SlideShare a Scribd company logo
1 of 8
Cybercriminals are
Weaponizing Social
Media and
Jeopardizing Privacy
Social media has greatly changed in the past few decades. Today, we are
witnessing a paradigm shift in our interactions with the globe. Recently a time
came when it was the only mode of touch with the outer world. But with its share
of so many positives, there are some negatives too, which are hard to ignore.
No doubt, social media has given us a good enough laugh but we need to be
aware of it at the same time. This place can be weaponized easily to spread
hatred and misinformation and promote scams. Dr Shekhar Kanti Sarkar considers
it a serious problem that needs to be addressed with strict laws.
Dr Sarkar is a Deputy Registrar of Administration and the campus In-charge of the Guwahati Campus of
Mahapurusha Srimanta Sankaradeva Viswavidyalaya. Dealing with young minds on a daily basis, he
understands the seriousness of this medium and how grave its consequences can be if not dealt with on
time.
The social media platforms which made us fall in love with their interfaces and interactions are
opportunities for cybercriminals too. According to Dr S K Sarkar, trust is expensive and can be taken
for granted in today’s digital times. Since this is what lays the very foundation of social media handles,
there is a deep pool of personal data available everywhere. Even people are sharing their important
details without giving them much thought. And, this blind trust is costing us heftily as these pools of
information can be easily stolen and are used either for creating synthetic identities or for identity thefts.
With the massive use of social media today, cybercrimes have also evolved and now exist in multiple
forms, which can easily impact your social media handling. Dr Sekhar Kanti Sarkar also agrees with
the fact that cybercrimes have gone wild these days because everyone has access to social media and
anonymous interaction has become very easy. Users are more susceptible to the below-listed attacks
now:
Malware
If you are clicking on links which you do not recognize in any way
or if you open anonymous attachments sent to you, you are paving
the way for potential malware infections. Malware is nothing but
malicious software, designed specifically to cripple or take over your
computer system. In addition to this, it also has the ability to install
viruses in your system.
Reconnaissance
Reconnaissance is not just for the police or the federal systems;
cybercriminals have their own types too. They use this to look out
for people on social media platforms to prey upon. The information,
thus, gathered will be used to create fake profiles or to impersonate
somebody. This can lead to situations where sensitive information
can be leaked to take advantage of somebody.
Social engineering
Social engineering is yet another way of smoothly stealing
information or people’s identities. This information is then used for
personal gains or financial fraud. The method mostly involves
hackers collecting all the possible personal information about the
individual and then constructing phishing emails about the same.
There can be other communication methods too, with which, they
can easily gain access to their personal or financial details.
And, the list does not end here!
Today, there are multiple laws that govern social media usage in the country, which can help you
safeguard your privacy. For instance, any criminal activity, even on the internet, will be addressed
through the Indian Penal Code. Sections 499 and 500 of the law are primarily meant to protect
individuals against any form of social media abuse.
Dr S K Sarkar calls it just a start. Stricter social media rules and regulations are needed along with
that, there is a need to implement privacy control solutions more thoroughly to bring cybercrime under
control. It is always better not to overshare on the internet and know the audience with whom you are
connecting. The public profile must be under complete control and check what data you are publishing
through your handles.It’s time to take the lead in the right direction and fight cybercrime. Precautions
can help us go a long way, in keeping cybercrimes at bay. So, stay cautious and always overthink when
you are online!
For more details visit :-
https://www.apnnews.com/cybercriminals-are-weaponizing-social-media-and-jeopardizing-
privacy/?__cf_chl_rt_tk=cqFGgc1l6N7PScG6TDfkrD2ddB86CWKIBO0jYk3adUo-1677675134-0-
gaNycGzNCqU

More Related Content

Similar to cybercriminals are weaponizing social media and jeopardizing privacy

1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docxRAJU852744
 
Social media, Technology, and Youth
Social media, Technology, and YouthSocial media, Technology, and Youth
Social media, Technology, and YouthKhadija Parween
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYgailmowal
 
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...Associate Professor in VSB Coimbatore
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
School Essay Examples Of Academi
School Essay Examples Of AcademiSchool Essay Examples Of Academi
School Essay Examples Of AcademiJody Sullivan
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Milind Agarwal
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technologyijtsrd
 
Impact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and ChallengesImpact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and Challengesijtsrd
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineIRJET Journal
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfRinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxHimabindu905359
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 

Similar to cybercriminals are weaponizing social media and jeopardizing privacy (20)

1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
Social media, Technology, and Youth
Social media, Technology, and YouthSocial media, Technology, and Youth
Social media, Technology, and Youth
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
School Essay Examples Of Academi
School Essay Examples Of AcademiSchool Essay Examples Of Academi
School Essay Examples Of Academi
 
broadcast media assignment
broadcast media assignmentbroadcast media assignment
broadcast media assignment
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Impact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and ChallengesImpact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and Challenges
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 

Recently uploaded

Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...tewhimanshu23
 
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsPolitician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsVoterMood
 
Indegene Limited IPO Detail - Divadhvik
Indegene Limited IPO Detail  - DivadhvikIndegene Limited IPO Detail  - Divadhvik
Indegene Limited IPO Detail - Divadhvikdhvikdiva
 
The political system of the united kingdom
The political system of the united kingdomThe political system of the united kingdom
The political system of the united kingdomlunadelior
 
Dubai Call Girls Pinky O525547819 Call Girl's In Dubai
Dubai Call Girls Pinky O525547819 Call Girl's In DubaiDubai Call Girls Pinky O525547819 Call Girl's In Dubai
Dubai Call Girls Pinky O525547819 Call Girl's In Dubaikojalkojal131
 
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...IT Industry
 
10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdf422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdflambardar420420
 
11052024_First India Newspaper Jaipur.pdf
11052024_First India Newspaper Jaipur.pdf11052024_First India Newspaper Jaipur.pdf
11052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Job-Oriеntеd Courses That Will Boost Your Career in 2024
Job-Oriеntеd Courses That Will Boost Your Career in 2024Job-Oriеntеd Courses That Will Boost Your Career in 2024
Job-Oriеntеd Courses That Will Boost Your Career in 2024Insiger
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfssuser5750e1
 
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdfFIRST INDIA
 

Recently uploaded (14)

call girls inMahavir Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls inMahavir Nagar  (delhi) call me [🔝9953056974🔝] escort service 24X7call girls inMahavir Nagar  (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls inMahavir Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...
 
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsPolitician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full Details
 
Indegene Limited IPO Detail - Divadhvik
Indegene Limited IPO Detail  - DivadhvikIndegene Limited IPO Detail  - Divadhvik
Indegene Limited IPO Detail - Divadhvik
 
The political system of the united kingdom
The political system of the united kingdomThe political system of the united kingdom
The political system of the united kingdom
 
Dubai Call Girls Pinky O525547819 Call Girl's In Dubai
Dubai Call Girls Pinky O525547819 Call Girl's In DubaiDubai Call Girls Pinky O525547819 Call Girl's In Dubai
Dubai Call Girls Pinky O525547819 Call Girl's In Dubai
 
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
 
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
 
10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf
 
422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdf422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdf
 
11052024_First India Newspaper Jaipur.pdf
11052024_First India Newspaper Jaipur.pdf11052024_First India Newspaper Jaipur.pdf
11052024_First India Newspaper Jaipur.pdf
 
Job-Oriеntеd Courses That Will Boost Your Career in 2024
Job-Oriеntеd Courses That Will Boost Your Career in 2024Job-Oriеntеd Courses That Will Boost Your Career in 2024
Job-Oriеntеd Courses That Will Boost Your Career in 2024
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdf
 
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf
 

cybercriminals are weaponizing social media and jeopardizing privacy

  • 2. Social media has greatly changed in the past few decades. Today, we are witnessing a paradigm shift in our interactions with the globe. Recently a time came when it was the only mode of touch with the outer world. But with its share of so many positives, there are some negatives too, which are hard to ignore. No doubt, social media has given us a good enough laugh but we need to be aware of it at the same time. This place can be weaponized easily to spread hatred and misinformation and promote scams. Dr Shekhar Kanti Sarkar considers it a serious problem that needs to be addressed with strict laws.
  • 3. Dr Sarkar is a Deputy Registrar of Administration and the campus In-charge of the Guwahati Campus of Mahapurusha Srimanta Sankaradeva Viswavidyalaya. Dealing with young minds on a daily basis, he understands the seriousness of this medium and how grave its consequences can be if not dealt with on time. The social media platforms which made us fall in love with their interfaces and interactions are opportunities for cybercriminals too. According to Dr S K Sarkar, trust is expensive and can be taken for granted in today’s digital times. Since this is what lays the very foundation of social media handles, there is a deep pool of personal data available everywhere. Even people are sharing their important details without giving them much thought. And, this blind trust is costing us heftily as these pools of information can be easily stolen and are used either for creating synthetic identities or for identity thefts. With the massive use of social media today, cybercrimes have also evolved and now exist in multiple forms, which can easily impact your social media handling. Dr Sekhar Kanti Sarkar also agrees with the fact that cybercrimes have gone wild these days because everyone has access to social media and anonymous interaction has become very easy. Users are more susceptible to the below-listed attacks now:
  • 4. Malware If you are clicking on links which you do not recognize in any way or if you open anonymous attachments sent to you, you are paving the way for potential malware infections. Malware is nothing but malicious software, designed specifically to cripple or take over your computer system. In addition to this, it also has the ability to install viruses in your system.
  • 5. Reconnaissance Reconnaissance is not just for the police or the federal systems; cybercriminals have their own types too. They use this to look out for people on social media platforms to prey upon. The information, thus, gathered will be used to create fake profiles or to impersonate somebody. This can lead to situations where sensitive information can be leaked to take advantage of somebody.
  • 6. Social engineering Social engineering is yet another way of smoothly stealing information or people’s identities. This information is then used for personal gains or financial fraud. The method mostly involves hackers collecting all the possible personal information about the individual and then constructing phishing emails about the same. There can be other communication methods too, with which, they can easily gain access to their personal or financial details. And, the list does not end here!
  • 7. Today, there are multiple laws that govern social media usage in the country, which can help you safeguard your privacy. For instance, any criminal activity, even on the internet, will be addressed through the Indian Penal Code. Sections 499 and 500 of the law are primarily meant to protect individuals against any form of social media abuse. Dr S K Sarkar calls it just a start. Stricter social media rules and regulations are needed along with that, there is a need to implement privacy control solutions more thoroughly to bring cybercrime under control. It is always better not to overshare on the internet and know the audience with whom you are connecting. The public profile must be under complete control and check what data you are publishing through your handles.It’s time to take the lead in the right direction and fight cybercrime. Precautions can help us go a long way, in keeping cybercrimes at bay. So, stay cautious and always overthink when you are online!
  • 8. For more details visit :- https://www.apnnews.com/cybercriminals-are-weaponizing-social-media-and-jeopardizing- privacy/?__cf_chl_rt_tk=cqFGgc1l6N7PScG6TDfkrD2ddB86CWKIBO0jYk3adUo-1677675134-0- gaNycGzNCqU