Langsung ke konten utama

Hacking and Social Networks

When people talk about hacking and social networks, they're not referring to the com­mon definition of hacking, which is using malicious code or backdoors in computer networks to damage systems or steal proprietary information. Hacking into social networks requires very little technical skill. It's much more of a psychological game -- using information on personal profiles to win a complete stranger's trust.

This second type of hacking is called social engineering. Social engineering uses persuasive psychological techniques to exploit the weakest link in the information security system: people [source: SearchSecurity.com]. Examples of social engineering scams could be:
  • Calling a systems administrator posing as an angry executive who forgot his password and needs to access his computer immediately.
  • Posing as a bank employee and calling a customer to ask for his credit card number.
  • Pretending to lose your key card and kindly asking an employee to let you into the office.
[sources: SecurityFocus and SearchSecurity.com] When creating a profile page on a social network, many people fail to consider the possible security risks. The more personal and professional information you include on your public profile, the easier it is for a hacker to exploit that information to gain your trust.

hackers
© Chris Jackson / Getty Images
With online social-networking sites, you have to watch for hackers who invent profiles and steal information.
Let's say you're an engineer and you blog about one of your current projects on your Facebook page. A hacker can use that information to pose as an employee from that company. He has your name and your position in the company, so you're liable to trust him. Now he can try to get a password out of you or proprietary information that he can sell to your competitors.

The security advantage of most online social networks is that only your "friends" or members of your network can see your complete profile. That's only effective if you're extremely selective about whom you include in your network. If you accept invitations from absolutely everyone, one of those people may potentially be a hacker.

The problem with online social networks is that they have no built-in authentication system to verify that someone is indeed who they say they are [source: OnLamp.com]. A hacker can create a free profile on a site like LinkedIn, designing his profile to match perfectly with the business interests of his target. If the target accepts the hacker as a connection, then the hacker suddenly has access to information on all of the target's other connections. With all that information, it's possible to construct an elaborate identity theft scam.

To fight back against social engineering, the key is awareness [source: SecurityFocus.com]. If you know that social engineering hackers exist, you'll be more careful about what you post on your online profiles. And if you're familiar with common social engineering scams, you'll recognize a con when it's happening instead of when it's too late.
Source : communication.howstuffworks.com 

POPULAR

Rasulullah Pingsan dan Menangis Saat Mendengarkan Jibril Mengisahkan Pintu Neraka

Yazid Ar raqqasyi dari Anas bin Malik ra. berkata: Jibril datang kepada Rasulullah pada waktu yang ia tidak biasa datang dalam keadaan berubah mukanya, maka ditanya oleh Rasululah Saw: "Mengapa aku melihat kau berubah muka (wajah)?" Jawabnya: "Ya Muhammad, aku datang kepadamu di saat Allah menyuruh supaya dikobarkan penyalaan api neraka, maka tidak layak bagi orang yang mengetahui bahwa neraka Jahannam itu benar, siksa kubur itu benar, dan siksa Allah itu terbesar untuk bersuka-suka sebelum ia merasa aman daripadanya".

Kerajaan Jeumpa, Kerajaan Islam Pertama Nusantara

Teori tentang kerajaan Islam pertama di Nusantara sampai saat ini masih banyak diperdebatkan oleh para peneliti, baik cendekiawan Muslim maupun non Muslim. Umumnya perbedaan pendapat tentang teori ini didasarkan pada teori awal mula masuknya Islam ke Nusantara. Mengenai teori Islamisasi di Nusantara, para ahli sejarah terbagi menjadi 3 kelompok besar, yaitu pendukung (i) Teori Gujarat (ii) Teori Parsia dan (iii) Teori Mekah (Arab). Bukan maksud tulisan ini untuk membahas teori-teori tersebut secara mendetil, namun dari penelitian yang penulis lakukan, maka dapat disimpulkan bahwa Teori Mekkah (Arab) lebih mendekati kebenaran dengan fakta-fakta yang dikemukakan. Teori Mekkah (Arab) hakikatnya adalah koreksi terhadap teori Gujarat dan bantahan terhadap teori Persia. Di antara para ahli yang menganut teori ini adalah T.W. Arnold, Crawfurd, Keijzer, Niemann, De Holander, SMN. Al-Attas, A. Hasymi, dan Hamka. i Arnold menyatakan para pedagang Arab menyebarkan Islam ketika mereka mendo...

Generasi Muda Wajib Tahu! Museum Tsunami Aceh Jadi Pusat Belajar Mitigasi

MUSEUM Tsunami Aceh kembali jadi sorotan. Kali ini, Wakil Menteri Kependudukan dan Pembangunan Keluarga ( Wamen Dukbangga ) atau Wakil Kepala BKKBN , Ratu Ayu Isyana Bagoes Oka , berkunjung langsung untuk melihat bagaimana museum kebanggaan masyarakat Aceh ini terus hidup sebagai pusat edukasi kebencanaan, Kamis, 9 Oktober 2025.  Didampingi Ketua TP PKK Aceh Marlina Usman, kunjungan ini bukan sekadar seremoni. Isyana menegaskan bahwa museum ini punya peran strategis: bukan hanya monumen peringatan tsunami 2004 , tapi juga ruang belajar generasi muda tentang kesiapsiagaan bencana dan ketangguhan keluarga. “Museum ini jadi pengingat dahsyatnya tsunami 2004, sekaligus tempat belajar bagi generasi yang saat itu belum lahir. Mereka perlu tahu apa yang harus dilakukan saat bencana datang,” ujar Isyana, yang juga mengenang pengalamannya meliput langsung Aceh pascatsunami 20 tahun lalu. Kepala UPTD Museum Tsunami Aceh M Syahputra AZ, menyambut hangat kunjungan ini. Ia menegaskan bahw...