Hacking offense and defense: the most insidious seven black skills (1)

  

Nowadays, in the Internet era where “information is at the fingertips”, many people have their own e-mail, QQ number, MSN and other communication tools to contact friends and family, and many people register on social networking sites. With my own account, this will undoubtedly greatly facilitate our work and life. However, as the unscrupulous criminals are eyeing social networks, ordinary users are faced with a huge “blackout” risk when they go online.
Social networking focuses on building online communities of people with common interests and activities, and it can also be a collection of people interested in exploring other people's interests and activities. Many social networks are web-based and offer users the opportunity to interact, such as email and other instant messaging services mentioned at the beginning of the article.

Social networks can be illustrated as follows:

The greatest danger of social networks is the damage to personal identity and other information. It may cause your photo to be sent to an adult website to destroy your image. It may also cause the confidential information of your online bank card to be stolen, and you may unwittingly confiscate the company's trade secrets to the world!

Don't take it lightly, don't feel it This kind of thing won't happen to you or your company. Social networks are an important place for phishers, spammers, botnet controllers, and corporate spies to make a profit. If they are used carelessly, they can easily ruin the fate of a company or individual.

The root of the problem is that the social networking site itself is not secure. Under normal circumstances, such sites do not authenticate users, users can not fully confirm the identity of the so-called friends online, and attackers can easily use the "trustworthy" culture within the social network to make a big chunk of it. However, many users do not enable or deploy certain security and privacy options offered by these sites.

For example, social networking application development tools, such as OpenSocial, and some third-party tools can be easily exploited by attackers to spread malware or reveal personally private information. In addition, there is a real risk of corporate espionage, and attackers can easily exploit the information of network employees to perform other attacks. Moreover, some popular web attacks, such as cross-site scripting attacks, can also be used to deal with members of social networks.

Don't be complacent because you don't allow private information such as home address, phone number, etc., because it doesn't protect you from security threats. There is no real privacy on the Internet. Users can only delay the risk of information being compromised. Users need to think of the entire Internet as a platform where all resources will last forever.

Attacks on social networks are just beginning, so think twice before posting your personal information, or be cautious when accepting and trusting new friends. As attackers become more aware of social networks, their attacks will become more serious. The facts show that social networking sites have become a breeding ground for cyber attacks.

Sun Zi said that knowing each other, there is no war. To deal with social network attacks, we must first deal with such attacks. The author talks about the attackers' most insidious seven social networks: "black technology":

1. Identity counterfeiting and targeted personal information attacks

Second, manufacturing spam and botnet

Third, the modified social network application

Fourth, the intersection of personal information and professional information

Cross-site scripting attacks or cross-site request forgery

VI. Identity theft

Seven, company spy

Let’s talk one by one:

I. Identity Counterfeit and targeted personal information attacks

Don't assume that security experts are not threatened by social networks. In recent years, social network attacks have become more and more extensive, and personal information of many social networking sites has been posted on other websites, which means that even experts may not be spared. The perpetrator can use the personally identifiable information to threaten the victim, such as sending photos to the Internet.

If a member of a social networking site quickly updates what he or she has done, or annotated multiple "followers", it is simply introducing other factors into social network security, namely physics. Safety. Maybe you didn't tell others who you are and where you are, but that doesn't stop the guy with ulterior motives from knowing your message.

For example, spreading too much information about individuals (such as travel information or travel plans) to the Internet may lead to burglary. This shows that this can lead to serious physical security problems. So everyone should not easily post their information to social networking sites.

Copyright © Windows knowledge All Rights Reserved