SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
Online Social Networks




            Photo provided by http://flickr.com/photos/luc/1804295568/ via GNUCITIZEN



5 threats and 5 ways to use them safely
What are Online Social
               Networks?
   Online community of Internet users
   Users share common interests
    −   Hobbies
    −   Religion
    −   Politics
    −   Friends
    −   Schools

   Multiple ways for users to interact such as
    chat, messaging, email, video, voice chat, file
    sharing, blogging, discussion groups...
Who uses Online Social
            Networks?
   Most popular with
    “Generation-Y”
   “Teens and Tweens”
   “Generation-X” and
    older is the latest
    trend
Most Popular Social Networking
         Web Sites
Top 5
Threats to Online Social Networks
#1
Cyberbullying, stalking, and sexual predators




     Teens bashing other teens...
     Megan Meier suicide
     MySpace released a report in 2007 showing
      29,000 registered sex offenders on MySpace
#2 Vulnerabilities in Applications/Widgets

    Widgets, third-party applications
    XSS (Cross Site Scripting) Samy/Quicktime
    Malicious banner ads/background images (Alicia
     Keys’)
    Be careful! Some applications will override privacy
     settings!




From the blog post: “Invading the Space: Alicia Keys’ MySpace and… RBN?”
http://blog.trendmicro.com/invading-the-space-alicia-keys-myspace-and-rbn/
#3 Spear Phishing and SPAM
   Fake “friend requests”
   Emails that look like they are legitimate!




                     Screen shot courtesy of Paul Asadoorian, pauldotcom.com
#4 Collection and aggregation
           of personal data
   Most privacy policies are very vague
   Think about it...$35 per user when MySpace
    was sold to News Corp in 2005
   Sites like Plaxo aggregate all of these social
    networks together

    The following is an example of a privacy statement:

    “[SNS Provider] also logs non-personally identifiable
    information including IP address, profile information,
    aggregate user data, and browser type, from users and
    visitors to the site. This data is used to manage the
    website, track usage and improve the website services.
    This non-personally-identifiable information may be
    shared with third-parties to provide more relevant
    services and advertisements to members.”

    - From the ENISA position paper “Security Issues and
    Recommendations for Online Social Networks
#5 Evil Twin Attacks




                       Chris Pirillo by Alan Berner - The Seattle Times

   Fake profiles
   Reputation slander
   Corporate espionage (LinkedIn)
   Weak authentication of the user (are you who
    you say you are?)
Top 5
 Ways to Safely use
Online Social Networks
#1 Set appropriate privacy
               defaults
   All Social Networking sites have wide-open
    privacy defaults!
#2 Be careful with third-party
        applications/widgets
   Some of these applications will override
    privacy settings
   Example: “Secret Crush” Facebook
    application
    −   Installed adware “worm”




                           Photos from Fortinet: http://www.fortiguardcenter.com/advisory/FGA-2007-16.html
#3 Limit personal information
   Don’t post your full name, SSN, address...etc...
   Be cautious about posting information that
    could be used to identify you or locate you
    offline
   Careful with choosing an online alias and what
    it says about you


“The more info you share, the more valuable you are”
#4 Only accept friend
requests/connections from people
        you know directly
   Most are SPAM
   Most are bots that want to trick you!
   LinkedIn
    −   Be aware of corporate espionage!
#5 Only post information your mother
       is comfortable seeing!
   Anyone can view these photos including
    employers, friends, and enemy's
   Don't trust a private profile!




            “Use common sense!”
Questions?
tom@spylogic.net
http://spylogic.net

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issuesNousheen Arshad
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hackingmsaksida
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Phishing
PhishingPhishing
PhishingHHSome
 

Was ist angesagt? (20)

Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
OSINT Social Media Techniques - Macau social mediat lc
OSINT Social Media Techniques - Macau social mediat lc OSINT Social Media Techniques - Macau social mediat lc
OSINT Social Media Techniques - Macau social mediat lc
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Social Networking Security
Social Networking SecuritySocial Networking Security
Social Networking Security
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing
PhishingPhishing
Phishing
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Linkedin 101 ppt
Linkedin 101 pptLinkedin 101 ppt
Linkedin 101 ppt
 
Phishing
PhishingPhishing
Phishing
 

Andere mochten auch

Privacy in Social Network Sites
Privacy in Social Network SitesPrivacy in Social Network Sites
Privacy in Social Network Sitesdariphagen
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneInflection Point Global
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsCorinne Weisgerber
 
Presentation Dangers Of Social Media
Presentation   Dangers Of Social MediaPresentation   Dangers Of Social Media
Presentation Dangers Of Social MediaRichHughes
 
Social networking PPT
Social networking PPTSocial networking PPT
Social networking PPTvarun0912
 
Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Infomanjjb
 
Comfort food for all
Comfort food for allComfort food for all
Comfort food for allInfomanjjb
 
Taliban and Al Qaeda, culural sociology , Sage 2012
Taliban and Al Qaeda, culural sociology , Sage 2012Taliban and Al Qaeda, culural sociology , Sage 2012
Taliban and Al Qaeda, culural sociology , Sage 2012A.R.M. Imtiyaz
 
Effective use of the internet
Effective use of the internetEffective use of the internet
Effective use of the internetquiocho2
 
Extremism the bane of our society
Extremism the bane of our societyExtremism the bane of our society
Extremism the bane of our societyMaryam S. Abbasi
 
Shedding Light On Dark Social Media: Dave Duarte At Heavy Chef
Shedding Light On Dark Social Media: Dave Duarte At Heavy ChefShedding Light On Dark Social Media: Dave Duarte At Heavy Chef
Shedding Light On Dark Social Media: Dave Duarte At Heavy ChefHeavy Chef
 
Social Media - Welcome to the Dark Side
Social Media - Welcome to the Dark SideSocial Media - Welcome to the Dark Side
Social Media - Welcome to the Dark SideRick Mans
 
The dark side of social networking
The dark side of social networkingThe dark side of social networking
The dark side of social networkingJames Ruffer
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesM. Prabu Wibowo
 
The dark side of social media
The dark side of social mediaThe dark side of social media
The dark side of social mediaMathias Klang
 
Cyberbullying: The Dark Side of Social Media
Cyberbullying: The Dark Side of Social MediaCyberbullying: The Dark Side of Social Media
Cyberbullying: The Dark Side of Social Mediaadamkruger
 
Dangers of social networking sites
Dangers of social networking sitesDangers of social networking sites
Dangers of social networking siteslauricenicole
 
Extremism D Causes, Effects & D Cure Baasim Salafi Manhaj
Extremism D Causes, Effects & D Cure Baasim Salafi ManhajExtremism D Causes, Effects & D Cure Baasim Salafi Manhaj
Extremism D Causes, Effects & D Cure Baasim Salafi ManhajJasir T
 

Andere mochten auch (19)

Privacy in Social Network Sites
Privacy in Social Network SitesPrivacy in Social Network Sites
Privacy in Social Network Sites
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Presentation Dangers Of Social Media
Presentation   Dangers Of Social MediaPresentation   Dangers Of Social Media
Presentation Dangers Of Social Media
 
Social networking PPT
Social networking PPTSocial networking PPT
Social networking PPT
 
Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012
 
Comfort food for all
Comfort food for allComfort food for all
Comfort food for all
 
Taliban and Al Qaeda, culural sociology , Sage 2012
Taliban and Al Qaeda, culural sociology , Sage 2012Taliban and Al Qaeda, culural sociology , Sage 2012
Taliban and Al Qaeda, culural sociology , Sage 2012
 
Effective use of the internet
Effective use of the internetEffective use of the internet
Effective use of the internet
 
Extremism the bane of our society
Extremism the bane of our societyExtremism the bane of our society
Extremism the bane of our society
 
Shedding Light On Dark Social Media: Dave Duarte At Heavy Chef
Shedding Light On Dark Social Media: Dave Duarte At Heavy ChefShedding Light On Dark Social Media: Dave Duarte At Heavy Chef
Shedding Light On Dark Social Media: Dave Duarte At Heavy Chef
 
Social Media - Welcome to the Dark Side
Social Media - Welcome to the Dark SideSocial Media - Welcome to the Dark Side
Social Media - Welcome to the Dark Side
 
Evgeny Morozov
Evgeny MorozovEvgeny Morozov
Evgeny Morozov
 
The dark side of social networking
The dark side of social networkingThe dark side of social networking
The dark side of social networking
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal Issues
 
The dark side of social media
The dark side of social mediaThe dark side of social media
The dark side of social media
 
Cyberbullying: The Dark Side of Social Media
Cyberbullying: The Dark Side of Social MediaCyberbullying: The Dark Side of Social Media
Cyberbullying: The Dark Side of Social Media
 
Dangers of social networking sites
Dangers of social networking sitesDangers of social networking sites
Dangers of social networking sites
 
Extremism D Causes, Effects & D Cure Baasim Salafi Manhaj
Extremism D Causes, Effects & D Cure Baasim Salafi ManhajExtremism D Causes, Effects & D Cure Baasim Salafi Manhaj
Extremism D Causes, Effects & D Cure Baasim Salafi Manhaj
 

Ähnlich wie 5 Threats and 5 Ways to Safely Use Online Social Networks

Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Ben Woelk, CISSP, CPTC
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017KanelandSvihlik
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019KanelandSvihlik
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activitiesYumonomics
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaBen Woelk, CISSP, CPTC
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimesmarkgernale24
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal PrivacyDoubleXDS
 
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Ben Woelk, CISSP, CPTC
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 

Ähnlich wie 5 Threats and 5 Ways to Safely Use Online Social Networks (20)

Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
 
Internet Credibility
Internet CredibilityInternet Credibility
Internet Credibility
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
Protect Your Identity During Social Networking
Protect Your Identity During Social NetworkingProtect Your Identity During Social Networking
Protect Your Identity During Social Networking
 
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
 
Users guide
Users guideUsers guide
Users guide
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 

Mehr von Tom Eston

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
 
Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Tom Eston
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadTom Eston
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown Tom Eston
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Tom Eston
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Tom Eston
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesTom Eston
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredTom Eston
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsTom Eston
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringTom Eston
 
Staying Safe & Secure on Twitter
Staying Safe & Secure on TwitterStaying Safe & Secure on Twitter
Staying Safe & Secure on TwitterTom Eston
 
New School Man-in-the-Middle
New School Man-in-the-MiddleNew School Man-in-the-Middle
New School Man-in-the-MiddleTom Eston
 
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network BotsRise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network BotsTom Eston
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With MaltegoTom Eston
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactTom Eston
 
Automated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkAutomated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkTom Eston
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 

Mehr von Tom Eston (18)

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile Dead
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Staying Safe & Secure on Twitter
Staying Safe & Secure on TwitterStaying Safe & Secure on Twitter
Staying Safe & Secure on Twitter
 
New School Man-in-the-Middle
New School Man-in-the-MiddleNew School Man-in-the-Middle
New School Man-in-the-Middle
 
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network BotsRise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network Bots
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With Maltego
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core Impact
 
Automated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkAutomated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit Framework
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 

Kürzlich hochgeladen

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Kürzlich hochgeladen (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

5 Threats and 5 Ways to Safely Use Online Social Networks

  • 1. Online Social Networks Photo provided by http://flickr.com/photos/luc/1804295568/ via GNUCITIZEN 5 threats and 5 ways to use them safely
  • 2. What are Online Social Networks?  Online community of Internet users  Users share common interests − Hobbies − Religion − Politics − Friends − Schools  Multiple ways for users to interact such as chat, messaging, email, video, voice chat, file sharing, blogging, discussion groups...
  • 3. Who uses Online Social Networks?  Most popular with “Generation-Y”  “Teens and Tweens”  “Generation-X” and older is the latest trend
  • 4. Most Popular Social Networking Web Sites
  • 5. Top 5 Threats to Online Social Networks
  • 6. #1 Cyberbullying, stalking, and sexual predators  Teens bashing other teens...  Megan Meier suicide  MySpace released a report in 2007 showing 29,000 registered sex offenders on MySpace
  • 7. #2 Vulnerabilities in Applications/Widgets  Widgets, third-party applications  XSS (Cross Site Scripting) Samy/Quicktime  Malicious banner ads/background images (Alicia Keys’)  Be careful! Some applications will override privacy settings! From the blog post: “Invading the Space: Alicia Keys’ MySpace and… RBN?” http://blog.trendmicro.com/invading-the-space-alicia-keys-myspace-and-rbn/
  • 8. #3 Spear Phishing and SPAM  Fake “friend requests”  Emails that look like they are legitimate! Screen shot courtesy of Paul Asadoorian, pauldotcom.com
  • 9. #4 Collection and aggregation of personal data  Most privacy policies are very vague  Think about it...$35 per user when MySpace was sold to News Corp in 2005  Sites like Plaxo aggregate all of these social networks together The following is an example of a privacy statement: “[SNS Provider] also logs non-personally identifiable information including IP address, profile information, aggregate user data, and browser type, from users and visitors to the site. This data is used to manage the website, track usage and improve the website services. This non-personally-identifiable information may be shared with third-parties to provide more relevant services and advertisements to members.” - From the ENISA position paper “Security Issues and Recommendations for Online Social Networks
  • 10. #5 Evil Twin Attacks Chris Pirillo by Alan Berner - The Seattle Times  Fake profiles  Reputation slander  Corporate espionage (LinkedIn)  Weak authentication of the user (are you who you say you are?)
  • 11. Top 5 Ways to Safely use Online Social Networks
  • 12. #1 Set appropriate privacy defaults  All Social Networking sites have wide-open privacy defaults!
  • 13. #2 Be careful with third-party applications/widgets  Some of these applications will override privacy settings  Example: “Secret Crush” Facebook application − Installed adware “worm” Photos from Fortinet: http://www.fortiguardcenter.com/advisory/FGA-2007-16.html
  • 14. #3 Limit personal information  Don’t post your full name, SSN, address...etc...  Be cautious about posting information that could be used to identify you or locate you offline  Careful with choosing an online alias and what it says about you “The more info you share, the more valuable you are”
  • 15. #4 Only accept friend requests/connections from people you know directly  Most are SPAM  Most are bots that want to trick you!  LinkedIn − Be aware of corporate espionage!
  • 16. #5 Only post information your mother is comfortable seeing!  Anyone can view these photos including employers, friends, and enemy's  Don't trust a private profile! “Use common sense!”