16 Feb How it really happened : NINJIO Season 1, Part 1, Episode 2 – Social Media Social Engineering
As we saw in Season 1, Episode 2, Pat was haphazardly accepting friend requests from people he didn’t necessarily know, simply because he had friends in common. This is a common tactic used by hackers to gain your trust. As you watched, once they have your trust, and you let them into your personal social media world, they can use everything that they know about you, against you. Article 1 below will tell you more about this particular breach. The other articles are about the different types of Social Media threats and how else hackers can use these threats to attack us. Articles 4 & 5 talk about best practices around Facebook Security.
HOW IT REALLY HAPPENED: Blackmail and the Ashley Madison Hack
The Ashley Madison database was published online, and it gives extortionists a way to blackmail victims. One way to do this is through social engagement in Facebook. This article covers how the hack has become personal for Ashley Madison users and their friends and family.
Social engineering takes several forms, and Facebook is a primary way for hackers to gain access to your information. Learn how to recognize several Facebook vulnerabilities and protect yourself from social engineering hackers.
Facebook security settings can be confusing. This article shows you how to go through each of your settings and identify the best ways to secure your privacy both from social engineering hackers and other strangers.
Not all Facebook security settings are built the same. You can granularly go through settings and determine the way you want to be seen to the public. This article covers questions you should ask yourself when you set up your Facebook privacy settings.