Skip to content
CELS Virtual Helpdesk

CELS Virtual Helpdesk

  • Systems Group
  • Blog
  • Documentation

CELS Virtual Helpdesk

CELS Shared Services Systems Group

Documentation Search

Search for:

Most Recent Dispatch

  • Confluence Service Scheduled Maintenance for May 20, 3PM CDT

Site search

Social Networking Safety

March 29, 2022 by Stacey, Craig

Let me tell a couple of true stories of how social networking can be used to cause you and your friends harm. The first happened to a friend of mine. He's sitting on his computer, browsing facebook, and he gets a chat request from a friend. This f...

Let me tell a couple of true stories of how social networking can be used to cause you and your friends harm.The first happened to a friend of mine. He’s sitting on his computer, browsing facebook, and he gets a chat request from a friend. This friend claimed to be in London, and needed money desperately as he had been robbed. My friend was smart enough to recognize this might not be legit, and started asking questions. Of course, because this guy had access to all the data in facebook, he could be fairly convincing in his answers (minus, of course, the lag time in looking up the information). As you may guess, my friend did not wire any money. Turns out this is a scam that’s getting more and more common.The second story happened to an acquaintance of this same friend. However, in her case, it was her account that was compromised. A Yahoo mail account, which was used to send mail to her friends asking for money. We don’t quite know how successful this one was. We do know the malicious user deleted all her e-mails from her account.Neither of these incidents happened at Argonne, just so you know.I tell you these stories to remind you that you need to be on your toes. In this day and age of social networking and information sharing, we’re putting a lot of information out there than can be used against us in many ways. I was startled when I visited pipl.com and searched for myself — all this information is out there, scraped off of webpages, social networking sites, Usenet… you name it. Someone armed with that information might be able to pull off a convincing job of pretending to be me. Convincing enough to scam someone else out of money or information they shouldn’t have.So be careful what you put out there. Keep your passwords strong, lengthy, diverse, and private. Don’t reuse them.Here’s a couple of links that were passed on to me today from ANL’s Cyber Security Program Office. The first is available on-site only, and is written by Mike Skwarek, the Cyber Security Program Manager and Deputy CIO for the lab. I recommend reading then, as there’s good advice in there.

  • Focal Point Blog – Using Social Networking Sites
  • Microsoft’s 11 tips for social networking safety

Post navigation

Previous Post:

Mail Outage, 1/23/10, 9 AM – 2 PM.

Next Post:

State of Systems Talk 2010

Leave a Reply

You must be logged in to post a comment.

Helpful links

  • Service Catalog
  • Request…
    • a domain name
    • a GCE Unix Group
    • an IP Address
    • a Laptop Build
    • a loaner laptop
    • a JIRA project
    • a Mailing List
    • an Overleaf account
    • a port activation
    • a poster print
    • a reactivation for a returning user
    • an upgrade to Slack Business Plus from Free.
    • a WordPress migration
    • a WordPress site
    • an xgitlab or gitlab migration
    • a Zoom license upgrade

Previous Dispatches

Search Documentation

Search for:

Privay & Security Notice

Privacy & Security Notice

Site tools

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CELS Virtual Helpdesk | WordPress Theme by Superbthemes