Facebook, Twitter, Google, Foursquare
Facebook
VULNERABILITIES |
Passwords
Public posts
Privacy Settings
Tags
Check-ins: Check-ins by you or people close to you can disclose your location
Messenger: auto pings location if you double click on a message
Phishing attempts
Photo Recognition
WHAT YOU CAN DO ABOUT IT |
Log out when you are not using the account
Don’t upload any photos and ask anyone who takes a photo of you not to share
Disable automatic tagging of your name in status updates & in suggested photos
Disable the option for your friends to check you into places, and set your check-ins as visible only to you - read how here.
Go to the privacy settings (see References) and set them to the highest level.
Deactivate location sharing for messenger app on your phone - see here for instructions.
Don’t login to your account on a public computerUse two-step verification
Click the padlock icon located in the top right corner and select the ‘More Settings’ link or log into facebook on your browser and follow this link or see this video
Use where you’re logged in to tell if someone else is logged into your account.
High threat level: Download your profile information\/data in case you need it as evidence in a legal case, then deactivate or delete your account.
Privacy Settings
Who can see my stuff?
Who can contact me?
How do I stop someone from bothering me?
Twitter
VULNERABILITIES |
Password
Location Settings
Anyone else tagging you
Check-ins
Phishing attempts
Integrating apps
Harassment
WHAT YOU CAN DO ABOUT IT |
Two-step verification
Granting apps to your Twitter account may leave you vulnerable - if someone hacks into an app, they can get your Twitter login details as well. Make sure to revoke app access under ‘Apps’ on your Twitter account
Block harassers using Block Together ; The Twitter Safety Center ; Guide to reporting on Twitter ; Abusive behavior and violent threats ; Private information
High threat level: delete account
Privacy settings
Google Account
VULNERABILITIES |
Tracking
Location settings
Privacy settings
Phishing attempts
WHAT YOU CAN DO ABOUT IT |
Log out when you are not using the account Two-step verification
Don’t upload any photos and ask anyone who takes a photo of you not to share
Disable automatic tagging
Use highest security settings details in the References Section
Don’t login to your account on a public computer
High threat level: delete account
Foursquare or other check-in apps
VULNERABILITIES |
Password
Anyone else checking you in
Check-ins
WHAT YOU CAN DO ABOUT IT |
Delete/uninstall check-in apps from your phone
If you need to use it, access without an account
Last updated