Nowadays, in the Internet era where “information is at the fingertips”, many people have their own e-mail, QQ number, MSN and other communication tools to contact friends and family, and many people register on social networking sites. With my own account, this will undoubtedly greatly facilitate our work and life. However, as the unscrupulous criminals are eyeing social networks, ordinary users are faced with a huge “blackout” risk when they go online.
Social networking focuses on building online communities of people with common interests and activities, and it can also be a collection of people interested in exploring other people's interests and activities. Many social networks are web-based and offer users the opportunity to interact, such as email and other instant messaging services mentioned at the beginning of the article.
Social networks can be illustrated as follows:
The greatest danger of social networks is the damage to personal identity and other information. It may cause your photo to be sent to an adult website to destroy your image. It may also cause the confidential information of your online bank card to be stolen, and you may unwittingly confiscate the company's trade secrets to the world!
Don't take it lightly, don't feel it This kind of thing won't happen to you or your company. Social networks are an important place for phishers, spammers, botnet controllers, and corporate spies to make a profit. If they are used carelessly, they can easily ruin the fate of a company or individual.
The root of the problem is that the social networking site itself is not secure. Under normal circumstances, such sites do not authenticate users, users can not fully confirm the identity of the so-called friends online, and attackers can easily use the "trustworthy" culture within the social network to make a big chunk of it. However, many users do not enable or deploy certain security and privacy options offered by these sites.
For example, social networking application development tools, such as OpenSocial, and some third-party tools can be easily exploited by attackers to spread malware or reveal personally private information. In addition, there is a real risk of corporate espionage, and attackers can easily exploit the information of network employees to perform other attacks. Moreover, some popular web attacks, such as cross-site scripting attacks, can also be used to deal with members of social networks.
Don't be complacent because you don't allow private information such as home address, phone number, etc., because it doesn't protect you from security threats. There is no real privacy on the Internet. Users can only delay the risk of information being compromised. Users need to think of the entire Internet as a platform where all resources will last forever.
Attacks on social networks are just beginning, so think twice before posting your personal information, or be cautious when accepting and trusting new friends. As attackers become more aware of social networks, their attacks will become more serious. The facts show that social networking sites have become a breeding ground for cyber attacks.
Sun Zi said that knowing each other, there is no war. To deal with social network attacks, we must first deal with such attacks. The author talks about the attackers' most insidious seven social networks: "black technology":
1. Identity counterfeiting and targeted personal information attacks
Second, manufacturing spam and botnet
Third, the modified social network application
Fourth, the intersection of personal information and professional information
Cross-site scripting attacks or cross-site request forgery
VI. Identity theft
Seven, company spy
Let’s talk one by one:
I. Identity Counterfeit and targeted personal information attacks
Don't assume that security experts are not threatened by social networks. In recent years, social network attacks have become more and more extensive, and personal information of many social networking sites has been posted on other websites, which means that even experts may not be spared. The perpetrator can use the personally identifiable information to threaten the victim, such as sending photos to the Internet.
If a member of a social networking site quickly updates what he or she has done, or annotated multiple "followers", it is simply introducing other factors into social network security, namely physics. Safety. Maybe you didn't tell others who you are and where you are, but that doesn't stop the guy with ulterior motives from knowing your message.
For example, spreading too much information about individuals (such as travel information or travel plans) to the Internet may lead to burglary. This shows that this can lead to serious physical security problems. So everyone should not easily post their information to social networking sites.
2, anti-virus software removal In fact, if you install anti-virus software, as long as the virus da
The computer has been in use for a long time. Sometimes when we open a window of the system, it open
In WinXP, data is managed by files. For example, if the properties in the file are changed, you will
I believe that few people still remember the screen keyboard of WinXP. The screen keyboard is actual
Windows XP quickly modify the way the file is opened
Deeply hide the components in the XP system how to completely remove
Change the XP system configuration to make the system run faster (3)
Thirteen rules that must be observed to maintain XP system security
Easily improve the performance of XP system
What should I do if the WinXP Control Panel "Switch Category View" is missing?
winXP registry skills application collection (2)
Practical DOS commands let you know what a simple "hacking" is
XP system built-in variable values how to customize
Quick homemade emergency Windows recovery disk (2)
MCU IO port expansion technology
The system requirements for building RAID
My computer is my master. I use the Win7 management program to run
Win10 PC RS2 Preview 14942 Getting Started Video
After upgrading Win10, what should I do if the 360 browser does not connect to the Internet?
Why is the program not available on Win8 Metro?
Computer host power supply should pay attention to what is the interface such as
Experts share the Win 7 problem step recorder operation guide