/* Style Definitions */
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-fareast-font-family:”Times New Roman”;
mso-bidi-font-family:”Times New Roman”;
As we have already shown in the latest
issue of our E-Treats Landscape Report (H1 2009), Web 2.0 applications in
general and social networking applications in particular are no longer just
some friendly platforms for sharing news about the most recent project one
could have, but also the ideal place for data and identity theft.
These days’ attempts no longer focus to purloin valuable
information about the user and his or her account. Pictures, e-cards and photo
streams seem to be the preferred target of the e-larcenists, as proven by the hijacked
family Christmas card employed for a grocery commercial or the stolen picture
of a baby used in a fraudulent scheme for an alleged adoption.
A platform gathering a number of users that
almost equals the US population, with about half of them logging in daily,