Social media has become an integral part of our modern life. You’re more connected to more online social circles than ever before. The problem here is that you also choose to share, maybe a little more. Yes, we were taught that sharing takes care, but overhearing can lead to privacy and security violations.
Experts have been warning about the dangers of spreading this exaggerated information over the years. There are countless stories about how
But the threats of social media are not limited to bosses, potential employers, and insurance companies. Hackers also prey on social media pages and they use the information they have discovered there for their own benefit. Below we discuss some data that is after hackers, and then what they do.
Searching for your authentication information
When you sign up for services from banks, telecom companies
On the phone, users authenticate their identity by answering common questions. In the United States, authentication questions usually include the customer’s social security number, birth date and mother’s first name, but your first pet’s name, primary school in which you attended or any other random information may be included.
How difficult do you find to get this kind of information about you from hackers? Well, when you continually mention your plans (not to specify your date of birth as clearly mentioned) for your children’s upcoming birthday party on your pictures, dating status and on your social media pages, you basically send your personal data directly Hackers on silver plate are giving up
So at least your mother’s first name will be private, right? Maybe not If you are connecting with an online family, the information on the mother’s profile page is to be seen. Karen detects your mom’s middle name, she does not even need serious hacking skills.
Make educated qualities on your passwords
Hackers can try to crack your password systematically by trying a large number of possible passwords (a method known as “brute force”) without getting the proper password. To avoid such password-guided scripts, consumers are encouraged to choose a lower case, upper case, numbers, and a modern password with special characters.
In reality, how long it takes to improve the possibilities of finding the correct password and how it takes time, hackers use the thing called “dictionary attack”.
Dictionary attack means that the script simply does not predict all possible strings (including completely random characters), but rather using different words from the dictionary. This attack is effective because most users do not randomly select their passwords, but apply familiar words and names that are easy to remember.
Pets and family members, your birthday, your children’s birthday, and your anniversary name are easily deleted from your social profiles and added to the hacker dictionary.
This personal details make more of a case rather than making passage in more frequent passwords, where hackers do not really need to work very hard.
Employee Email Address Sourcing
Why stop the only person when there is hectic scratching to do huge organizations?
When hacking into an organization’s internal network requires real hacking practices and serious technical know-how, the root of the organization’s hacking jot is not different from the individual one: organizations and large companies host social media pages, and are also guilty of oversharing.
One of the most common methods used to attack organizations is sending employees emails that contain malware. Once the employee opens the connection, their corporate computer is infected with malware, which opens “back door” which allows hackers to enter the organization’s internal network through an infected machine.
Naturally, some employees in the organization will be more targeted than others. For example, system administrators, who operate and operate the entire IT network, will usually work as major targets. If their computers are infected, the hackers will then receive a key to the state and access the entire IT infrastructure.
By Social Media – At this point you can probably guess where the hackers start the whole enterprise. Social networks can be used to identify high-value employees required for this inflexible intrusion.
By searching for people with specific places in the target organization, hackers can handpick employees acquiring malware virtually. Most organizations will follow a specific email address “scheme” (for example, the employee’s email address, their first name, the dot, their last name, the organization’s domain), because the hacker can only make the employee’s email address based on their names.
Social media hackers can also send an email message that they send to the employee from malware. If an employee posts on their social media page that they are going to a specific conference, for example, email messages can make fun of a message from conference organizations. In this way, the employee does not suspect the authenticity of the connection and has more opportunity to open it.
Arm yourself with information!
There are many dangers by social media, in which a more active, social engineering approach by Hacker is included. We have not raised this issue on what the hackers can do when they are actively communicating with the user with fake profiles or forged aviators or sending phishing attacks through those platforms.
Keeping in mind how much social media is involved in your life, it will be wise to get acquainted with these threats. Be wary of what you are sharing online and get acquainted with the consequences of sharing such information.
Editor’s note: This guest post is written by Omari Toppoll for HongKit.com. Omari Logdog is a marketing person. He is excited to help technically, digital marketing, and online users to stay safe and secure.