Langsung ke konten utama

Hacking and Social Networks

When people talk about hacking and social networks, they're not referring to the com­mon definition of hacking, which is using malicious code or backdoors in computer networks to damage systems or steal proprietary information. Hacking into social networks requires very little technical skill. It's much more of a psychological game -- using information on personal profiles to win a complete stranger's trust.

This second type of hacking is called social engineering. Social engineering uses persuasive psychological techniques to exploit the weakest link in the information security system: people [source: SearchSecurity.com]. Examples of social engineering scams could be:
  • Calling a systems administrator posing as an angry executive who forgot his password and needs to access his computer immediately.
  • Posing as a bank employee and calling a customer to ask for his credit card number.
  • Pretending to lose your key card and kindly asking an employee to let you into the office.
[sources: SecurityFocus and SearchSecurity.com] When creating a profile page on a social network, many people fail to consider the possible security risks. The more personal and professional information you include on your public profile, the easier it is for a hacker to exploit that information to gain your trust.

hackers
© Chris Jackson / Getty Images
With online social-networking sites, you have to watch for hackers who invent profiles and steal information.
Let's say you're an engineer and you blog about one of your current projects on your Facebook page. A hacker can use that information to pose as an employee from that company. He has your name and your position in the company, so you're liable to trust him. Now he can try to get a password out of you or proprietary information that he can sell to your competitors.

The security advantage of most online social networks is that only your "friends" or members of your network can see your complete profile. That's only effective if you're extremely selective about whom you include in your network. If you accept invitations from absolutely everyone, one of those people may potentially be a hacker.

The problem with online social networks is that they have no built-in authentication system to verify that someone is indeed who they say they are [source: OnLamp.com]. A hacker can create a free profile on a site like LinkedIn, designing his profile to match perfectly with the business interests of his target. If the target accepts the hacker as a connection, then the hacker suddenly has access to information on all of the target's other connections. With all that information, it's possible to construct an elaborate identity theft scam.

To fight back against social engineering, the key is awareness [source: SecurityFocus.com]. If you know that social engineering hackers exist, you'll be more careful about what you post on your online profiles. And if you're familiar with common social engineering scams, you'll recognize a con when it's happening instead of when it's too late.
Source : communication.howstuffworks.com 

Postingan populer dari blog ini

57% Use Social Network Sites

The power of online social networking was demonstrated by the tens of thousands who gathered in Shanghai at the weekend to pay their respects to the people who died in last Monday's blaze. The event at Jiaozhou Road was launched on microblogs and information spread rapidly on the Internet , especially on social networking sites such as Kaixin001.com. According to a survey by Shanghai Daily and Touchmedia, of 110,000 people traveling in taxis in Shanghai, Beijing, Guangzhou and Shenzhen , 57 percent of interviewees use social networking sites or microblogs for more than half an hour a day, and 18 percent for more than three hours. Microblogging is the most popular form. Almost 60 percent of the interviewees said they publish information on microblogs, communicating with friends, following celebrities, expressing their opinions, sharing jokes and conducting online marketing, said the survey.

Upcoming Facebook Redesign Surface

Kerajaan Jeumpa, Kerajaan Islam Pertama Nusantara

Teori tentang kerajaan Islam pertama di Nusantara sampai saat ini masih banyak diperdebatkan oleh para peneliti, baik cendekiawan Muslim maupun non Muslim. Umumnya perbedaan pendapat tentang teori ini didasarkan pada teori awal mula masuknya Islam ke Nusantara. Mengenai teori Islamisasi di Nusantara, para ahli sejarah terbagi menjadi 3 kelompok besar, yaitu pendukung (i) Teori Gujarat (ii) Teori Parsia dan (iii) Teori Mekah (Arab). Bukan maksud tulisan ini untuk membahas teori-teori tersebut secara mendetil, namun dari penelitian yang penulis lakukan, maka dapat disimpulkan bahwa Teori Mekkah (Arab) lebih mendekati kebenaran dengan fakta-fakta yang dikemukakan. Teori Mekkah (Arab) hakikatnya adalah koreksi terhadap teori Gujarat dan bantahan terhadap teori Persia. Di antara para ahli yang menganut teori ini adalah T.W. Arnold, Crawfurd, Keijzer, Niemann, De Holander, SMN. Al-Attas, A. Hasymi, dan Hamka. i Arnold menyatakan para pedagang Arab menyebarkan Islam ketika mereka mendo...