Click me
Transcribed

10 Ways Hackers Are Profiting From Social Media

10 WAYS НАСКERS ARE PROFITING FROM SOCIAL MEDIA With the boom of social media, it is very common that people upload all sorts of private information in their platforms without realizing the risks this might represent. This infographic explains how hackers take advantage of these situations and how to prevent them from accessing and stealing your private information. THE FACTS Nearly two in three U.S. adults who have personal social media profiles say they are aware that their accounts have been hacked. 86% agree they limit the personal information they post due to the fear of it being accessed by hackers. 86% DON'T FORGET! When a hacker gets to you, he inherits access to all your contacts. If you use social media to comment on restaurants, services or retailers, he'll get access to your browsing and shopping history. MOST VALUABLE PLATFORMS Linkedin and eHarmony offer a goldmine of passwords that can be used to update hacker's databases that serve as a digital key for hacking encrypted passwords. in ---------- Twitter accounts are now more profitable than stolen credit cards. THEIR “BLACK MARKET" IS HUGE! Hackers make around 10 times more money hacking someone's medical information than from stealing their credit card details. HEALTH INSURANCE By stealing names, birth dates, etc. They can create fake IDs to buy medical equipment which they resell. Hackers can also use the data to file made-up insurance claims. HOW THEY DO IT SIDE JACKING STEALING The hacker easily gains access to accounts because the user has saved passwords in their browser. The hacker shares a wifi connection with the victim in public places and takes over their HTTP session. LOOK OUT FOR THIS Spoofing DNS: The hacker and the victim are using the same network, the hacker swaps the authentic Facebook page with his own, and gains access to the victim's information. AVOID GETTING HACKED free, Don't use the free public WiFi hotspots unless you use a WiFi VPN. By using a VPN, you can encrypt and hide your data, which the computer will send to the server. Stay aware! Install a firewall. TWO-FACTOR AUTHENTICATION This requires the user to provide further evidence of being the account owner by using something that only they possess. Rather than the typical notification of an account change, always go for the two-step option. USUALLY FORGOTTEN PRECAUTIONS Set complex and long passwords for your accounts. Download files from official genuine websites. Install an antivirus in your system. Don't trust everything you see online, and give your information only to official websites. CONTENT CONSUMPTION Take a good look at your online environment. A user must be aware not only of what content is shared with them but also the manner in which it is shared. REFERENCES https://thenextweb.com/contributors/2017/o8/a3/hackers-using social-media-hack/ hetp://www.businessinsider.com/hackers-are selling your data in highly sophisticated-black markets-2014-10- l Security and Research Division, Den Jackson, director of threat intelligence at Phishlabs, monitored underoveund hacki exchanges and discovered cyber criminals https://www.blirt.com.au/blirt-blog/how-to-protect-yourself-from-social-media-hackers https://www.cyberintelligence.in/why hackers-hack-social-media-accounts/ https://www.tripwire.com/state-of-security/security-awareness/securely-navigating-the-world-of-social-networking/ https://oursocialtimes.com/social-media-security/ CREATIVE

10 Ways Hackers Are Profiting From Social Media

shared by inographicdata on Mar 23
15 views
0 shares
0 comments
With the boom of social media, it is very common that people upload all sorts of private information in their platforms without realizing the risks this might represent. This infographic explains how ...

Category

Computers
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size