SlideShare a Scribd company logo
1 of 13
Threaths and Risks
in Social Media
Basics
ā€¢

Social media and social networking is all about communicating and sharing
information with people

ā€¢

Once the information is registered to a page it is no longer private

ā€¢

The personal information can be used to conduct attacks against both the user
and the users associates

ā€¢

The more one post the more vulnerable one become

ā€¢

The information posted is NOT only used in the social media

ā€¢

Attacks that uses the shared information but does NOT come by way of the
social networking sites: baiting, click-jacking, cross-site scripting, doxing,
elicitaion, pharming, phreaking, scams, spoofing and phishing
Baiting
ā€¢

Through a USB drive (or other electronic media) preloaded with malware,
worms etc. attacking when using the device

ā€¢

Prevent by ensuring the origin of the device is safe
Click-jacking
ā€¢

Secret hyperlinks under legitimate links which causes when clicked
unknowningly performed actions eg. downloading malware or sharing ID:s

ā€¢

Disable scripting and iframes, maximize the security options
Cross-site scripting
ā€¢

Malicious codes injected to trusted websites

ā€¢

Turn off ā€HTTP TRACEā€ support
Doxing
ā€¢

Public release of personal indentifying information (including pictures)

ā€¢

Be careful with what to share
Elicitation
ā€¢

Strategical use of conversation extracting information without giving the victim
the feeling of interrogation

ā€¢

Be aware of the tactics the social engineers use
Pharming
ā€¢

Redirecting users from safe sites to extract personal data (eg. mimicking bank
sites)

ā€¢

Type websites instead of clicking on links, look out for URL:s that use variations
in spelling or domain names
Phreaking
ā€¢

Gaining unauthorized access to telecommunication systems

ā€¢

Do not provide secure phone numbers providing access to a Private Branch
Exchange or through the Public Branch Exchange to the public phone network
Scams
ā€¢

Fake deals that trick people into providing eg. money in exchange for the deal

ā€¢

Sounds too good to be true? Popular events and news are often used as bait to
open infected emails, visit infected websites, or donate money to bogus
charities
Spoofing
ā€¢

Hiding or faking user identitys

ā€¢

Know the co-workers, clients etc. of a business or the family and friends on the
other hand
Phishing
ā€¢

Usually emails that looks like originated from a legitimate organization/person
and contains links or files with malware etc.

ā€¢

Do not open or click on attachments or links if not 100% sure of its safe
Sources
ā€¢

http://www.fbi.gov/about-us/investigate/counterintelligence/internet-socialnetworking-risks

More Related Content

What's hot

Day 2
Day 2Day 2
Day 2
sefreed
Ā 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
Andreas Hiller
Ā 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
Andreas Hiller
Ā 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
canadianlawyer
Ā 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Mark Jhon Oxillo
Ā 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
brendaylo
Ā 

What's hot (18)

Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
Ā 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
Ā 
Day 2
Day 2Day 2
Day 2
Ā 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
Ā 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing Awareness
Ā 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
Ā 
Social media risk
Social media riskSocial media risk
Social media risk
Ā 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
Ā 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Ā 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
Ā 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineering
Ā 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
Ā 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Ā 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
Ā 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
Ā 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
Ā 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
Ā 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
Ā 

Viewers also liked

Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
jdrinks
Ā 
Fungi
FungiFungi
Fungi
jdrinks
Ā 
Minnesota Business Owners' Perceptions of State and Local Regulations
Minnesota Business Owners' Perceptions of State and Local RegulationsMinnesota Business Owners' Perceptions of State and Local Regulations
Minnesota Business Owners' Perceptions of State and Local Regulations
Center for Rural Policy & Development
Ā 
2 ruslaiana dancedrama
2 ruslaiana dancedrama2 ruslaiana dancedrama
2 ruslaiana dancedrama
Ducane Baki
Ā 
Bluetooth technology aditya
Bluetooth technology adityaBluetooth technology aditya
Bluetooth technology aditya
akshay8811
Ā 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
jdrinks
Ā 
Ntl sources slides 2011 gpo
Ntl sources slides 2011 gpoNtl sources slides 2011 gpo
Ntl sources slides 2011 gpo
Rosalyn Alleman
Ā 
Ecological succession & cycles of matter
Ecological succession & cycles of matterEcological succession & cycles of matter
Ecological succession & cycles of matter
jdrinks
Ā 
Introduction to plants
Introduction to plantsIntroduction to plants
Introduction to plants
jdrinks
Ā 
Awodele toxicidad moringa
Awodele toxicidad moringaAwodele toxicidad moringa
Awodele toxicidad moringa
Fausto Dutan
Ā 
Kingdom protista
Kingdom protistaKingdom protista
Kingdom protista
jdrinks
Ā 

Viewers also liked (20)

Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
Ā 
Fungi
FungiFungi
Fungi
Ā 
Minnesota Business Owners' Perceptions of State and Local Regulations
Minnesota Business Owners' Perceptions of State and Local RegulationsMinnesota Business Owners' Perceptions of State and Local Regulations
Minnesota Business Owners' Perceptions of State and Local Regulations
Ā 
Woefstok got talent - PP 2 - de eerste wedstrijd
Woefstok got talent - PP 2  - de eerste wedstrijdWoefstok got talent - PP 2  - de eerste wedstrijd
Woefstok got talent - PP 2 - de eerste wedstrijd
Ā 
vmware optimization
vmware optimizationvmware optimization
vmware optimization
Ā 
Karmax itinerary(1)
Karmax itinerary(1)Karmax itinerary(1)
Karmax itinerary(1)
Ā 
2 ruslaiana dancedrama
2 ruslaiana dancedrama2 ruslaiana dancedrama
2 ruslaiana dancedrama
Ā 
Bluetooth technology aditya
Bluetooth technology adityaBluetooth technology aditya
Bluetooth technology aditya
Ā 
Blogger !!
Blogger !!Blogger !!
Blogger !!
Ā 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
Ā 
Ntl sources slides 2011 gpo
Ntl sources slides 2011 gpoNtl sources slides 2011 gpo
Ntl sources slides 2011 gpo
Ā 
Security wp 101
Security wp 101Security wp 101
Security wp 101
Ā 
ŠŸŠµŃ€ŠµŠ³Š¾Š²Š¾Ń€Ń‹ с ŠŗŠøтŠ°Š¹ŃŠŗŠøŠ¼Šø ŠæŠ°Ń€Ń‚Š½ŠµŃ€Š°Š¼Šø. ŠžŃŠ¾Š±ŠµŠ½Š½Š¾ŃŃ‚Šø ŠŗŠøтŠ°Š¹ŃŠŗŠ¾Š¹ Š±ŠøŠ·Š½ŠµŃ ŠŗуŠ»ŃŒŃ‚ŃƒŃ€Ń‹
ŠŸŠµŃ€ŠµŠ³Š¾Š²Š¾Ń€Ń‹ с ŠŗŠøтŠ°Š¹ŃŠŗŠøŠ¼Šø ŠæŠ°Ń€Ń‚Š½ŠµŃ€Š°Š¼Šø. ŠžŃŠ¾Š±ŠµŠ½Š½Š¾ŃŃ‚Šø ŠŗŠøтŠ°Š¹ŃŠŗŠ¾Š¹ Š±ŠøŠ·Š½ŠµŃ ŠŗуŠ»ŃŒŃ‚ŃƒŃ€Ń‹ŠŸŠµŃ€ŠµŠ³Š¾Š²Š¾Ń€Ń‹ с ŠŗŠøтŠ°Š¹ŃŠŗŠøŠ¼Šø ŠæŠ°Ń€Ń‚Š½ŠµŃ€Š°Š¼Šø. ŠžŃŠ¾Š±ŠµŠ½Š½Š¾ŃŃ‚Šø ŠŗŠøтŠ°Š¹ŃŠŗŠ¾Š¹ Š±ŠøŠ·Š½ŠµŃ ŠŗуŠ»ŃŒŃ‚ŃƒŃ€Ń‹
ŠŸŠµŃ€ŠµŠ³Š¾Š²Š¾Ń€Ń‹ с ŠŗŠøтŠ°Š¹ŃŠŗŠøŠ¼Šø ŠæŠ°Ń€Ń‚Š½ŠµŃ€Š°Š¼Šø. ŠžŃŠ¾Š±ŠµŠ½Š½Š¾ŃŃ‚Šø ŠŗŠøтŠ°Š¹ŃŠŗŠ¾Š¹ Š±ŠøŠ·Š½ŠµŃ ŠŗуŠ»ŃŒŃ‚ŃƒŃ€Ń‹
Ā 
Ecological succession & cycles of matter
Ecological succession & cycles of matterEcological succession & cycles of matter
Ecological succession & cycles of matter
Ā 
Introduction to plants
Introduction to plantsIntroduction to plants
Introduction to plants
Ā 
Pm4 dev project_quality_management
Pm4 dev project_quality_managementPm4 dev project_quality_management
Pm4 dev project_quality_management
Ā 
Output meetup #2 č‡Ŗåˆ†ć®åø«åŒ ć‚’čŖžć‚‹
Output meetup #2 č‡Ŗåˆ†ć®åø«åŒ ć‚’čŖžć‚‹Output meetup #2 č‡Ŗåˆ†ć®åø«åŒ ć‚’čŖžć‚‹
Output meetup #2 č‡Ŗåˆ†ć®åø«åŒ ć‚’čŖžć‚‹
Ā 
Awodele toxicidad moringa
Awodele toxicidad moringaAwodele toxicidad moringa
Awodele toxicidad moringa
Ā 
Dell case
Dell caseDell case
Dell case
Ā 
Kingdom protista
Kingdom protistaKingdom protista
Kingdom protista
Ā 

Similar to Threaths and risks

INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
BHUt6
Ā 

Similar to Threaths and risks (20)

Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
Ā 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
Ā 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
Ā 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
Ā 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
Ā 
edu 3 ppt.pptx
edu 3 ppt.pptxedu 3 ppt.pptx
edu 3 ppt.pptx
Ā 
HACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxHACKING VS PHISHING.pptx
HACKING VS PHISHING.pptx
Ā 
HACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxHACKING VS PHISHING.pptx
HACKING VS PHISHING.pptx
Ā 
Phishing 101 General Course
Phishing 101 General CoursePhishing 101 General Course
Phishing 101 General Course
Ā 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networks
Ā 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Ā 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
Ā 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
Ā 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
Ā 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
Ā 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
Ā 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
Ā 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social Engineering
Ā 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
Ā 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
Ā 

More from HHSome

Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social media
HHSome
Ā 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
HHSome
Ā 
Social engineering
Social engineeringSocial engineering
Social engineering
HHSome
Ā 
Katharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessKatharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 Facelessness
HHSome
Ā 
Over posting
Over postingOver posting
Over posting
HHSome
Ā 
Censorship
CensorshipCensorship
Censorship
HHSome
Ā 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
HHSome
Ā 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
HHSome
Ā 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to prezi
HHSome
Ā 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promoting
HHSome
Ā 
Personal information
Personal informationPersonal information
Personal information
HHSome
Ā 

More from HHSome (19)

Assignment4
Assignment4Assignment4
Assignment4
Ā 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social media
Ā 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
Ā 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionage
Ā 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle Andersson
Ā 
Social engineering
Social engineeringSocial engineering
Social engineering
Ā 
Katharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessKatharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 Facelessness
Ā 
Over posting
Over postingOver posting
Over posting
Ā 
Censorship
CensorshipCensorship
Censorship
Ā 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
Ā 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
Ā 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to prezi
Ā 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promoting
Ā 
Phishing
PhishingPhishing
Phishing
Ā 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
Ā 
Personal information
Personal informationPersonal information
Personal information
Ā 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: Payments
Ā 
Malware
MalwareMalware
Malware
Ā 
Assignment4 yannick kramm
Assignment4 yannick krammAssignment4 yannick kramm
Assignment4 yannick kramm
Ā 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
Ā 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
Ā 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Ā 
Mcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot Model
Ā 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
Ā 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Ā 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
Ā 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Ā 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Ā 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Ā 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
Ā 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
Ā 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Ā 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Ā 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Ā 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Ā 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
Ā 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Ā 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Ā 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
Ā 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Ā 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Ā 

Threaths and risks

  • 1. Threaths and Risks in Social Media
  • 2. Basics ā€¢ Social media and social networking is all about communicating and sharing information with people ā€¢ Once the information is registered to a page it is no longer private ā€¢ The personal information can be used to conduct attacks against both the user and the users associates ā€¢ The more one post the more vulnerable one become ā€¢ The information posted is NOT only used in the social media ā€¢ Attacks that uses the shared information but does NOT come by way of the social networking sites: baiting, click-jacking, cross-site scripting, doxing, elicitaion, pharming, phreaking, scams, spoofing and phishing
  • 3. Baiting ā€¢ Through a USB drive (or other electronic media) preloaded with malware, worms etc. attacking when using the device ā€¢ Prevent by ensuring the origin of the device is safe
  • 4. Click-jacking ā€¢ Secret hyperlinks under legitimate links which causes when clicked unknowningly performed actions eg. downloading malware or sharing ID:s ā€¢ Disable scripting and iframes, maximize the security options
  • 5. Cross-site scripting ā€¢ Malicious codes injected to trusted websites ā€¢ Turn off ā€HTTP TRACEā€ support
  • 6. Doxing ā€¢ Public release of personal indentifying information (including pictures) ā€¢ Be careful with what to share
  • 7. Elicitation ā€¢ Strategical use of conversation extracting information without giving the victim the feeling of interrogation ā€¢ Be aware of the tactics the social engineers use
  • 8. Pharming ā€¢ Redirecting users from safe sites to extract personal data (eg. mimicking bank sites) ā€¢ Type websites instead of clicking on links, look out for URL:s that use variations in spelling or domain names
  • 9. Phreaking ā€¢ Gaining unauthorized access to telecommunication systems ā€¢ Do not provide secure phone numbers providing access to a Private Branch Exchange or through the Public Branch Exchange to the public phone network
  • 10. Scams ā€¢ Fake deals that trick people into providing eg. money in exchange for the deal ā€¢ Sounds too good to be true? Popular events and news are often used as bait to open infected emails, visit infected websites, or donate money to bogus charities
  • 11. Spoofing ā€¢ Hiding or faking user identitys ā€¢ Know the co-workers, clients etc. of a business or the family and friends on the other hand
  • 12. Phishing ā€¢ Usually emails that looks like originated from a legitimate organization/person and contains links or files with malware etc. ā€¢ Do not open or click on attachments or links if not 100% sure of its safe