It’s undeniable that social media has become part of the lives of us 21st century human beings. We regularly update our Twitter accounts to air our 140-character thoughts or updates, and carefully curate our Instagram feeds. We’re constantly on Facebook for updates from our friends and family and, increasingly, to check on the latest news-worthy headlines and celebrity buzz. Everybody can’t seem to get enough of social media – and hackers love it.
Here’s how hackers make the most out of our social media addiction.
They use it to mine information about you.
Sharing your middle name or birthday seems harmless enough, and posting throwback pictures from your grade school days seems like fun, but hackers can easily use such information to answer the personal questions included in online user authentication. It may sound paranoid, but it’s better if you keep all this information to yourself or your closest friends and family. Better yet, don’t add any strangers on your social media accounts. As another idea, have a fake online birthday and don’t share your real one.
They use your own information to take advantage of weak passwords.
The reason why it’s highly encouraged to use a sophisticated password that contains special characters and numbers is to thwart the method called brute force. Often hackers using password-guessing scripts that systematically try a number of possibilities until they finally get the right one. Another method hackers use is the dictionary attack, which strings various words from a dictionary based on your personal details. Hackers consider this method highly effective, as we’re often likely to use familiar words as passwords.
They get your contacts and send emails that contain malware.
Organizations and large companies are guilty of oversharing on their social media pages, making them highly susceptible targets. A common method to hack into the corporate computer is to send emails that contain malware to a number of employee emails, which you can easily find on social media. Once an unknowing employee opens the attachment, the malware infects the computer and opens a “back door” that leads the hacker to the company’s internal network.
To avoid such attacks, be vigilant about the information you share online and don’t add people you don’t know on your social networking accounts.