Sunday , November 18 2018
Home / IT Security / Black Hat / Networking: Finding Secret Information Like A Professional Spy
Networking: Finding Secret Information Like A Professional Spy

Networking: Finding Secret Information Like A Professional Spy

Secrets From A Professional Spy: Social media can be made safer if you take simple steps to strengthen your accounts. In fact, it has been found in many cases that with a little care and effort, you can lessen or avoid many common security issues and risks.

You can reuse some of the guidance from earlier articles and apply it to these new platforms:

Password: Using the same password across multiple sites means anyone who gets control of the password can access whatever data or personal information you store on any of those sites.

In a worst-case scenario, for example, a Twitter password hack can give the hacker the key to an online banking account.

Keep in mind that if you use a password on a site that doesn’t protect information carefully someone can steal it.

Many social-networking sites have grown so large so fast that they do not take appropriate measures to secure the information they are entrusted with until it is too late.

In addition, many users never or rarely ever change their passwords, making their accounts even more vulnerable.

Too Much Information: With the proliferation of social networking, the tendency to share too much has become more common.

Users of these networks share more and more information without giving much thought to who may be reading it.

The attitude nowadays tends to skew toward sharing information. People increasingly see sharing as no big deal.

However, individuals or company’s brand and reputation can easily be tarnished if the wrong information is shared.

In some cases, companies have taken the brunt of the public’s ire because an employee posted something that was off-color or offensive.

It may not initially seem like a security problem but rather a public relations issue; but one of the items you must protect as a security-minded individual is the public’s perception of your company.

Unsafe at Home

One example of a brand tarnished through social media is that of Home Depot. In late 2013, the marketing firm contracted by the company posted a picture through the social media network Twitter that was viewed as being extremely racist.

Even though Home Depot did not itself post the tweet, it was posted on the company’s official account.

In response to the incident, Home Depot quickly terminated the agency and the employee responsible for the posting.

The fallout from the incident included derision and praise. Although most viewed Home Depot’s response as being swift, decisive, and thoughtful, other members of the public were offended and vowed not to ever frequently the retailer again.

Overall, the reaction wasn’t overwhelmingly bad due to Home Depot’s quick response. It could have been much worse.

Many types of scams can ensnare users by preying on an aspect of human nature that entices people to investigate or do something they would not normally do:

Secret Detail about Some Celebrity’s Death: This type of post feeds on people’s insatiable desire for information regarding celebrities or public figures.

I’m Stranded in a Foreign Country—Please Send Money: These types of scams target users by claiming that the message is from someone the user knows who is trapped without money in a foreign country or bad situation.

The scammer says they will gladly pay the person back when they get home. Once the victim’s trust is heightened to the point of sending money, the scammer comes up with plausible reasons to ask for increasingly larger amounts, eventually fleecing the victim for much greater sums.

Did You See This Picture of J-Lo? Both Facebook and Twitter have been plagued by phishing scam that involve a question that piques your interest and then directs you to a fake login screen, where you inadvertently reveal your Facebook or Twitter password.

The Case of Anna Kournikova

A good example of this type of attack is the Anna Kournikova computer worms form 2001.

This worm lured victims by promising nude pictures of the popular model and tennis star, but when users opened the attachment, they executed a computer worm.

The worm forwarded the message to everyone in the victim’s Outlook address book and started the process all over again.

Interestingly, the worm and its delivery mechanism were created with a pre-made malware maker downloaded from the Internet.

Test Your IQ: This type of scam attracts you with a quiz. Everybody loves quizzers. After you take the quiz, you are encouraged to enter your information into a form to get the results.

In other cases, the scam encourages you to join an expensive text-messaging service, but the price appears only in extremely small print.

Tweet For Cast: This scam take many forms. “Make money on Twitter!” and “Twee for profit!” are two common come-ons that security analysts say they have seen lately.

Obviously, this scam preys on users’ greed and curiosity, but in the end the lose money or their identities.

Ur Cute. Msg Me: The sexual solicitation is a tactic spammers have been trying for many years via email and is one that has proven wildly successful.

In the updated version of this ruse, tweets feature scantily clad women and include a message embedded in the image, rather than in the 140-character tweet itself.

Amber Alert Issued: This one is not so much a scam as it is a hoax. Amber alerts are pasted into status that turn out to be untrue.

Although such attacks don’t gain information, they are designed to cause panic and concern as well as increase traffic among recipient.

About Jahanzaib Khan

Jahanzaib Khan is the CEO of JahaSoft.Pk A Web Development, Digital Marketing & Web Hosting Company Based in Pakistan. https://www.JahaSoft.pk

Check Also

A New Dump of Pakistan Debit & Credit Cards Leaked Online

A New Dump of Pakistan Debit & Credit Cards Leaked Online

The BankIslami hack was basically done via a dark web forum, where the information on …

Leave a Reply

Your email address will not be published. Required fields are marked *