Social Media Means
Photo by 3Motional Studio Pexels Logo Photo: 3Motional Studio

How do hackers profile you?

Social media is one of the easily accessible methods to build a profile on a person. A hacker can effortlessly open LinkedIn and find the person's name, phone, workplace, and email address. He can also see the surnames and job titles of people related to him.

Will Snapchat pay you?
Will Snapchat pay you?

The company pays on a curve, factoring in various engagement metrics, including the total number of unique video views and "favorites," as well as...

Read More »
What is the best hiring strategy?
What is the best hiring strategy?

What are the elements of a successful recruiting strategy? Develop a clear employer brand. Create job posts that reflect your company. Use social...

Read More »

98% of attacks are based on social engineering principles. That means hackers get information about their target and use the data to deceive the victim. The goal of such attacks is usually financially motivated. Specifically – to steal valuable information or gain immediate financial benefit. Understanding the processes of obtaining information on victims and using it against them can help you protect yourself against social engineering attacks and identity theft.

How do hackers get information about their victims?

There are two most common ways hackers get information about their targets – social media and dark web forums.

Social media: how easy is it to overshare information?

Social media is one of the easily accessible methods to build a profile on a person. A hacker can effortlessly open LinkedIn and find the person’s name, phone, workplace, and email address. He can also see the surnames and job titles of people related to him. Although building a user profile from social media data is time-consuming, it can be a profitable strategy. It is then easy for a hacker to impersonate another person (a client, a coworker, a business consultant, etc.) and use such information to build rapport. A convinced employee is likely to disclose confidential information: project login details, a list of employees who work on a project, and other secure data.

Dark web forums: the dangers of leaked data

Dark web forums are the first place where cyber criminals dump data after a successful data breach. For example, such data usually include email addresses and passwords, phone, social security numbers, names and surnames, and physical addresses. After more sophisticated data breaches, hackers might dump even the credit card details. They upload all this data for public sale. Consequently, other hackers get information about their victims by purchasing this listed data and using it to build a user profile. For instance, by buying only one leaked database, a hacker can receive a complete data package on its target.

What do hackers do with stolen information?

Do you need a degree to work in social media?
Do you need a degree to work in social media?

You can become a social media marketer with no degree, a non-related degree, or a related degree in business administration, PR, communications, or...

Read More »
What is the number 1 social media in the world?
What is the number 1 social media in the world?

Characteristic Number of active users in millions Facebook 2,910 YouTube 2,562 WhatsApp* 2,000 Instagram 1,478 9 more rows • Jul 26, 2022

Read More »

When hackers get information about the victim, they can use it for social engineering and other attacks.

They can either use the stolen information directly or indirectly:

Perform a direct action (f. e., to break into the person’s account);

Use this information for manipulating a victim (f. e., to impersonate a person and deceive the victim into giving away valuable data).

What can hackers do with your email and password?

When a hacker steals or buys leaked emails and passwords, he can use this information for a credential stuffing attack. In this attack, a cybercriminal tries to log into the person’s accounts using the leaked combination of email and password. Therefore, it is dangerous to reuse the same password on a few platforms. You make it easy for a cybercriminal.

What can hackers do with your name, phone, and address?

If hackers get information about your contact details such as phone and address, you should beware of phone-based scams. For instance, a cybercriminal can send you a text message saying that the apartment at your address has a debt of unpaid utility services. You might unknowingly click on a fraudulent link and pay the fake debt.

What can hackers do with your Social Security number and date of birth?

Social Security numbers and the date of birth are probably the most valuable information for a cybercriminal. Hackers can use this information for impersonating people or performing an action on behalf of the victim. Social Security number, person’s name, and date of birth can be enough to open a credit card, take out a loan, and get your tax refund.

What can hackers do with your credit card numbers?

A hacker does not need to possess your debit or credit card to use it for spending money. With a leaked credit card number and a CCV code, the hacker can purchase expensive goods, transfer money, and spend your savings online.

Can I freelance without a business?
Can I freelance without a business?

If you're comfortable operating under your own name (which is what most freelancers do), then you don't need to register a new business. In this...

Read More »
Do data analysts work from home?
Do data analysts work from home?

In a word, yes. Data is one of the fastest growing professions, and data analysts are in high demand. At the same time, remote work is on the rise;...

Read More »

How to protect your data from falling into the hands of the criminal?

Prevention is always more cost-effective than suffering from any kind of attack. Once you know how hackers get information about their victims, you can ensure your data is safe.

Here are the most critical tips on how to protect your data:

Do not share your phone number and physical address on social media. Evaluate possible consequences before sharing personal information about your home, yourself, or family. If you are approached by a representative from any company who knows information about you or your business, be extra cautious. If doubting, hang up the phone and call the company using the contacts on their website. Never use the same password on more than one account. Always use long, complex passwords to provide maximum protection for your online accounts. Never click on any suspicious links. Learn to recognize phishing scams. If possible, do not use your credit card as a payment method. Use alternative payment methods such as PayPal or electronic bank transfers. If an organization asks for your Social Security number, provide them with an alternative ID: a passport or a driving license number. Never use your SSN or your date of birth as a password. Avoid including any personal information in your credentials. Use an encrypted password manager to store all valuable information (passwords, secret notes, credit card information, and other login details).

Stay safe!

How many books does the average author sell on Amazon?
How many books does the average author sell on Amazon?

Again, it's important to be realistic about how many books the average indie author can expect to sell. Some research shows that 250 to 300 books...

Read More »
Does rewatching the same video count as a view?
Does rewatching the same video count as a view?

Do replays count as views on YouTube? Yes, but only if the replays seem natural. If you replay a video once, it will count as a view. However, if...

Read More »
How long is too much social media?
How long is too much social media?

Too Much Social Media Can Be Bad for Our Mental Health Individuals who report excessive social media use, defined as use for more than an average...

Read More »
What are the 5 Ps of digital marketing?
What are the 5 Ps of digital marketing?

Discover the Value the 5 P's of Marketing Can Bring. The 5 P's of marketing – Product, Price, Promotion, Place, and People – are a framework that...

Read More »