UT Shield

UT Austin Information Security Office

The University of Texas at Austin

securus // vigilare // insanus

May 23, 2016, Filed Under: Uncategorized

Spies and Social Media

The Internet opens countless avenues of communication and convenience, but brings risk as well. Attackers can use seemingly innocuous social media connections and other information to find sensitive information about you, like your home address, password security questions, and more.

Goals

Learn how and why people may try to find you via the Internet, and learn how to:

  • Conduct a self-background check
  • Create free anonymous mail addresses, email addresses, and phone numbers
  • Control your privacy settings on social networks and remove sensitive data
  • Remove your personal information from public databases and people search websites

 Intended Audience

  • System administrators
  • IT Staff supporting law enforcement, other public officials, and VIPs
  • Privacy enthusiasts
  • Victims of identity theft
Presentation
Slides

Much of the presentation has an interactive component, so please open it in another window and participate when prompted.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

UT Austin ISO Blog

Find out more about the UT Austin Information Security Office at: security.utexas.edu

Facebook: facebook.com/utaustiniso

Twitter: @UT_ISO

Recent Posts

  • Spectre and Meltdown Vulnerabilities for IT Professionals
  • Analysis of False/Morel
  • Using NodeJS To Deobfuscate Malicious JavaScript
  • Reverse Engineering a Malicious MS Word Document
  • Spies and Social Media

Recent Comments

    Archives

    • January 2018
    • September 2016
    • July 2016
    • May 2016
    • March 2016
    • September 2015
    • September 2014

    Categories

    • Reverse Engineering
    • Security Alert
    • Uncategorized
    • Vulnerability

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    UT Home | Emergency Information | Site Policies | Web Accessibility | Web Privacy | Adobe Reader

    © The University of Texas at Austin 2023

    • UT Austin
    • UT Blogs
    • Log in