Category Archives: Social Media

  • 0

“Every Post You Make, Every Status Update, I Will Be Watching You”

Dear Blast Readers,


Do you ever feel like someone is watching you? Even when you are just sitting behind your computer? Feeling like someone is taking account of every keystroke that you make and every website you visit? This is the type of feeling that sends shivers down your spine. You don’t know who, or what, is giving you that feeling. This is a feeling that cannot be remedied. Whenever you go online, whenever you sit behind your computer you feel like there are eyes on you.

Cyber stalking is when you are being constantly frightened and/or harassed by someone through electronic means, such as the internet. Some of the forms that Cyber stalking take on, including:

  • Harassing a victim.
  • Embarrassing and/or humiliation of a victim.
  • Gaining financial control over a victim. Usually, by destroying their credit or by draining their bank accounts.
  • Harassing friends and family members of the victim.
  • Frightening a victim, using scare tactics and threats.


Within the United States of America, there are 14 out of 50 states that have laws against cyber stalking and cyber harassment. Under the “American Anti-Stalking, Slander & Harassment Law”, Cyber stalking is considered a criminal offense. The results of being convicted include:

  • A restraining order
  • Probation
  • Criminal Penalties (including prison time)


If convicted, the sentences range from a fourth-degree charge to a second-degree charge. A fourth-degree charge means 18 months in prison with a fine of $10,000. A second-degree charge means 10 years in prison with a $150,000 fine.


So, how do you protect yourself, your family, and/or your PC from Cyber stalkers?

Here are a few tips:

  1. Maintain caution over the physical access to your computer, and any other web-enabled device, including your cellphone.
  2. Make sure you ALWAYS log out of computer programs when you leave the computer. Also, remember to lock your computer when stepping away.
  3. When it comes to online calendars or itineraries, delete them or make them private.
  4. Use privacy settings on any, and all online accounts.
  5. Use trusted and updated security software to stop spyware from getting onto your computer through an infected web page or phishing attack.
  6. If you do suspect that someone is using spyware to track your day-to-day activities, seek help.


If you have any questions about Cyber stalking, Spyware, Computer Forensics or Cyber Security contact FDS Global. You can reach us at our office at (954) 727-1957 or by email at RMoody@FDS.Global. Please feel free to visit our website at www.FDS.Global.

  • 0

“A Travelers Guide To Protecting Your Data”

Dear Blast Readers,


When you hear the word “summer”, what is the first thing you think of? Vacation? Travel? Did you know that most people wont leave home without their smartphones, tablets, and/or computers? Have you ever wondered how traveling can compromise your digital security?


People tend to think of vacations as a time to get away and un-plug from the world, both the digital world and physical world. But, it is not realistic to believe that you will NEVER go online while traveling. Yes, it is fun to post pictures and status updates on your social media accounts in real time. But, did you know that by doing so, there is a possibility you are opening yourself, and your digital devices, to cyber criminals?


When traveling, public Wi-Fi might seem like a great thing. It allows you to check your email, work, and post updates to your social media accounts. But, as convent as it is, connecting to public Wi-Fi can also be dangerous. Cyber Criminals can take over public networks, and logging onto a corrupted network allows cyber criminals access to your:

  • Personal details
  • Credit card numbers
  • Passwords


The data that you, as a traveler, bring wherever you go is valuable and desired. It is important that while traveling you do everything in your power to keep your digital information safely out of the reach of cyber criminals.


How? Here are a few tips.

  • Only Use Secure Wi-Fi Networks. When connecting to a public network, consider using a Virtual Private Network, or VPN. This will ensure that your confidential information stays private. A VPN will also ensure that your data goes directly from your device to the network that you are connecting to.
  • Update Your Devices. Updating the software on your devices, as well as the applications updates, is important. Even though the constant update reminder can be annoying, it is your devices way of protecting you and your data.
  • Do Not Use Public Computers. Never use public computers when logging into to banking, email and social media accounts. This means computers in hotel business centers, as well as in-room iPads. Crooks can install keylogging software to track your keystrokes.
  • Secure Your Mobile Devices. Set a PIN for your devices. Setting a PIN can protect your device from unauthorized users.
  • Use Cash Whenever Possible. Using cash whenever possible while traveling keeps your credit/debit card safe from fraudsters. But, if you are to use your credit/debit cards, be cautious.
  • Backup all your devices. Before going on your trip, whether it is for business or vacation, it is a good idea to back up your mobile devices. This allows you to be able to retrieve your information if lost, in case of emergency, or stolen.
  • Critical information should be stored in a different location. When traveling, it is a good idea to store any critical and private information temporarily in a different location. Examples of different locations are: Flash Drives, Mobile Devices, or Cloud Storage.
  • Make sure your computer’s firewall is enabled. Enabling your computer’s firewall helps stop hackers from getting into your system, as well as keeping viruses from spreading and safeguards outgoing computer traffic.


If you have any questions about Digital Security, Hacking, Cyber Security, Computer Forensics, or Mobile Forensics contact FDS Global. You can reach us at our office at (954) 727-1957 or by email at RMoody@FDS.Global. Please feel free to visit our website at www.FDS.Global.

  • 2

“The United States of Chatbots: How Chatbots Are Crawling Into Your Everyday Life”

Dear Blast Readers,


Have you ever communicated with a Chatbot? Do you know what Chatbots are?  Did you know that Siri, Cortana, and Alexa are considered Chatbots? Did you know that Chatbots are running rampant through social media, such as Twitter? Did you know that Chatbots are therapists and lawyers?


Chatbots are computer programs that mimic human conversation through Artificial Intelligence, also known as AI. These computer programs can respond to text messages and/or digital chats, such as Facebook messages, carrying out conversations with the people on the other end of the chat. Those receiving the messages would not know that the account they were communicating with was controlled by a robot rather than a person.


So, how many types of Chatbots are there?

There are 2 categories of Chatbots today:

  1. Rule-Based Chatbots. Which are Chatbots that can respond to a specific command.
  2. Artificial Intelligence Chatbots. Which can respond to natural language.


A Chatbot is a form of software that has a few layers that make it work:

  • Database: To store product information, customer data, and customer transactions.
  • Application Layer: A set of instructions that gives the app its functionality.
  • Application Programming Interface: Also, known as a API, connects the app to other services to get things like shipping quotes or process payments.
  • User Interface: How the users tell your app what he/she wants or what he/she is interested in.


Chatbots use these layers to work in the same way as a human manning a help desk. If a someone asks Chatbot a question, The Chatbot will use the information to respond in the same manner as a human would. The more a Chatbot communicates with people, the better understanding of human interaction the Chatbot acquires. This is because the Chatbot has more information archived in its database to refer to when conversing with a human.


So, what is the big deal about Chatbots?

Chatbots are extending their spider like reaches into many aspects of life. In New York City and in London a Chatbot is acting as a Lawyer. This program has helped thousands of people with traffic citations. More accurately it has successfully contested 160,000 citations.


The cost of this help?




Attorneys working in this field of law should be concerned about being replaced, by a significantly cheaper solution.


It is not just attorneys that should be worried. A Chatbot who goes by “Woebot” is now acting as a therapist. This Chatbot was created by Psychologists from Stanford. This Chatbot uses common therapeutic techniques daily to assist individuals in managing mental health.


The concerns regarding Chatbots extends farther than replacing humans in the work force. Chatbots have a much more sinister use. This use is disseminating false information in mass. On Twitter, there are thousands of fake accounts controlled by Chatbots. These Chatbots were created for the sole purpose of spreading partisan directed fake news. This dissemination of false information is a problem because it creates distrust for those reading the information. What is worse is that the way in which these Chatbots are disseminating Fake News on Twitter.


This dissemination has intensified because the thousands of Chatbots are posting the same fake information, and using the same “Trigger Words”. By using the same “Trigger Words” this fake news trends on Twitter. This manipulation of the “Trending Algorithm” for Twitter forces unsuspecting individuals to view the Fake News on the trending section of Twitter.


In the Future, these negatives associated with Chatbots may outweigh the helpfulness these algorithms offer.


If you have any questions about Chatbots, Cyber Security, or Computer Forensics contact FDS Global. You can reach us at out office at (954)727-1957 or by email at RMoody@FDS.Global. Please feel free to visit our website at www.FDS.Global.


  • 0

“Beware of the Facebook Notification Virus”

Dear Blast Readers,


You are on your Facebook account, answering messages, liking posts, watching videos, and commenting on your friend’s photos. Suddenly, you receive a message from your friend Sam. The message contains a link to a funny cat video in which a cat in a hat is dancing with a maraca in its mouth. The message below the video says “Hilarious video. You NEED to check it out!”. Without giving it a second thought you click on the link to view the video. But, instead of viewing the video you get redirected to a site that you don’t recognize or trust. Naturally, you exit out of the browser thinking that maybe Sam has attached the wrong URL. But, it is too late. Your device has already been infected.


Security experts have identified a form of adware that targets social media users tricking them into infecting their own devices. It is known as the “Facebook Notification Virus”. This virus displays messages saying that they are from Facebook. The “Facebook Notification Virus” creates many different forms of messages, including:

  • Friend Requests
  • Chat Messages


Some of the notifications that the user received are real copies of notifications that users would see on the real social media site (making the fake notifications seem legit). While other notifications are presenting new features. The purpose of this adware is to redirect users to specific websites, most likely malicious websites, so that the user’s device becomes infected with malicious software. This virus does not just lead users to malicious websites, it also:

  • Monitors User Activity
  • Collects User Information
  • Records Browsing History
  • Tracks Cookies
  • Tracks Keystrokes
  • Tracks IP Addresses
  • Tracks Geographic Location
  • Tracks Zip Codes
  • Tracks Demographic Profiles
  • Tracks Emails
  • Tracks Telephone Numbers
  • Tracks Usernames
  • Tracks Passwords


After all this information is collected, the collector, hacker, will then attempt to sell your confidential information on Darknet Markets, then falling into the hands of much more malicious cyber criminals.


So, how does this virus spread?


The “Facebook Notification Virus” can be spread a few different ways, including:

  • Freeware
  • Shareware
  • Pirated copies of paid utilities.


Another way that it can spread is through spam emails. The sender of the spam emails wants you to open the so that his or her tool can get inside your system and infect it.


To protect your data and system from the “Facebook Notification Virus”, if you receive any suspicious messages from “Facebook”, you should:

  • Check your system, because you may have been infected.
  • Be careful of the software that you allow in your machine.
  • Verify the email addresses of the “companies” that have messaged you (visit the contact page on the official website of the “company” to verify the email address).


If you have any questions relating to the “Facebook Notification Virus”, cyber security, or computer forensics contact FDS Global. You can reach us at our office at (954)727-1957 or by email at RMoody@FDS.Global. Please feel free to visit our website at www.FDS.Global.