Version 1.1 of the definition has been released. Please help updating it, contribute translations, and help us with the design of logos and buttons to identify free cultural works and licenses!

Abuse filter log

Abuse Filter navigation (Home | Recent filter changes | Examine past edits | Abuse log)
Jump to navigation Jump to search
Details for log entry 5,921

22:05, 23 July 2013: SalvatorelpsvjeklulMiddlebrook (talk | contribs) triggered filter 9, performing the action "edit" on Battling the Security Problem on Social Media2304114. Actions taken: Disallow; Filter description: Inserting HTML into pages (examine)

Changes made in edit

 +
Social media, as all of us know, is an open platform for all the users throughout the globe that enables them to connect and share their thought and with the people of their choice; either known or unknown. However, emergence of social media has raised issues like identity theft and account hack, hurting the privacy of the users. Even the owners of these social media platforms are finding it difficult to maintain the security of their online application from every kind of security threat. Hackers, in recent times, have even successfully broken down the security firewalls of different social media platforms posing a large threat to user's privacy.
  
 +
  Few days ago Twitter has announced that some of the famous profiles have been compromised on Twitter and attacks are expected to continue. Privacy of accounts of famous public figures and Media organizations was compromised in these attacks. Accounts of The Guardian, BBC and FIFA President Sepp Blatter, were hacked and privacy of the accounts was compromised.
 +
 +
  Last year, LinkedIn tweeted on its Twitter profile about the security breach in its network causing password leak of about 6 million accounts. A Russian hacker took the responsibility of intruding the network and cracking the hash of stored passwords, putting the security of several users at stake.
 +
 +
Even after all these hacking attempts, Social media companies mention very little about their strategy to prevent from all these ongoing and seemingly growing threats. Most of the time, set of guidelines for the users are announced to ensure their account security but this time, after a false tweet from Associated Press' account about explosion in White House, Twitter uncovered its strategy to avoid such situations.
 +
 +
Learning from its experience that password theft is one of the crucial factors, causing a compromised account, the micro-blogging site, Twitter announced to involve Two-step authentication. This two-step authentication will make it harder for an intruder or hacker to gain access to the account of the user as any suspicious activity will include reconfirmation from the user by using a code sent over the mobile text.
 +
 +
Another recommendation is to block any third-party app access to your account, in case of it being compromised. This would assure that a hacker is unable to access the account from any other entry point. Third-party app access should only be allowed from a trusted and well secured site and shouldn't be practiced for any other purpose.
 +
Social privacy has become a serious concern for different social media platforms as they are experiencing a number of hack attempts and some of which have cracked the security boundaries successfully.
 +
 +
Also, as more and more businesses are relying on social media for business presence, it becomes a responsibility of social networks to safeguard the reputation of these businesses by imparting high level of security to each user. These issues ask for more attentive and preventive measures to be deployed because once the damage is done, it becomes impossible for businesses to get over it.
 +
 +
Christa Joe is a keen blogger and enjoys reading and writing about the recent technology. Software development, cloud based software development and mobile applications are some of her key area of interests. She's also a freelance writer and write for various offshore technology consulting companies like Q3 technologies. find more infomation at <a href="http://www.picpack.ir">picpack.ir </a>

Action parameters

VariableValue
Edit count of the user (user_editcount)
0
Name of the user account (user_name)
SalvatorelpsvjeklulMiddlebrook
Time email address was confirmed (user_emailconfirm)
Age of the user account (user_age)
82306
Groups (including implicit) the user is in (user_groups)
* user autoconfirmed
Page ID (page_id)
0
Page namespace (page_namespace)
0
Page title (without namespace) (page_title)
Battling the Security Problem on Social Media2304114
Full page title (page_prefixedtitle)
Battling the Security Problem on Social Media2304114
Create protection of the page (page_restrictions_create)
Edit protection level of the page (page_restrictions_edit)
Move protection level of the page (page_restrictions_move)
Upload protection of the file (page_restrictions_upload)
Last ten users to contribute to the page (page_recent_contributors)
Action (action)
edit
Edit summary/reason (summary)
Whether or not the edit is marked as minor (no longer in use) (minor_edit)
Old page wikitext, before the edit (old_wikitext)
New page wikitext, after the edit (new_wikitext)
Social media, as all of us know, is an open platform for all the users throughout the globe that enables them to connect and share their thought and with the people of their choice; either known or unknown. However, emergence of social media has raised issues like identity theft and account hack, hurting the privacy of the users. Even the owners of these social media platforms are finding it difficult to maintain the security of their online application from every kind of security threat. Hackers, in recent times, have even successfully broken down the security firewalls of different social media platforms posing a large threat to user's privacy. Few days ago Twitter has announced that some of the famous profiles have been compromised on Twitter and attacks are expected to continue. Privacy of accounts of famous public figures and Media organizations was compromised in these attacks. Accounts of The Guardian, BBC and FIFA President Sepp Blatter, were hacked and privacy of the accounts was compromised. Last year, LinkedIn tweeted on its Twitter profile about the security breach in its network causing password leak of about 6 million accounts. A Russian hacker took the responsibility of intruding the network and cracking the hash of stored passwords, putting the security of several users at stake. Even after all these hacking attempts, Social media companies mention very little about their strategy to prevent from all these ongoing and seemingly growing threats. Most of the time, set of guidelines for the users are announced to ensure their account security but this time, after a false tweet from Associated Press' account about explosion in White House, Twitter uncovered its strategy to avoid such situations. Learning from its experience that password theft is one of the crucial factors, causing a compromised account, the micro-blogging site, Twitter announced to involve Two-step authentication. This two-step authentication will make it harder for an intruder or hacker to gain access to the account of the user as any suspicious activity will include reconfirmation from the user by using a code sent over the mobile text. Another recommendation is to block any third-party app access to your account, in case of it being compromised. This would assure that a hacker is unable to access the account from any other entry point. Third-party app access should only be allowed from a trusted and well secured site and shouldn't be practiced for any other purpose. Social privacy has become a serious concern for different social media platforms as they are experiencing a number of hack attempts and some of which have cracked the security boundaries successfully. Also, as more and more businesses are relying on social media for business presence, it becomes a responsibility of social networks to safeguard the reputation of these businesses by imparting high level of security to each user. These issues ask for more attentive and preventive measures to be deployed because once the damage is done, it becomes impossible for businesses to get over it. Christa Joe is a keen blogger and enjoys reading and writing about the recent technology. Software development, cloud based software development and mobile applications are some of her key area of interests. She's also a freelance writer and write for various offshore technology consulting companies like Q3 technologies. find more infomation at <a href="http://www.picpack.ir">picpack.ir </a>
Unified diff of changes made by edit (edit_diff)
@@ -1,1 +1,16 @@ +Social media, as all of us know, is an open platform for all the users throughout the globe that enables them to connect and share their thought and with the people of their choice; either known or unknown. However, emergence of social media has raised issues like identity theft and account hack, hurting the privacy of the users. Even the owners of these social media platforms are finding it difficult to maintain the security of their online application from every kind of security threat. Hackers, in recent times, have even successfully broken down the security firewalls of different social media platforms posing a large threat to user's privacy. + Few days ago Twitter has announced that some of the famous profiles have been compromised on Twitter and attacks are expected to continue. Privacy of accounts of famous public figures and Media organizations was compromised in these attacks. Accounts of The Guardian, BBC and FIFA President Sepp Blatter, were hacked and privacy of the accounts was compromised. + + Last year, LinkedIn tweeted on its Twitter profile about the security breach in its network causing password leak of about 6 million accounts. A Russian hacker took the responsibility of intruding the network and cracking the hash of stored passwords, putting the security of several users at stake. + +Even after all these hacking attempts, Social media companies mention very little about their strategy to prevent from all these ongoing and seemingly growing threats. Most of the time, set of guidelines for the users are announced to ensure their account security but this time, after a false tweet from Associated Press' account about explosion in White House, Twitter uncovered its strategy to avoid such situations. + +Learning from its experience that password theft is one of the crucial factors, causing a compromised account, the micro-blogging site, Twitter announced to involve Two-step authentication. This two-step authentication will make it harder for an intruder or hacker to gain access to the account of the user as any suspicious activity will include reconfirmation from the user by using a code sent over the mobile text. + +Another recommendation is to block any third-party app access to your account, in case of it being compromised. This would assure that a hacker is unable to access the account from any other entry point. Third-party app access should only be allowed from a trusted and well secured site and shouldn't be practiced for any other purpose. +Social privacy has become a serious concern for different social media platforms as they are experiencing a number of hack attempts and some of which have cracked the security boundaries successfully. + +Also, as more and more businesses are relying on social media for business presence, it becomes a responsibility of social networks to safeguard the reputation of these businesses by imparting high level of security to each user. These issues ask for more attentive and preventive measures to be deployed because once the damage is done, it becomes impossible for businesses to get over it. + +Christa Joe is a keen blogger and enjoys reading and writing about the recent technology. Software development, cloud based software development and mobile applications are some of her key area of interests. She's also a freelance writer and write for various offshore technology consulting companies like Q3 technologies. find more infomation at <a href="http://www.picpack.ir">picpack.ir </a>
New page size (new_size)
3490
Old page size (old_size)
0
Size change in edit (edit_delta)
3490
Lines added in edit (added_lines)
Social media, as all of us know, is an open platform for all the users throughout the globe that enables them to connect and share their thought and with the people of their choice; either known or unknown. However, emergence of social media has raised issues like identity theft and account hack, hurting the privacy of the users. Even the owners of these social media platforms are finding it difficult to maintain the security of their online application from every kind of security threat. Hackers, in recent times, have even successfully broken down the security firewalls of different social media platforms posing a large threat to user's privacy. Few days ago Twitter has announced that some of the famous profiles have been compromised on Twitter and attacks are expected to continue. Privacy of accounts of famous public figures and Media organizations was compromised in these attacks. Accounts of The Guardian, BBC and FIFA President Sepp Blatter, were hacked and privacy of the accounts was compromised. Last year, LinkedIn tweeted on its Twitter profile about the security breach in its network causing password leak of about 6 million accounts. A Russian hacker took the responsibility of intruding the network and cracking the hash of stored passwords, putting the security of several users at stake. Even after all these hacking attempts, Social media companies mention very little about their strategy to prevent from all these ongoing and seemingly growing threats. Most of the time, set of guidelines for the users are announced to ensure their account security but this time, after a false tweet from Associated Press' account about explosion in White House, Twitter uncovered its strategy to avoid such situations. Learning from its experience that password theft is one of the crucial factors, causing a compromised account, the micro-blogging site, Twitter announced to involve Two-step authentication. This two-step authentication will make it harder for an intruder or hacker to gain access to the account of the user as any suspicious activity will include reconfirmation from the user by using a code sent over the mobile text. Another recommendation is to block any third-party app access to your account, in case of it being compromised. This would assure that a hacker is unable to access the account from any other entry point. Third-party app access should only be allowed from a trusted and well secured site and shouldn't be practiced for any other purpose. Social privacy has become a serious concern for different social media platforms as they are experiencing a number of hack attempts and some of which have cracked the security boundaries successfully. Also, as more and more businesses are relying on social media for business presence, it becomes a responsibility of social networks to safeguard the reputation of these businesses by imparting high level of security to each user. These issues ask for more attentive and preventive measures to be deployed because once the damage is done, it becomes impossible for businesses to get over it. Christa Joe is a keen blogger and enjoys reading and writing about the recent technology. Software development, cloud based software development and mobile applications are some of her key area of interests. She's also a freelance writer and write for various offshore technology consulting companies like Q3 technologies. find more infomation at <a href="http://www.picpack.ir">picpack.ir </a>
Lines removed in edit (removed_lines)
Parsed HTML source of the new revision (new_html)
<div class="mw-parser-output"><p>Social media, as all of us know, is an open platform for all the users throughout the globe that enables them to connect and share their thought and with the people of their choice; either known or unknown. However, emergence of social media has raised issues like identity theft and account hack, hurting the privacy of the users. Even the owners of these social media platforms are finding it difficult to maintain the security of their online application from every kind of security threat. Hackers, in recent times, have even successfully broken down the security firewalls of different social media platforms posing a large threat to user's privacy. </p> <pre> Few days ago Twitter has announced that some of the famous profiles have been compromised on Twitter and attacks are expected to continue. Privacy of accounts of famous public figures and Media organizations was compromised in these attacks. Accounts of The Guardian, BBC and FIFA President Sepp Blatter, were hacked and privacy of the accounts was compromised. </pre> <pre> Last year, LinkedIn tweeted on its Twitter profile about the security breach in its network causing password leak of about 6 million accounts. A Russian hacker took the responsibility of intruding the network and cracking the hash of stored passwords, putting the security of several users at stake. </pre> <p>Even after all these hacking attempts, Social media companies mention very little about their strategy to prevent from all these ongoing and seemingly growing threats. Most of the time, set of guidelines for the users are announced to ensure their account security but this time, after a false tweet from Associated Press' account about explosion in White House, Twitter uncovered its strategy to avoid such situations. </p><p>Learning from its experience that password theft is one of the crucial factors, causing a compromised account, the micro-blogging site, Twitter announced to involve Two-step authentication. This two-step authentication will make it harder for an intruder or hacker to gain access to the account of the user as any suspicious activity will include reconfirmation from the user by using a code sent over the mobile text. </p><p>Another recommendation is to block any third-party app access to your account, in case of it being compromised. This would assure that a hacker is unable to access the account from any other entry point. Third-party app access should only be allowed from a trusted and well secured site and shouldn't be practiced for any other purpose. Social privacy has become a serious concern for different social media platforms as they are experiencing a number of hack attempts and some of which have cracked the security boundaries successfully. </p><p>Also, as more and more businesses are relying on social media for business presence, it becomes a responsibility of social networks to safeguard the reputation of these businesses by imparting high level of security to each user. These issues ask for more attentive and preventive measures to be deployed because once the damage is done, it becomes impossible for businesses to get over it. </p><p>Christa Joe is a keen blogger and enjoys reading and writing about the recent technology. Software development, cloud based software development and mobile applications are some of her key area of interests. She's also a freelance writer and write for various offshore technology consulting companies like Q3 technologies. find more infomation at &lt;a href="<a rel="nofollow" class="external free" href="http://www.picpack.ir">http://www.picpack.ir</a>"&gt;picpack.ir &lt;/a&gt; </p> <!-- NewPP limit report Cached time: 20201201184830 Cache expiry: 86400 Dynamic content: false Complications: [] CPU time usage: 0.003 seconds Real time usage: 0.003 seconds Preprocessor visited node count: 1/1000000 Post‐expand include size: 0/2097152 bytes Template argument size: 0/2097152 bytes Highest expansion depth: 1/40 Expensive parser function count: 0/100 Unstrip recursion depth: 0/20 Unstrip post‐expand size: 0/5000000 bytes --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 0.000 1 -total --> </div>
New page text, stripped of any markup (new_text)
Social media, as all of us know, is an open platform for all the users throughout the globe that enables them to connect and share their thought and with the people of their choice; either known or unknown. However, emergence of social media has raised issues like identity theft and account hack, hurting the privacy of the users. Even the owners of these social media platforms are finding it difficult to maintain the security of their online application from every kind of security threat. Hackers, in recent times, have even successfully broken down the security firewalls of different social media platforms posing a large threat to user's privacy. Few days ago Twitter has announced that some of the famous profiles have been compromised on Twitter and attacks are expected to continue. Privacy of accounts of famous public figures and Media organizations was compromised in these attacks. Accounts of The Guardian, BBC and FIFA President Sepp Blatter, were hacked and privacy of the accounts was compromised. Last year, LinkedIn tweeted on its Twitter profile about the security breach in its network causing password leak of about 6 million accounts. A Russian hacker took the responsibility of intruding the network and cracking the hash of stored passwords, putting the security of several users at stake. Even after all these hacking attempts, Social media companies mention very little about their strategy to prevent from all these ongoing and seemingly growing threats. Most of the time, set of guidelines for the users are announced to ensure their account security but this time, after a false tweet from Associated Press' account about explosion in White House, Twitter uncovered its strategy to avoid such situations. Learning from its experience that password theft is one of the crucial factors, causing a compromised account, the micro-blogging site, Twitter announced to involve Two-step authentication. This two-step authentication will make it harder for an intruder or hacker to gain access to the account of the user as any suspicious activity will include reconfirmation from the user by using a code sent over the mobile text. Another recommendation is to block any third-party app access to your account, in case of it being compromised. This would assure that a hacker is unable to access the account from any other entry point. Third-party app access should only be allowed from a trusted and well secured site and shouldn't be practiced for any other purpose. Social privacy has become a serious concern for different social media platforms as they are experiencing a number of hack attempts and some of which have cracked the security boundaries successfully. Also, as more and more businesses are relying on social media for business presence, it becomes a responsibility of social networks to safeguard the reputation of these businesses by imparting high level of security to each user. These issues ask for more attentive and preventive measures to be deployed because once the damage is done, it becomes impossible for businesses to get over it. Christa Joe is a keen blogger and enjoys reading and writing about the recent technology. Software development, cloud based software development and mobile applications are some of her key area of interests. She's also a freelance writer and write for various offshore technology consulting companies like Q3 technologies. find more infomation at &lt;a href="http://www.picpack.ir"&gt;picpack.ir &lt;/a&gt;
Old page wikitext, parsed into HTML (no longer in use) (old_html)
<div class="mw-parser-output"></div>
Old page text, stripped of any markup (no longer in use) (old_text)
context
filter
Unix timestamp of change (timestamp)
1374613502