Page 53 - English Tehelka Issue 6 - March 31, 2018
P. 53

social media




 Social Media Menace: How it   yourself these questions only when   applications seem irresistible and   the mental traits of his target.

                                               we  are  easy  prey  for  dishonest
                 you plan your defense accordingly.
                                                                               The same rule applies to the so-
                                                                             cial media platforms. So, think twice
                   A cracker collects information
                                               intentions. Before the launch, the
 violates our privacy and we   about the ‘would-be’ victim first. You  application asks to access the user’s   before accepting invitations from
                 may compare this to a war strategy.  profile, in most cases this is manda-
                                                                             friends just because another friend
                                                                             has referred it. Please do not feel
                 Before any attack, army generals sit  tory, and once we give the nod our
 are at the mercy of hackers  down and listen to every minute   carefully crafted privacy settings   obligated to navigate through a web
                 detail about the enemy; the loca-
                                                                             link given by a friend. Often your
                                               are violated. In a research paper,
                                                                             true friend does not know how he
                                               experts Aaron Beach, Mike Gar-
                 tion, the strength, the possible back
                 up strength and other staff. The
                 process of collecting such infor-  trell, and Richard Han have studied   or she helps intruders to swoop on
                                               the role of applications in violating
                                                                             your machine. There are many good
 While sharing simple pictures and information online with friends and followers we are   mation is called reconnaissance or   user-privacy and exposed how vul-  websites where you could check the
                                               nerable we were.
                 information gathering. Before any
                                                                             veracity of any URL. Copy and paste
 vulnerable to the hackers who are always on the prowl, discretely following every minute   attack,  the  more  information  a   Imagine  a  real-life  scenario   the URL and first take it there to test
 online movement of their victims, writes sanjib sinha  cracker  gathers,  greater  is  the   where a cracker watches the activi-  it and better watch it separately.
                 chance of success.            ties of the target; he has been doing   Good practices include a few more
                   Unfortunately, social media plat-  it clandestinely for some months.   things. Avoid opening up any at-
 elcome to the world  up once upon a time. It is custom-  your social media account a large   forms become, inadvertently, a hot-  It appears that every day, the milk-  tachment; your best friend could
 that is put on public  ary that while you were opening a   amount of private data is exposed.   bed of cyber-crime by exposing big   man rings the doorbell at around   have sent it, but he or she had sent it
 display. No privacy   new account in a bank through the   When  we  post  in  the  social    data about the billions of users.   six-thirty in the morning and the   without knowing the proper source.
 anymore.  Please   internet, it usually asked you a few   media, we usually do not think the   Usually, a user carefully sets the   target opens the door and collects   Never disclose private information
 W come to our kitch-  security questions. In such scenari-  way a cracker thinks or chalks out   privacy settings and feels safe; it is   the packet of milk. After that ap-  such as your nickname, names of
 en, bedroom, and even toilet! Wel-  os, if you forgot your password the   the plans before in one fell swoop   beyond perception what could hap-  pears the newspaperman sharp at   your pets and other such trivial but
 come to the omnipresent world of   automated form asks you a security  he wipes out all your money. It is a   pen when a friend posts a photo on   seven and after half an hour, the   significant information.
 social media where we have smart-  question that you had chosen ear-  part of his strategic planning. With   his or her wall and at the same time  target takes his kid out to the school   It is a pleasure to be present on
 phones in our hands and let us take  lier. It could have been your dog’s   more data you post on social media,   invites mutual friends to view that   and from there he goes to his office.  any social media platform with
 a few ‘clicks’ wherever we are; it   name, or the name of your college   exposing yourself, you place your-  photo. This type of privacy viola-  This information is public. Anyone   thousands of friends but never relax
 would put the picture at once in the   self at the crackers’ mercy.   tion commonly occurs. Download-  can gather it by watching the typical  the grip that allows you to question
 social media and wait, your friend,   In social media, there are a few   ing various interesting applications   lifestyle of a disciplined family man.  its true purpose.
 sitting in the loo, gives a ‘thumbs up’   rules we have already set and we   is quite common in social media. It   Besides gathering the information,
 immediately. The cycle of strange-  While posting in   usually do not break them. One   is not our fault. Sometimes some    the cracker has a clear mapping of   letters@tehelka.com
 contentment is complete now.  social media, we   of such rules says, when a friend-
  Wait. There is something still to   request comes from one of your
 come and the real saga of sorrow is   usually do not   friends’ friends, it is rude to reject
 about to start from here.   think the way a   that appeal. The irony is, you do not
 Where have you taken the pic-  know that person. It seems more
 ture? Suppose, you have just come   cracker thinks or   ironical, because your friend also
 out from your ATM withdrawing   chalks out plans   does not know that person prop-
 money and the Bank’s name is vis-  erly. Actually, your friend could not
 ible in your background. Suppose,   before he wipes   reject the request just like you be-
 I am a hacker with a bad inten -  out all our money   cause it had come from one of the
 tion and I have been following you   friends of his or her friends. The
 through all your  social media ac-  in one fell swoop  trail is endless and the vulnerabil-
 counts for a long time. I have col-  ity starts increasing with the tag of
 lected loads of data about you but I   anonymity it is carrying with it.
 could not get the bank’s name until   you had attended.   What could be the next moves
 now. My cycle of reconnaissance is   Now, I, a hacker with bad inten-  associated with that anonymous
 complete now!  tion (actually this type of hackers   friend? You did not expect any bad
 How?  are called crackers), have just come   intention while you were accepting
 From one of your social media   to know about it. Your challenge    the request. The ability to create pic-
 accounts, I have already collected a   responses  for  an  online  bank    tures in your mind did not warn you
 few data that include — your dog’s   account are now open and it really   that how he would try to penetrate
 name is Lucky; you had attended   serves no useful purpose in your    into your system. You are not sup-
 Stephen’s College, etc. Now, think   social media account. On the con-  posed to know what kind of tools he
 about the bank-form you had filled   trary, during a hacker swoop on   is going to use. You are about to ask



 tehelka / 52 march 2018  52  www.tehelka.com  tehelka / 31 march 2018  53  www.tehelka.com



 52-53 Sanjib Sinha.indd   2-3                                                                        14/03/18   5:26 PM
   48   49   50   51   52   53   54   55   56   57   58