Social media allows users to share information publicly, but it also exposes them to various online threats. Once information is posted, it can be used to conduct attacks against both the user and their contacts. Attack methods mentioned in the document include baiting, clickjacking, cross-site scripting, doxing, elicitation, pharming, phreaking, scams, spoofing, and phishing. These attacks aim to secretly install malware, steal personal information, or trick users into revealing private details. The document advises being cautious about what information is shared online and checking URLs and email senders to avoid falling victim to such threats.