Social Media Spying
.
With the advent of social
media and the somewhat viral
dependency
many
people
have on it, it’s no wonder that
cybercriminals are turning to
social as a way to trap potential
victims. A public forum on
which soon-to-be victims spend
hours sharing their personal
information, social media is low-
hanging fruit — a true hacker’s
dreamscape. You can never be
100 percent certain that your
information is secure on any of
the most popular social media
platforms: Security settings reset
themselves; platform updates
cause private profiles to become
public; and unsuspecting users
make connections with total
strangers either by accident or
because of sheer laziness. All of
these instances open up a vault
of private information that’s free
for the hacker’s taking. Some of
the more obvious details users
should avoid revealing on their
social media pages include
personal information such as
maiden names, birth dates and
phone numbers. Of course,
vacation status should never be
advertised either — it can give
thieves a perfect opportunity to
track down your residence and
take advantage of your absence.
Social
Engineering.
Hackers often create
traps to generate the exposure
of personal information. Known
as “social engineering,” this
method depends on social
interaction, trust, and human
empathy to be effective. When
it’s done successfully, social
engineering can reap great
rewards for the hacker in
terms of useful personal data
— and it requires a lot less
guesswork than traditional
methods. In social engineering
hacks, cybercriminals portray
themselves as a legitimate
company or individual to gain
a victim’s trust and exploit their
need for a product or service.
OldHardwareRestoration.
We recommend being
extra-vigilant when throwing
away
or
trading
in
old
smartphones,
tablets
and
computer hardware. Never get
rid of these devices without being
Ever get those random friend requests from people you’ve never met? Be careful, it may very well be a
hacker deploying a fake profile trying to steal your information. Hackers regularly employ many different
methods to try and steal your information, including deploying fake profiles through random friend
requests in the hopes that you’ll accept. Hard to believe, but it’s true. Here are some of the top hacker
favorites you should watch for and how to protect yourself.
1
2
3
Are You
Facebook FriendsWith
Your Hacker
ByJeanneDeWitt
SOAR TO SUCCESS
/
A
ugust
2016
/
Core Business Strategy