Social Media Profiling

Duration: 4 mins 20 secs
Share this media item:
Embed this media item:


About this item
Social Media Profiling's image
Description: Many phishing attacks and identity theft are possible due to social engineering, this is when cyber criminals use deception to trick you into divulging your confidential or personal information that may be used later for fraudulent purposes.
 
Created: 2017-09-19 09:03
Collection: Cyber Security
Publisher: University of Cambridge
Copyright: University of Cambridge
Language: eng (English)
Keywords: social engineering; identity theft; online fraud; cyber security;
Credits:
Author:  Lynn Foot
Producer:  Ruth Charles
Transcript
Transcript:
Meet Lily Wang. DOB: 14th February 1988. A research student at Cambridge. Lily likes meeting new people.

Lily uses Social Media to stay in touch with friends, family, and to build up her professional network.

She uses many Social Media platforms frequently. Lily is kind, she raises money for good causes through online sites.

Lily uses the same profile photo everywhere online.

This is Ivan. DOB unknown, he looks about 35, he works and studies online. Ivan also likes meeting new people online.

Ivan has a presence on every Social Media platform yet his photo is not on the Internet. Ivan is generous too – he buys holidays for friends and family and celebrates his successes extravagantly.

But Ivan is not as nice - he thinks people are foolish and makes his living using information people share online.

Ivan is very patient. He is good at finding lots of free information on the Internet to build up profiles of people. He uses this to steal identities and money.

Today, Ivan found Lily on Facebook. He saw that she raises a lot of money for charity and this immediately aroused his interest.

He followed through to Twitter and found her again, this time tweeting about her research. He learnt all about her recent trips from instagram. Facebook told him the things she likes and her home and University contact details were on LinkedIn. By the end of the day Ivan knows a lot about Lily.

Ivan wonders what would be revealed by Googling her image. https://images.google.com

As Lily is involved in research and outreach his search finds 3 pages of links.

Ivan then starts to plan a spearphishing attack to become part of her social network he asks a question about her research.

Lily responds to his email and she soon trusts Ivan.

What might Ivan discover about you? Put your profile photo into google image search and view your social media profiles from a non-logged in browser.

600,000 Facebook accounts are hacked every day.So what can you do to stay safe using social media and help protect your data and your identity from being stolen?

Don’t accept contact requests from people you don’t know, we’re sure you know that but if not, unfriend immediately.

Be careful what you share, especially your date of birth or any information that banks use to verify accounts or lost passwords.

Phone numbers, pictures of your home, workplace or school, your address or birthday are currency to people like Ivan.

Check your privacy settings, don’t broadcast everything to the whole world.

Review your app permissions. Whenever you log in to another site using Facebook or add another app you've opened another door for personal data leakage.

Enable login alerts when someone signs into your account from a new device.

Check your social networking sites’ own online safety pages.

Twitter http://support.twitter.com/articles/76036-safety-keeping-your-account-secure
Instagram https://help.instagram.com
Facebook http://facebook.com/help/safety

Stop! Think! Before you click.
Available Formats
Format Quality Bitrate Size
MPEG-4 Video 640x360    763.29 kbits/sec 24.23 MB View
WebM 640x360    336.02 kbits/sec 10.71 MB View
iPod Video 480x360    517.36 kbits/sec 16.42 MB View
MP3 44100 Hz 250.28 kbits/sec 8.19 MB Listen
Auto * (Allows browser to choose a format it supports)