SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
HOW SAFE IS YOUR
CHECKING YOUR "SOCIAL SECURITY”
SOCIAL
NETWORK?
SOCIAL MEDIA STATS
FACEBOOK
49%FEMALE USERS
51%MALE USERS
310,000,000UNIQUE VISITORS
28%FEMALE USERS
72%MALE USERS
GOOGLE +
20,000,000UNIQUE VISITORS
27,500,000 48%FEMALE USERS
52%MALE USERSUNIQUE VISITORS
STUMBLE UPON
55%FEMALE USERS
45%MALE USERS
180,000,000UNIQUE VISITORS
TWITTER
25%FEMALE USERS
75%MALE USERS
13,752,948UNIQUE VISITORS
REDDIT
AVERAGE MINUTES PER VISITOR PER MONTH
FACEBOOK
6.75HOURS
1.5HOURS
PINTERESTTWITTER
21MINUTES
LINKEDIN
17MINUTES
GOOGLE +
3MINUTES
STUMBLE UPON
1.5HOURS
SOCIAL MEDIA PRIVACY SCORES
based off of 260 metrics from data-collection to privacy policies.
1
.9
.8
.7
.6
.5
.4
.3
.2
.1
LINKEDIN
CLASSMATES.COM
FACEBOOK
TWITTER
MYSPACE
HI5
FRIENDSTER
PRIVACYSCORE
(weak)
(average)
(strong)
SOCIAL NETWORKING WORMS
Enlist more machines into its botnet, and hijack more accounts to
send more spam to enlist more machines. All the while making
money with the usual botnet business, including scareware and
Russian dating services.
Multiple worm attacks. Mikeyy
worm started to spread via
Twitter posts by encouraging
you to click on a link.
1/6/2013TWITTER
TOP 10 THREATS
PHISHING BAIT
The e-mail that lured you to sign into Facebook, hoping you don't
pick up on the fbaction.net URL in the browser.
Phishing attacks designed to
gain passwords for profit.FACEBOOK 5/18/2013
TROJANS
URL Zone is a similar banking Trojan, but even smarter, it can
calculate the value of the victim's accounts to help decide the
priority for the thief.
SHORTENED LINKS
URL shortening services (e.g., Bit.ly and Tinyurl) to fit long URLs
into tight spaces. They also do a nice job of obfuscating the link so
it isn't immediately apparent to victims that they're clicking on a
malware install.
DATA LEAKS
Users share a bit too much about the organization -- projects,
products, financials, organizational changes, scandals, or other
sensitive information.
Passwords have been stolen.
6 million were compromised.LINKEDIN 6/6/2012
ADVANCED PERSISTENT THREATS
(APT) is the gathering of intelligence about persons of interest
(e.g., executives, officers, high-net-worth individuals), for which
social networks can be a treasure trove of data.
BOTNETS
Twitter accounts being used as a command and control channel for
a few botnets. The standard command and control channel is IRC,
but some have used other applications -- P2P file sharing in the
case of Storm -- and now, cleverly, Twitter.
!
CROSS-SITE REQUEST FORGERY (CSRF)
CSRF attacks exploit the trust a social networking application has
in a logged-in user's browser. So as long as the social network
application isn't checking the referrer header, it's easy for an attack
to "share" an image in a user's event stream that other users might
click on to catch/spread the attack.
IMPERSONATION
Several impersonators have gathered hundreds and thousands of
followers on Twitter -- and then embarrassed the folks they
impersonate.
TRUST
Like e-mail, when it hit the mainstream, or instant messaging when
it became ubiquitous, people trust links, pictures, videos and
executables when they come from "friends".
87%of small to medium-sized
businesses do not have formal,
written internet security policies.
70%of these businesses lack
policies for employees’ use of
social media, despite the fact that
they are increasingly favored by
cybercriminals for phishing attacks.
Once an attacker gains access to their account, they
can easily find a way to mine more information and to
use this to access their other accounts. The same is
true for corporate accounts, which are publicly
available on sites, like LinkedIn.
!
90% of sites don’t require a full name or date of
birth for permission to join.
80%of users failed to use standard encryption
protocols to protect sensitive user data from hackers.
71%of websites reserve the right to share user
data with third parties in their privacy policies.
CLICK TO SEE THE FULL INFOGRAPHIC HERE:
RESOURCES
http://preibusch.de/publications/Bonneau_Preibusch__Privacy_Jungle__2009-05-26.pdf
http://www.hula-hub.com/2012/03/21/top-social-media-statistics-infographic-2012/
http://www.marketingprofs.com/charts/2010/3596/social-networks-influential-not-always-trusted
http://www.digitaladvocate.net/?p=504
http://mashable.com/2012/11/28/social-media-time/
http://www.networkworld.com/news/2010/010710-social-networking-hacks.html?page=2
http://detroit.cbslocal.com/2012/06/06/report-linkedin-networking-site-hacked/
http://blog.ussignalcom.com/blog-1/bid/278223/Cyber-Attacks-2013-Hackers-Exploit-Social-Media
http://about-threats.trendmicro.com/us/webattack/75/spam%20scams%20and%20other%20social%20media%20threats
http://www.computerweekly.com/news/1280090217/Privacy-rankings-LinkedIn-and-Bebo-high-Facebook-and-MySpace-average-Badoo-low

Contenu connexe

Tendances

Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networkingBryan Tran
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingIshfaq Majid
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptxPink Elephant
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneInflection Point Global
 
Social media risk
Social media riskSocial media risk
Social media riskMosoco Ltd
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social mediaRyan Ward
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issuesNousheen Arshad
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickStefan Tanase
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crimeatifkhanniazi
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaIIIT Hyderabad
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networksblogzilla
 
Security and social media
Security and social mediaSecurity and social media
Security and social mediaJP Rains, MBA
 
Social Media May 2009
Social Media May 2009Social Media May 2009
Social Media May 2009derekabdinor
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide showBeckusq
 

Tendances (20)

Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Social media risk
Social media riskSocial media risk
Social media risk
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social media
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social Media
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
Security and social media
Security and social mediaSecurity and social media
Security and social media
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Social Media May 2009
Social Media May 2009Social Media May 2009
Social Media May 2009
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 

En vedette

Journal of Physical Security 7(2)
Journal of Physical Security 7(2)Journal of Physical Security 7(2)
Journal of Physical Security 7(2)Roger Johnston
 
Sonderwerbeformen | Goldbach Audience Austria
Sonderwerbeformen | Goldbach Audience AustriaSonderwerbeformen | Goldbach Audience Austria
Sonderwerbeformen | Goldbach Audience AustriaGoldbach Group AG
 
Órganos sensoriales -Línea de tiempo
Órganos sensoriales -Línea de tiempoÓrganos sensoriales -Línea de tiempo
Órganos sensoriales -Línea de tiempoLiliana Buitrago
 
Sondagem especial indústria da construção copa do mundo 2014 outubro 2011
Sondagem especial indústria da construção copa do mundo 2014   outubro 2011Sondagem especial indústria da construção copa do mundo 2014   outubro 2011
Sondagem especial indústria da construção copa do mundo 2014 outubro 2011Confederação Nacional da Indústria
 
Programme Spectacles du 22 Novembre
Programme Spectacles du 22 NovembreProgramme Spectacles du 22 Novembre
Programme Spectacles du 22 Novembrercronne
 
Fire performance of recycled rubber-filled high-strength concrete
Fire performance of recycled rubber-filled high-strength concreteFire performance of recycled rubber-filled high-strength concrete
Fire performance of recycled rubber-filled high-strength concreteMario Parra
 
Adrián aragonés cv (esp)
Adrián aragonés cv (esp)Adrián aragonés cv (esp)
Adrián aragonés cv (esp)Adrian Aragones
 
La medida del mundo renacentista.
La medida del mundo renacentista.La medida del mundo renacentista.
La medida del mundo renacentista.Susana Sanchez
 
Trabajo gustavo dario esteban
Trabajo gustavo dario estebanTrabajo gustavo dario esteban
Trabajo gustavo dario estebanm0n04598
 
Reflect In-Store Digital Media Solutions
Reflect In-Store Digital Media SolutionsReflect In-Store Digital Media Solutions
Reflect In-Store Digital Media SolutionsMatt Schmitt
 

En vedette (20)

Journal of Physical Security 7(2)
Journal of Physical Security 7(2)Journal of Physical Security 7(2)
Journal of Physical Security 7(2)
 
Sonderwerbeformen | Goldbach Audience Austria
Sonderwerbeformen | Goldbach Audience AustriaSonderwerbeformen | Goldbach Audience Austria
Sonderwerbeformen | Goldbach Audience Austria
 
My power point
My power pointMy power point
My power point
 
Órganos sensoriales -Línea de tiempo
Órganos sensoriales -Línea de tiempoÓrganos sensoriales -Línea de tiempo
Órganos sensoriales -Línea de tiempo
 
SDL BeGlobal im Unternehmensumfeld
SDL BeGlobal im UnternehmensumfeldSDL BeGlobal im Unternehmensumfeld
SDL BeGlobal im Unternehmensumfeld
 
Reklama na facebooku
Reklama na facebookuReklama na facebooku
Reklama na facebooku
 
Crisis y modelo de desarrollo. Faustino García M.
Crisis y modelo de desarrollo. Faustino García M.Crisis y modelo de desarrollo. Faustino García M.
Crisis y modelo de desarrollo. Faustino García M.
 
Sondagem especial indústria da construção copa do mundo 2014 outubro 2011
Sondagem especial indústria da construção copa do mundo 2014   outubro 2011Sondagem especial indústria da construção copa do mundo 2014   outubro 2011
Sondagem especial indústria da construção copa do mundo 2014 outubro 2011
 
Pnl
PnlPnl
Pnl
 
Programme Spectacles du 22 Novembre
Programme Spectacles du 22 NovembreProgramme Spectacles du 22 Novembre
Programme Spectacles du 22 Novembre
 
Edicion octubre 2015
Edicion octubre 2015 Edicion octubre 2015
Edicion octubre 2015
 
Fire performance of recycled rubber-filled high-strength concrete
Fire performance of recycled rubber-filled high-strength concreteFire performance of recycled rubber-filled high-strength concrete
Fire performance of recycled rubber-filled high-strength concrete
 
Progenika
ProgenikaProgenika
Progenika
 
Sigue a Advantia en Facebook
Sigue a Advantia en FacebookSigue a Advantia en Facebook
Sigue a Advantia en Facebook
 
Adrián aragonés cv (esp)
Adrián aragonés cv (esp)Adrián aragonés cv (esp)
Adrián aragonés cv (esp)
 
La medida del mundo renacentista.
La medida del mundo renacentista.La medida del mundo renacentista.
La medida del mundo renacentista.
 
Trabajo gustavo dario esteban
Trabajo gustavo dario estebanTrabajo gustavo dario esteban
Trabajo gustavo dario esteban
 
imágenes chistosas
imágenes chistosasimágenes chistosas
imágenes chistosas
 
Reflect In-Store Digital Media Solutions
Reflect In-Store Digital Media SolutionsReflect In-Store Digital Media Solutions
Reflect In-Store Digital Media Solutions
 
resume
resumeresume
resume
 

Similaire à How Safe Is YOUR Social Network?

Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile securityErnest Staats
 
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Typeset
 
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Mining Oil and Gas Jobs
 
SXSW09: The Future Of Social Networks
SXSW09: The Future Of Social NetworksSXSW09: The Future Of Social Networks
SXSW09: The Future Of Social NetworksCharlene Li
 
Isbdc hammong nw
Isbdc hammong nwIsbdc hammong nw
Isbdc hammong nwKyle Lacy
 
Kokomo Twitter Seminar
Kokomo Twitter SeminarKokomo Twitter Seminar
Kokomo Twitter SeminarKyle Lacy
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 
How To Use Social Networks As A Hr Tool
How To Use Social Networks As A Hr ToolHow To Use Social Networks As A Hr Tool
How To Use Social Networks As A Hr ToolJason P. Sullivan
 
New Albany Twitter Seminar
New Albany Twitter SeminarNew Albany Twitter Seminar
New Albany Twitter SeminarKyle Lacy
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity FinalCindy Kim
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Stites & Harbison
 
Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpnadelamm2
 
Privacy and Security on Online Social Media: Workshop on Data Analytics & Its...
Privacy and Security on Online Social Media: Workshop on Data Analytics & Its...Privacy and Security on Online Social Media: Workshop on Data Analytics & Its...
Privacy and Security on Online Social Media: Workshop on Data Analytics & Its...IIIT Hyderabad
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Impulse Digital
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearBob Wall
 

Similaire à How Safe Is YOUR Social Network? (20)

Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...
 
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...
 
SXSW09: The Future Of Social Networks
SXSW09: The Future Of Social NetworksSXSW09: The Future Of Social Networks
SXSW09: The Future Of Social Networks
 
Isbdc hammong nw
Isbdc hammong nwIsbdc hammong nw
Isbdc hammong nw
 
Kokomo Twitter Seminar
Kokomo Twitter SeminarKokomo Twitter Seminar
Kokomo Twitter Seminar
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
LetsTalkFX
LetsTalkFX LetsTalkFX
LetsTalkFX
 
Twitter
TwitterTwitter
Twitter
 
How To Use Social Networks As A Hr Tool
How To Use Social Networks As A Hr ToolHow To Use Social Networks As A Hr Tool
How To Use Social Networks As A Hr Tool
 
Social Media 101- LAAMA
Social Media 101- LAAMASocial Media 101- LAAMA
Social Media 101- LAAMA
 
New Albany Twitter Seminar
New Albany Twitter SeminarNew Albany Twitter Seminar
New Albany Twitter Seminar
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?
 
Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpna
 
Social media: Issues
Social media: Issues Social media: Issues
Social media: Issues
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Privacy and Security on Online Social Media: Workshop on Data Analytics & Its...
Privacy and Security on Online Social Media: Workshop on Data Analytics & Its...Privacy and Security on Online Social Media: Workshop on Data Analytics & Its...
Privacy and Security on Online Social Media: Workshop on Data Analytics & Its...
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
 

Plus de Blue Coat

Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeBlue Coat
 
What is Heartbleed?
What is Heartbleed?What is Heartbleed?
What is Heartbleed?Blue Coat
 
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL EncryptionInfographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL EncryptionBlue Coat
 
Empowering the Campus Network
Empowering the Campus NetworkEmpowering the Campus Network
Empowering the Campus NetworkBlue Coat
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionBlue Coat
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkBlue Coat
 
CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA InfographicBlue Coat
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionBlue Coat
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Blue Coat
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicBlue Coat
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBlue Coat
 
Are You a Hacker's Target?
Are You a Hacker's Target?Are You a Hacker's Target?
Are You a Hacker's Target?Blue Coat
 
How To Catch A Hidden Spammer
How To Catch A Hidden SpammerHow To Catch A Hidden Spammer
How To Catch A Hidden SpammerBlue Coat
 

Plus de Blue Coat (13)

Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
 
What is Heartbleed?
What is Heartbleed?What is Heartbleed?
What is Heartbleed?
 
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL EncryptionInfographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
 
Empowering the Campus Network
Empowering the Campus NetworkEmpowering the Campus Network
Empowering the Campus Network
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
 
CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA Infographic
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle Infographic
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat Protection
 
Are You a Hacker's Target?
Are You a Hacker's Target?Are You a Hacker's Target?
Are You a Hacker's Target?
 
How To Catch A Hidden Spammer
How To Catch A Hidden SpammerHow To Catch A Hidden Spammer
How To Catch A Hidden Spammer
 

Dernier

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 

Dernier (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

How Safe Is YOUR Social Network?

  • 1. HOW SAFE IS YOUR CHECKING YOUR "SOCIAL SECURITY” SOCIAL NETWORK?
  • 2. SOCIAL MEDIA STATS FACEBOOK 49%FEMALE USERS 51%MALE USERS 310,000,000UNIQUE VISITORS 28%FEMALE USERS 72%MALE USERS GOOGLE + 20,000,000UNIQUE VISITORS
  • 3. 27,500,000 48%FEMALE USERS 52%MALE USERSUNIQUE VISITORS STUMBLE UPON 55%FEMALE USERS 45%MALE USERS 180,000,000UNIQUE VISITORS TWITTER 25%FEMALE USERS 75%MALE USERS 13,752,948UNIQUE VISITORS REDDIT
  • 4. AVERAGE MINUTES PER VISITOR PER MONTH FACEBOOK 6.75HOURS 1.5HOURS PINTERESTTWITTER 21MINUTES LINKEDIN 17MINUTES GOOGLE + 3MINUTES STUMBLE UPON 1.5HOURS
  • 5. SOCIAL MEDIA PRIVACY SCORES based off of 260 metrics from data-collection to privacy policies. 1 .9 .8 .7 .6 .5 .4 .3 .2 .1 LINKEDIN CLASSMATES.COM FACEBOOK TWITTER MYSPACE HI5 FRIENDSTER PRIVACYSCORE (weak) (average) (strong)
  • 6. SOCIAL NETWORKING WORMS Enlist more machines into its botnet, and hijack more accounts to send more spam to enlist more machines. All the while making money with the usual botnet business, including scareware and Russian dating services. Multiple worm attacks. Mikeyy worm started to spread via Twitter posts by encouraging you to click on a link. 1/6/2013TWITTER TOP 10 THREATS
  • 7. PHISHING BAIT The e-mail that lured you to sign into Facebook, hoping you don't pick up on the fbaction.net URL in the browser. Phishing attacks designed to gain passwords for profit.FACEBOOK 5/18/2013 TROJANS URL Zone is a similar banking Trojan, but even smarter, it can calculate the value of the victim's accounts to help decide the priority for the thief.
  • 8. SHORTENED LINKS URL shortening services (e.g., Bit.ly and Tinyurl) to fit long URLs into tight spaces. They also do a nice job of obfuscating the link so it isn't immediately apparent to victims that they're clicking on a malware install. DATA LEAKS Users share a bit too much about the organization -- projects, products, financials, organizational changes, scandals, or other sensitive information. Passwords have been stolen. 6 million were compromised.LINKEDIN 6/6/2012
  • 9. ADVANCED PERSISTENT THREATS (APT) is the gathering of intelligence about persons of interest (e.g., executives, officers, high-net-worth individuals), for which social networks can be a treasure trove of data. BOTNETS Twitter accounts being used as a command and control channel for a few botnets. The standard command and control channel is IRC, but some have used other applications -- P2P file sharing in the case of Storm -- and now, cleverly, Twitter. !
  • 10. CROSS-SITE REQUEST FORGERY (CSRF) CSRF attacks exploit the trust a social networking application has in a logged-in user's browser. So as long as the social network application isn't checking the referrer header, it's easy for an attack to "share" an image in a user's event stream that other users might click on to catch/spread the attack. IMPERSONATION Several impersonators have gathered hundreds and thousands of followers on Twitter -- and then embarrassed the folks they impersonate. TRUST Like e-mail, when it hit the mainstream, or instant messaging when it became ubiquitous, people trust links, pictures, videos and executables when they come from "friends".
  • 11. 87%of small to medium-sized businesses do not have formal, written internet security policies. 70%of these businesses lack policies for employees’ use of social media, despite the fact that they are increasingly favored by cybercriminals for phishing attacks.
  • 12. Once an attacker gains access to their account, they can easily find a way to mine more information and to use this to access their other accounts. The same is true for corporate accounts, which are publicly available on sites, like LinkedIn. !
  • 13. 90% of sites don’t require a full name or date of birth for permission to join. 80%of users failed to use standard encryption protocols to protect sensitive user data from hackers. 71%of websites reserve the right to share user data with third parties in their privacy policies.
  • 14. CLICK TO SEE THE FULL INFOGRAPHIC HERE: RESOURCES http://preibusch.de/publications/Bonneau_Preibusch__Privacy_Jungle__2009-05-26.pdf http://www.hula-hub.com/2012/03/21/top-social-media-statistics-infographic-2012/ http://www.marketingprofs.com/charts/2010/3596/social-networks-influential-not-always-trusted http://www.digitaladvocate.net/?p=504 http://mashable.com/2012/11/28/social-media-time/ http://www.networkworld.com/news/2010/010710-social-networking-hacks.html?page=2 http://detroit.cbslocal.com/2012/06/06/report-linkedin-networking-site-hacked/ http://blog.ussignalcom.com/blog-1/bid/278223/Cyber-Attacks-2013-Hackers-Exploit-Social-Media http://about-threats.trendmicro.com/us/webattack/75/spam%20scams%20and%20other%20social%20media%20threats http://www.computerweekly.com/news/1280090217/Privacy-rankings-LinkedIn-and-Bebo-high-Facebook-and-MySpace-average-Badoo-low