Think before posting anything on social networks, hackers can exploit them to launch attacks
For many people, taking selfies, taking photos at work and sharing on social networks to save happy moments while working is very normal. However, the content you share publicly on social networks can be hacked by people who still walk around the social network to search for photos, videos or anything else that can help them in the vandalism. , taking advantage of turning into an attack tool where you work.
Below is a share of Stephanie Carruthers, a core member of IBM X-Force Red hacker team, an expert in digging up social media posts to find potential security holes, one person redundant ability to view Facebook photos but also hack other people. After reading it, you may have to think a little bit before posting anything on social media.
Carruthers' job is to find security holes of companies before crooks can take advantage of them.
There is a fact that not everyone knows, public postings on seemingly harmless social networks are a true gold mine, containing lots of useful information to help Carruthers' team make attacks. . They can see a lot of things from the background of a photo, such as security cards, laptop screens or even memo sheets of passwords.
There are 4 types of posts that contain the most risks, which means bringing the most opportunities for hackers.
Collective photos
Collective photos with colleagues at noon or when participating in certain activities together contain more information than you think. Posters showing upcoming teambuilding events, certain meeting schedules or email addresses . are easy to appear in the background of the photo and put you at risk of revealing relevant information.
For example, in the case of a mail leak, the hacker will take advantage of sending you an email containing malicious code that, when opened, will officially turn into a security hole of the company.
The type of card that the company grants to employees
New employees when they receive a new security card or take a close-up card and post it on social networks. This makes Carruthers easily create an identical product with another face in just minutes. Maybe this card doesn't work on scanners but it's enough for Carruthers to get in and out of your company easily.
Job diary video
If the employee did a video about a working day at the company, Carruthers could see the office architecture, the restricted area to go in and the table detailing the future plan . equivalent to Break into the company.
In addition, the laptop screen may display the security software installed. Based on that Carruthers can send to a malicious file device disguised as security software updates.
Complaints or moans
For any company, employees complaining about work, remuneration policies are inevitable. Just knowing that information, Carruthers can compose malicious content, hit right on the psychology of employees.
For example, an employee of a Carruthers company complained on social networks about a little parking space. Taking advantage of this, Carruthers wrote an email describing the new parking policy, along with a false warning that all vehicles outside the parking area would be 'cranked'.
Countless employees received the mail happy to get a place to park and feared that the car would be 'crippled' and immediately clicked on a map of fake parking spaces that was actually a malicious file that Carruthers created, Attached to mail.
After infiltrating into the four office walls, Carruthers could get a lot of information, from sensitive information recorded on meeting room tables and wifi passwords attached to the daylight. Based on that, Carruthers can break the barrier to grasp the company's secrets.
With social media posts, Carruthers may have enough information to look directly into the office without going anywhere.
So before sharing your work-related posts, ask yourself "What is my post that I don't want hackers to know?" ok
- 4 ways for parents to teach their children to use the Internet and social networks safely
- What to do to make sensitive photos and videos not exposed and spread on the network?
You should read it
- Top 10 social networks to replace Facebook (part 2)
- These are 5 interesting social networks for those who want to give up Facebook
- What is Social Networking?
- What is addiction to social networks and how to solve this problem?
- 6 negative impacts of social networks on users
- Social networks do not create a diversity of views
- How to post to multiple social networks
- Social networks cause losses of billions of dollars / year
May be interested
- Pervert found the victim's house by zooming into her eyes through selfie photos on social networksperverted find the address of the victim through the selfie that the girl or posted on social networks by zooming in on things reflected in her eyes - literally!
- These are 5 interesting social networks for those who want to give up Facebookafter scandal to expose information of 50 million accounts, many users have lost faith in facebook, the most popular social network today. if you are one of them and want to leave facebook, the following social networks may be a better choice for you.
- Social networks cause losses of billions of dollars / yearsocial networks have been accused with all felonies. it deprives people of direct communication, makes people lazy because of their dependence on the internet, it also causes some other psychological problems.
- What is Social Engineering? How to prevent Social Engineering?social engineering is a type of attack based on human interaction and often involves manipulating things by breaking common security processes, accessing systems and networks to gain financial benefits. main.
- Social networks must simplify terms of useaccording to the british council for science and technology, social networking should simplify the current terms and conditions of use.
- Things you should not share on social networkshuman privacy is increasingly being violated, if we don't protect ourselves, no one can help it. so, before posting anything on social networks, make sure you don't post the content listed below.
- 6 interactive social networks for your entertainment needswhether you like a night of movies every week or reading a good book, there are many social networks for entertainment that will suit your needs.
- Top 10 most popular social networks todaytop 10 most popular social networks today. our lives today are full of internet connection and it is also a stepping stone for a series of social networks launched and operated. when learning about social networks, we will see a range of different names and how they work in completely different ways.
- What secret is behind the trend of posting 10-year photos on Facebook?the trend of posting pictures now and 10 years ago is causing storms on social networks but according to analysis of wired's technology reporter kate o'neill, this could be one of the ways facebook collects data to dig create machines for users' aging.
- What is addiction to social networks and how to solve this problem?for many years, there has been much debate about using excessive social networks as a type of internet addiction disorder (iad), a symptom of another disorder, or just a bad habit.