SlideShare a Scribd company logo
Cybercriminals are
Weaponizing Social
Media and
Jeopardizing Privacy
Social media has greatly changed in the past few decades. Today, we are
witnessing a paradigm shift in our interactions with the globe. Recently a time
came when it was the only mode of touch with the outer world. But with its share
of so many positives, there are some negatives too, which are hard to ignore.
No doubt, social media has given us a good enough laugh but we need to be
aware of it at the same time. This place can be weaponized easily to spread
hatred and misinformation and promote scams. Dr Shekhar Kanti Sarkar considers
it a serious problem that needs to be addressed with strict laws.
Dr Sarkar is a Deputy Registrar of Administration and the campus In-charge of the Guwahati Campus of
Mahapurusha Srimanta Sankaradeva Viswavidyalaya. Dealing with young minds on a daily basis, he
understands the seriousness of this medium and how grave its consequences can be if not dealt with on
time.
The social media platforms which made us fall in love with their interfaces and interactions are
opportunities for cybercriminals too. According to Dr S K Sarkar, trust is expensive and can be taken
for granted in today’s digital times. Since this is what lays the very foundation of social media handles,
there is a deep pool of personal data available everywhere. Even people are sharing their important
details without giving them much thought. And, this blind trust is costing us heftily as these pools of
information can be easily stolen and are used either for creating synthetic identities or for identity thefts.
With the massive use of social media today, cybercrimes have also evolved and now exist in multiple
forms, which can easily impact your social media handling. Dr Sekhar Kanti Sarkar also agrees with
the fact that cybercrimes have gone wild these days because everyone has access to social media and
anonymous interaction has become very easy. Users are more susceptible to the below-listed attacks
now:
Malware
If you are clicking on links which you do not recognize in any way
or if you open anonymous attachments sent to you, you are paving
the way for potential malware infections. Malware is nothing but
malicious software, designed specifically to cripple or take over your
computer system. In addition to this, it also has the ability to install
viruses in your system.
Reconnaissance
Reconnaissance is not just for the police or the federal systems;
cybercriminals have their own types too. They use this to look out
for people on social media platforms to prey upon. The information,
thus, gathered will be used to create fake profiles or to impersonate
somebody. This can lead to situations where sensitive information
can be leaked to take advantage of somebody.
Social engineering
Social engineering is yet another way of smoothly stealing
information or people’s identities. This information is then used for
personal gains or financial fraud. The method mostly involves
hackers collecting all the possible personal information about the
individual and then constructing phishing emails about the same.
There can be other communication methods too, with which, they
can easily gain access to their personal or financial details.
And, the list does not end here!
Today, there are multiple laws that govern social media usage in the country, which can help you
safeguard your privacy. For instance, any criminal activity, even on the internet, will be addressed
through the Indian Penal Code. Sections 499 and 500 of the law are primarily meant to protect
individuals against any form of social media abuse.
Dr S K Sarkar calls it just a start. Stricter social media rules and regulations are needed along with
that, there is a need to implement privacy control solutions more thoroughly to bring cybercrime under
control. It is always better not to overshare on the internet and know the audience with whom you are
connecting. The public profile must be under complete control and check what data you are publishing
through your handles.It’s time to take the lead in the right direction and fight cybercrime. Precautions
can help us go a long way, in keeping cybercrimes at bay. So, stay cautious and always overthink when
you are online!
For more details visit :-
https://www.apnnews.com/cybercriminals-are-weaponizing-social-media-and-jeopardizing-
privacy/?__cf_chl_rt_tk=cqFGgc1l6N7PScG6TDfkrD2ddB86CWKIBO0jYk3adUo-1677675134-0-
gaNycGzNCqU

More Related Content

Similar to cybercriminals are weaponizing social media and jeopardizing privacy

1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
RAJU852744
 
Social media, Technology, and Youth
Social media, Technology, and YouthSocial media, Technology, and Youth
Social media, Technology, and Youth
Khadija Parween
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
todd521
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
gailmowal
 
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Associate Professor in VSB Coimbatore
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
Gaurav Patel
 
School Essay Examples Of Academi
School Essay Examples Of AcademiSchool Essay Examples Of Academi
School Essay Examples Of Academi
Jody Sullivan
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
Cut 2 Shreds
 
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Milind Agarwal
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
ijtsrd
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
Vanessa Assumpção
 
Impact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and ChallengesImpact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and Challenges
ijtsrd
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
IRJET Journal
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
RinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
Himabindu905359
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
Alan Raj
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
Alan Raj
 

Similar to cybercriminals are weaponizing social media and jeopardizing privacy (20)

1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
Social media, Technology, and Youth
Social media, Technology, and YouthSocial media, Technology, and Youth
Social media, Technology, and Youth
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
School Essay Examples Of Academi
School Essay Examples Of AcademiSchool Essay Examples Of Academi
School Essay Examples Of Academi
 
broadcast media assignment
broadcast media assignmentbroadcast media assignment
broadcast media assignment
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Impact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and ChallengesImpact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and Challenges
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 

Recently uploaded

03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Codes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptxCodes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptx
ZackSpencer3
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
hindustaninsider22
 
31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Resolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdfResolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdf
bhavenpr
 
2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts
olaola5673
 
EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023
El Estrecho Digital
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
bhavenpr
 
Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
rbakerj2
 
Gabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary JudgmentGabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary Judgment
Abdul-Hakim Shabazz
 
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdfSharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
bhavenpr
 
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
CIkumparan
 
AI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest TrendsAI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest Trends
CI kumparan
 
04062024_First India Newspaper Jaipur.pdf
04062024_First India Newspaper Jaipur.pdf04062024_First India Newspaper Jaipur.pdf
04062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Preview of Court Document for Iseyin community
Preview of Court Document for Iseyin communityPreview of Court Document for Iseyin community
Preview of Court Document for Iseyin community
contact193699
 
01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 

Recently uploaded (17)

03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf
 
Codes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptxCodes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptx
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
 
31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf
 
Resolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdfResolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdf
 
2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts
 
EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
 
Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
 
Gabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary JudgmentGabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary Judgment
 
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdfSharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
 
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
 
AI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest TrendsAI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest Trends
 
04062024_First India Newspaper Jaipur.pdf
04062024_First India Newspaper Jaipur.pdf04062024_First India Newspaper Jaipur.pdf
04062024_First India Newspaper Jaipur.pdf
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
 
Preview of Court Document for Iseyin community
Preview of Court Document for Iseyin communityPreview of Court Document for Iseyin community
Preview of Court Document for Iseyin community
 
01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf
 

cybercriminals are weaponizing social media and jeopardizing privacy

  • 2. Social media has greatly changed in the past few decades. Today, we are witnessing a paradigm shift in our interactions with the globe. Recently a time came when it was the only mode of touch with the outer world. But with its share of so many positives, there are some negatives too, which are hard to ignore. No doubt, social media has given us a good enough laugh but we need to be aware of it at the same time. This place can be weaponized easily to spread hatred and misinformation and promote scams. Dr Shekhar Kanti Sarkar considers it a serious problem that needs to be addressed with strict laws.
  • 3. Dr Sarkar is a Deputy Registrar of Administration and the campus In-charge of the Guwahati Campus of Mahapurusha Srimanta Sankaradeva Viswavidyalaya. Dealing with young minds on a daily basis, he understands the seriousness of this medium and how grave its consequences can be if not dealt with on time. The social media platforms which made us fall in love with their interfaces and interactions are opportunities for cybercriminals too. According to Dr S K Sarkar, trust is expensive and can be taken for granted in today’s digital times. Since this is what lays the very foundation of social media handles, there is a deep pool of personal data available everywhere. Even people are sharing their important details without giving them much thought. And, this blind trust is costing us heftily as these pools of information can be easily stolen and are used either for creating synthetic identities or for identity thefts. With the massive use of social media today, cybercrimes have also evolved and now exist in multiple forms, which can easily impact your social media handling. Dr Sekhar Kanti Sarkar also agrees with the fact that cybercrimes have gone wild these days because everyone has access to social media and anonymous interaction has become very easy. Users are more susceptible to the below-listed attacks now:
  • 4. Malware If you are clicking on links which you do not recognize in any way or if you open anonymous attachments sent to you, you are paving the way for potential malware infections. Malware is nothing but malicious software, designed specifically to cripple or take over your computer system. In addition to this, it also has the ability to install viruses in your system.
  • 5. Reconnaissance Reconnaissance is not just for the police or the federal systems; cybercriminals have their own types too. They use this to look out for people on social media platforms to prey upon. The information, thus, gathered will be used to create fake profiles or to impersonate somebody. This can lead to situations where sensitive information can be leaked to take advantage of somebody.
  • 6. Social engineering Social engineering is yet another way of smoothly stealing information or people’s identities. This information is then used for personal gains or financial fraud. The method mostly involves hackers collecting all the possible personal information about the individual and then constructing phishing emails about the same. There can be other communication methods too, with which, they can easily gain access to their personal or financial details. And, the list does not end here!
  • 7. Today, there are multiple laws that govern social media usage in the country, which can help you safeguard your privacy. For instance, any criminal activity, even on the internet, will be addressed through the Indian Penal Code. Sections 499 and 500 of the law are primarily meant to protect individuals against any form of social media abuse. Dr S K Sarkar calls it just a start. Stricter social media rules and regulations are needed along with that, there is a need to implement privacy control solutions more thoroughly to bring cybercrime under control. It is always better not to overshare on the internet and know the audience with whom you are connecting. The public profile must be under complete control and check what data you are publishing through your handles.It’s time to take the lead in the right direction and fight cybercrime. Precautions can help us go a long way, in keeping cybercrimes at bay. So, stay cautious and always overthink when you are online!
  • 8. For more details visit :- https://www.apnnews.com/cybercriminals-are-weaponizing-social-media-and-jeopardizing- privacy/?__cf_chl_rt_tk=cqFGgc1l6N7PScG6TDfkrD2ddB86CWKIBO0jYk3adUo-1677675134-0- gaNycGzNCqU