Thursday, November 4, 2010

At the CSM-ACE 2010 (pt 2)

The second speaker at the CSM-ACE 2010 was IT consultant S. A. Khor.

The very funny Mr S. A. Khor. His picture's a bit small, sorry!

Mr Khor had a personal story to tell. Alicia was a teenaged girl, his daughter's friend. It all started when she got an iPhone for her birthday.

On Monday, she Tweeted: "Daddy just bought a BMW X5!"

On Tuesday, she Tweeted: "Driver is picking me up in the Merz today, X5 hasn't arrived yet".

On Wednesday, she Tweeted: "I don't want to go to music class in 1U!"

And on Thursday, she Tweeted that the driver was late to pick her up for ballet class.

This went on until Christmas Eve of 2009, the day in which she disappeared.

True enough, she was made vulnerable via her social networking sites. The crooks could find out from her Facebook page what she looked like, her birth date, family members, address, and her school. And from the photos she took during her birthday, they probably found out if her house had dogs, CCTVs or guards as well.

Not only that, they could obtain her current location from Foursquare and Twitter.

Thankfully for Alicia, she was released five days later - but not before her father paid a hefty ransom. She was unhurt.

This is just one example of the kind of trouble you can get into when too much of your personal information is freely available on the net. So set those privacy settings on FB to the max - its no joke what people will do to take advantage of your ignorance.

Of course, this doesn't mean you should delete your Twitter account this instant, but just be careful that your online activities don't leak out precious information to would-be hackers and criminals.

Final tip from Mr Khor: verify every information you receive from cyberspace at least three times. You know those wacky emails about what fruits prevent cancer or how to unlock your car door using a mobile phone? Don't be a fool and repeat these things hook, line and sinker - check it out first! Its as easy going to Google and typing in several keywords.

Especially email addresses - one person can be 10 people online. He showed us about 12 different email addresses that could possibly belong to badminton player Lee Chong Wei and asked to guess which was genuine. FYI, one address was set up by his friend's son to play a prank on his classmates.

With that, I conclude my report on the CSM-ACE 2010. Hope you found it useful, and remember: you can't be a victim of the net, but you can be a victim of ignorance. Now go fix those privacy settings!

0 comments: