know about the service’s privacy controls 18.4 million Facebook members used apps 38% of app users were confident apps are secure--or haven’t thought about it 1.8 million computers were infected by apps obtained through one or another social network in the past year
  • 12. Facebook’s new instant personalization program: How to block your friends from divulging info about you: 1 2 3 6 4 5
  • 13. Thank you! Jeffrey Fox, Technology Editor, foxjef@consumer.org Hosted by: