Social Engineering of Social Networks

[ad_1]

Social Engineering, for those who probably are not aware of, refers to the method of sharing confidential information from people through non-technical means which allow unauthorized access to a valued system and the information that resides on it. In a few words, this is an attack that normally serves hackers to gain access to the corporate network or to target individuals for the purpose of the attack.

The purpose of this article is to highlight the importance of the privacy of Internet security and how this is linked with social engineering. Examples of social engineering attack involves the attacker, the victim and information retrieval. Imagine that you post on Facebook some destinations and places you’ve visited and you have described them interested. An attacker could use this information to call you up (find your store or even from Facebook or email). Then ask yourself the attacker to give personal information, with the excuse that you have won money will be by lottery, made for customers of the hotel, where you had stayed as long as you were to visit places that you describe in your profile. Probably you could trust him and give him information about you, even your social security number or possibly your bank account. The next step is to call your bank and pretend to be you, say to your online account was closed and you need a new password. Data bank will need are already available for the attacker and the request can go to. This is an easy way to lose money and not be aware of the fact that everything, at least not initially.

It is one of many examples, which occur in everyday life, but most of us do not know the dangers that exist, but over exposing so many personal data. Even bigger is the risk for the company, especially if we consider the growing use of LinkedIn, which is a social network designed exclusively for professionals. Many users publish their CV and often share it with people they have never met. There are many ways that attackers can exploit such information as they can lead to violations of the company infrastructure and jeopardize sensitive data and business continuity.

[ad_2]