Previous Page  8 / 48 Next Page
Information
Show Menu
Previous Page 8 / 48 Next Page
Page Background

Social Media Spying

.

With the advent of social

media and the somewhat viral

dependency

many

people

have on it, it’s no wonder that

cybercriminals are turning to

social as a way to trap potential

victims. A public forum on

which soon-to-be victims spend

hours sharing their personal

information, social media is low-

hanging fruit — a true hacker’s

dreamscape. You can never be

100 percent certain that your

information is secure on any of

the most popular social media

platforms: Security settings reset

themselves; platform updates

cause private profiles to become

public; and unsuspecting users

make connections with total

strangers either by accident or

because of sheer laziness. All of

these instances open up a vault

of private information that’s free

for the hacker’s taking. Some of

the more obvious details users

should avoid revealing on their

social media pages include

personal information such as

maiden names, birth dates and

phone numbers. Of course,

vacation status should never be

advertised either — it can give

thieves a perfect opportunity to

track down your residence and

take advantage of your absence.

Social

Engineering.

Hackers often create

traps to generate the exposure

of personal information. Known

as “social engineering,” this

method depends on social

interaction, trust, and human

empathy to be effective. When

it’s done successfully, social

engineering can reap great

rewards for the hacker in

terms of useful personal data

— and it requires a lot less

guesswork than traditional

methods. In social engineering

hacks, cybercriminals portray

themselves as a legitimate

company or individual to gain

a victim’s trust and exploit their

need for a product or service.

OldHardwareRestoration.

We recommend being

extra-vigilant when throwing

away

or

trading

in

old

smartphones,

tablets

and

computer hardware. Never get

rid of these devices without being

Ever get those random friend requests from people you’ve never met? Be careful, it may very well be a

hacker deploying a fake profile trying to steal your information. Hackers regularly employ many different

methods to try and steal your information, including deploying fake profiles through random friend

requests in the hopes that you’ll accept. Hard to believe, but it’s true. Here are some of the top hacker

favorites you should watch for and how to protect yourself.

1

2

3

Are You

Facebook FriendsWith

Your Hacker

ByJeanneDeWitt

SOAR TO SUCCESS

/

A

ugust

2016

/

Core Business Strategy