SlideShare a Scribd company logo
1 of 30
Social Networking


An Ethical Hackers’ View




                      Peter Wood
                   Chief Executive Officer
               First•Base Technologies LLP
Who is Peter Wood?


      Worked in computers & electronics since 1969
      Founded First•Base in 1989     (one of the first ethical hacking firms)
      CEO First Base Technologies LLP
      Social engineer & penetration tester
      Conference speaker and security ‘expert’

      Chair of Advisory Board at CSA UK & Ireland
      Vice Chair of BCS Information Risk Management and Audit Group
      Director UK/Europe Global Institute for Cyber Security + Research
      Member of ISACA London Security Advisory Group
      Corporate Executive Programme Expert

      FBCS, CITP, CISSP, MIEEE, M.Inst.ISP
      Registered BCS Security Consultant
      Member of ACM, ISACA, ISSA, Mensa

Slide 2                                                             © First Base Technologies 2011
Information leakage




Slide 3                         © First Base Technologies 2011
Social technologies

          •   Blogs and Wikis
          •   Social networking
          •   Instant Messaging
          •   Web conferencing
          •   VoIP
          •   P2P
          •   IPTV




Slide 4                                      © First Base Technologies 2011
Yada yada yada


     • People have always talked about work to their friends
     • What has changed is the nature of how we interact
     • We talk about our lives on our blogs, on social networking sites such
       as Facebook and Twitter, and on message boards pertaining to the
       work we're doing
     • What was once intimate and ephemeral is now available to the whole
       world, indexed by Google, and archived for posterity
     • A good open-source intelligence gatherer can learn a lot about what a
       company is doing by monitoring its employees’ online activities
                                                                     Bruce Schneier




Slide 5                                                   © First Base Technologies 2011
Putting it all together




Slide 6                         © First Base Technologies 2011
Information harvesting


          • Identity theft
             - Both personal & business

          • Corporate hierarchy (social engineering)
          • E-mail addresses (spam, social engineering,
            malware)
          • Phone numbers (sales calls, social
            engineering)
          • Technical infrastructure (hacker
            footprinting)
          • Business plans (industrial espionage)
          • Sensitive information (legal, contractual
            penalties)

Slide 7                                               © First Base Technologies 2011
A hacker’s perspective


          • “It's the easiest way passively to gain intelligence on the
            largest groups of society and nearly every walk of life”
                               Robert Hansen, aka RSnake, founder of SecTheory LLC


          • Social networking sites by nature aren't secure
          • They typically don’t authenticate new members - you
            can’t always be sure that your online friend is who she
            says she is - and attackers can easily exploit and
            capitalize on the “trusted” culture within the social
            network
          • Users often don't deploy the security and privacy options
            that some of these sites offer, either
                                                 Kelly Jackson Higgins, DarkReading


Slide 8                                                       © First Base Technologies 2011
Twitter from a hacker’s perspective


          • Twitter introduces a whole other element to social
            networking security - physical security ... leading to
            burglary, stalking, etc.
          • “I never talk about where I am, who I'm with, where I'm
            going, or any other specific details, but that doesn't stop
            anyone else who knows that same information from
            doing that behind my back - maliciously or not.”
                                     Robert Hansen, aka RSnake, founder of SecTheory LLC




Slide 9                                                          © First Base Technologies 2011
Please burgle my house

      A survey of >2,000 social media users in UK:
      • 38% posted status updates detailing their holiday plans
      • 33% posted that they are away for the weekend
                                                          Legal & General’s Digital Criminal Report

     "We were saying, 'This has been the best vacation we
     ever had'," Claudette McCubbin said about her recent
     vacation to Florida.
     Unfortunately, all the relaxation was lost when they
     arrived back to Knoxville Wednesday. The family room
     and bedrooms in the West Knoxville house were all
     trashed. Thousands of dollars in electronics were missing.
     Claudette posted messages stating when the family was
     leaving and how much fun they were having when they
     arrived in Florida. "I wanted to share with our friends
     everything that we were doing. We know a lot of people.
     We have a really good support group. Who would've
     thought that one of them [a thief] saw that or maybe a
     friend of a friend. That was a huge mistake," Claudette      WBIR.com
     said.                                                        02/04/2010

Slide 10                                                                © First Base Technologies 2011
LinkedIn from a hacker’s perspective


       • Hamiel and Moyer demonstrated at Black Hat
         USA and Defcon 16 that you don’t even have
         to have a social networking profile to be
         targeted
       • They were able to easily impersonate Marcus
         Ranum (with his permission) on LinkedIn
       • Ranum didn’t have an account, so they lifted
         Ranum’s photo off the Internet and gathered
         information on him online and built a
         convincing phony Ranum profile.


Slide 11                                            © First Base Technologies 2011
SPAM and Trojans on social sites



           • Attackers hijacked some Facebook accounts

           • Posed as members and sent messages to
             their friends to dupe them into viewing a
             video clip link

           • In fact it was a Trojan that downloaded
             malware onto their machines once they
             opened the link



                       http://news.cnet.com/8301-1009_3-10246536-83.html

Slide 12                                                                   © First Base Technologies 2011
Widgets and apps


           • Users don’t always realize that third-party apps for
             Facebook, for example, aren’t written by Facebook
           • Some collect more information than necessary or safe
           • Others have been written specifically to install adware or
             generate revenue
           • “Secret Crush” on Facebook spread spyware
           • Victims received an invitation to find out who has a
             secret “crush” on them, lured them into installing the
             Secret Crush app, which spread spyware via an iFrame
           • The attack became worm-like when it required the victim
             to invite at least five friends before learning who their
             “crush” was
                                          Kelly Jackson Higgins, DarkReading

Slide 13                                                    © First Base Technologies 2011
Some key problems



           • Impersonation and targeted personal attacks
           • Identity theft
           • Spam and bot infections
           • Crossover of personal to professional online presence
           • Data Leakage
           • Corporate espionage




Slide 14                                              © First Base Technologies 2011
Tips to minimise exposure


           • Don’t reveal personal or sensitive information in social
             networking sites or blogs
           • Set the privacy options in social networking sites
           • Don’t discuss confidential information online
           • Don’t ‘friend’ people (or accept invitations from people)
             you don’t know
           • Don’t post anything you wouldn’t want everyone to see
           • … and remember: what goes on the Internet, stays on the
             Internet!


Slide 15                                                 © First Base Technologies 2011
The social media attack




Slide 16                        © First Base Technologies 2011
Slide 17   © First Base Technologies 2011
Mr Bloggs is
 away from the
    office on
holiday and will
  return on 5th
      May
“It’s great to be
             away from the
Mr Bloggs     office with no
             interruptions!”
“I’m a new boy at Fine Widgets
   and I report to Mr Bloggs”

  “Please connect with me!”
“Be my
“Be my
                        friend!”        “Be my
friend!”
                                        friend!”

            Help Desk
             person
“Be my                                 “Be my
friend!”                               friend!”




                              Help Desk
                               person
 “Be my                                “Be my
 friend!”                              friend!”



                        “Be my
                        friend!”
“Hello Harry, this is Andy
the new boy – we met on
LinkedIn. I need an email
 account and a Windows
    account please!”
“Hello Andy. I’m
  sorry but I need
 authorisation from
your manager before
  I can set up any
 accounts for you”
“My manager, Mr Bloggs, is
 on holiday, but he sent an
email authorising this – I’ll
     send you a copy!”
(Forwards fake email from
  personal mail account)
“Well, since you have
 an email from your
  manager, and as I
   know you from
LinkedIn … I’ll set up
your accounts for you
        now.”
“Now I have a
    valid email
account, everyone
will believe I work
       here!”
“With a valid
Windows account,
I can get access to
 all that sensitive
       data!”
Need more information?



       Peter Wood
    Chief Executive Officer
First•Base Technologies LLP

  peterw@firstbase.co.uk

     http://firstbase.co.uk
    http://white-hats.co.uk
    http://peterwood.com

    Blog: fpws.blogspot.com
      Twitter: peterwoodx

More Related Content

What's hot

Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Cybersafety Talk
Cybersafety TalkCybersafety Talk
Cybersafety Talksuresh sood
 
IT Security for Healthcare Professionals
IT Security for Healthcare ProfessionalsIT Security for Healthcare Professionals
IT Security for Healthcare ProfessionalsNicholas Davis
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?Andy Smith
 
It Security For Healthcare
It Security For HealthcareIt Security For Healthcare
It Security For HealthcareNicholas Davis
 
Social networking privacy issues & exposure
Social networking privacy issues & exposureSocial networking privacy issues & exposure
Social networking privacy issues & exposureLDdsng
 
Ten Great Ideas for Your Catechetical Classroom or Ministry
Ten Great Ideas for Your Catechetical Classroom or MinistryTen Great Ideas for Your Catechetical Classroom or Ministry
Ten Great Ideas for Your Catechetical Classroom or MinistryDigital Disciple Network
 
Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011Tea Teić
 
CaTECHchesis with TECH Tools
CaTECHchesis with TECH ToolsCaTECHchesis with TECH Tools
CaTECHchesis with TECH ToolsCaroline Cerveny
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and EtiquetteTeodoro Llanes II
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final21_zaheer
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012curlistl
 
Migo my labs
Migo my labsMigo my labs
Migo my labsrairuta
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 

What's hot (17)

Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Cybersafety Talk
Cybersafety TalkCybersafety Talk
Cybersafety Talk
 
IT Security for Healthcare Professionals
IT Security for Healthcare ProfessionalsIT Security for Healthcare Professionals
IT Security for Healthcare Professionals
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?
 
It Security For Healthcare
It Security For HealthcareIt Security For Healthcare
It Security For Healthcare
 
Social networking privacy issues & exposure
Social networking privacy issues & exposureSocial networking privacy issues & exposure
Social networking privacy issues & exposure
 
Ten Great Ideas for Your Catechetical Classroom or Ministry
Ten Great Ideas for Your Catechetical Classroom or MinistryTen Great Ideas for Your Catechetical Classroom or Ministry
Ten Great Ideas for Your Catechetical Classroom or Ministry
 
Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011
 
CaTECHchesis with TECH Tools
CaTECHchesis with TECH ToolsCaTECHchesis with TECH Tools
CaTECHchesis with TECH Tools
 
Top Web 2 0 Tools
Top Web 2 0 ToolsTop Web 2 0 Tools
Top Web 2 0 Tools
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and Etiquette
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
 
Migo my labs
Migo my labsMigo my labs
Migo my labs
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Social Engineering and Identity Theft
Social Engineering and Identity TheftSocial Engineering and Identity Theft
Social Engineering and Identity Theft
 

Similar to Social Networking - An Ethical Hacker's View

Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internetCarlos Diclear Hijo
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Securitymmavis
 
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Ben Woelk, CISSP, CPTC
 
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Ben Woelk, CISSP, CPTC
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
The Original Complete Unit
The Original Complete UnitThe Original Complete Unit
The Original Complete Unitguest09fcd1
 
Emerging Threats and Attack Surfaces
Emerging Threats and Attack SurfacesEmerging Threats and Attack Surfaces
Emerging Threats and Attack SurfacesPeter Wood
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimesmarkgernale24
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16TechSoup
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfJeth Cuenco
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 

Similar to Social Networking - An Ethical Hacker's View (20)

Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Security
 
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
 
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
 
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
The Original Complete Unit
The Original Complete UnitThe Original Complete Unit
The Original Complete Unit
 
Emerging Threats and Attack Surfaces
Emerging Threats and Attack SurfacesEmerging Threats and Attack Surfaces
Emerging Threats and Attack Surfaces
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Argumentative Essay On Internet Privacy
Argumentative Essay On Internet PrivacyArgumentative Essay On Internet Privacy
Argumentative Essay On Internet Privacy
 

More from Peter Wood

Hacking is easy: understanding your vulnerabilities
Hacking is easy: understanding your vulnerabilitiesHacking is easy: understanding your vulnerabilities
Hacking is easy: understanding your vulnerabilitiesPeter Wood
 
The future of cloud security
The future of cloud securityThe future of cloud security
The future of cloud securityPeter Wood
 
The 2018 Threatscape
The 2018 ThreatscapeThe 2018 Threatscape
The 2018 ThreatscapePeter Wood
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber ResiliencePeter Wood
 
Network security, seriously?
Network security, seriously?Network security, seriously?
Network security, seriously?Peter Wood
 
Lessons from a Red Team Exercise
Lessons from a Red Team ExerciseLessons from a Red Team Exercise
Lessons from a Red Team ExercisePeter Wood
 
Red teaming in the cloud
Red teaming in the cloudRed teaming in the cloud
Red teaming in the cloudPeter Wood
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to usPeter Wood
 
Network Security - Real and Present Dangers
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present DangersPeter Wood
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
Advanced Threat Protection: Lessons from a Red Team Exercise
Advanced Threat Protection: Lessons from a Red Team ExerciseAdvanced Threat Protection: Lessons from a Red Team Exercise
Advanced Threat Protection: Lessons from a Red Team ExercisePeter Wood
 
Pragmatic Network Security - Avoiding Real-World Vulnerabilities
Pragmatic Network Security - Avoiding Real-World VulnerabilitiesPragmatic Network Security - Avoiding Real-World Vulnerabilities
Pragmatic Network Security - Avoiding Real-World VulnerabilitiesPeter Wood
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineeringPeter Wood
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big dataPeter Wood
 
Cloud, social networking and BYOD collide!
Cloud, social networking and BYOD collide!Cloud, social networking and BYOD collide!
Cloud, social networking and BYOD collide!Peter Wood
 
Unpatched Systems: An Ethical Hacker's View
Unpatched Systems: An Ethical Hacker's ViewUnpatched Systems: An Ethical Hacker's View
Unpatched Systems: An Ethical Hacker's ViewPeter Wood
 
Prime Targets in Network Infrastructure
Prime Targets in Network InfrastructurePrime Targets in Network Infrastructure
Prime Targets in Network InfrastructurePeter Wood
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsPeter Wood
 
Out of the Blue: Responding to New Zero-Day Threats
Out of the Blue: Responding to New Zero-Day ThreatsOut of the Blue: Responding to New Zero-Day Threats
Out of the Blue: Responding to New Zero-Day ThreatsPeter Wood
 
Top Five Internal Security Vulnerabilities
Top Five Internal Security VulnerabilitiesTop Five Internal Security Vulnerabilities
Top Five Internal Security VulnerabilitiesPeter Wood
 

More from Peter Wood (20)

Hacking is easy: understanding your vulnerabilities
Hacking is easy: understanding your vulnerabilitiesHacking is easy: understanding your vulnerabilities
Hacking is easy: understanding your vulnerabilities
 
The future of cloud security
The future of cloud securityThe future of cloud security
The future of cloud security
 
The 2018 Threatscape
The 2018 ThreatscapeThe 2018 Threatscape
The 2018 Threatscape
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
Network security, seriously?
Network security, seriously?Network security, seriously?
Network security, seriously?
 
Lessons from a Red Team Exercise
Lessons from a Red Team ExerciseLessons from a Red Team Exercise
Lessons from a Red Team Exercise
 
Red teaming in the cloud
Red teaming in the cloudRed teaming in the cloud
Red teaming in the cloud
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to us
 
Network Security - Real and Present Dangers
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present Dangers
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Advanced Threat Protection: Lessons from a Red Team Exercise
Advanced Threat Protection: Lessons from a Red Team ExerciseAdvanced Threat Protection: Lessons from a Red Team Exercise
Advanced Threat Protection: Lessons from a Red Team Exercise
 
Pragmatic Network Security - Avoiding Real-World Vulnerabilities
Pragmatic Network Security - Avoiding Real-World VulnerabilitiesPragmatic Network Security - Avoiding Real-World Vulnerabilities
Pragmatic Network Security - Avoiding Real-World Vulnerabilities
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
Cloud, social networking and BYOD collide!
Cloud, social networking and BYOD collide!Cloud, social networking and BYOD collide!
Cloud, social networking and BYOD collide!
 
Unpatched Systems: An Ethical Hacker's View
Unpatched Systems: An Ethical Hacker's ViewUnpatched Systems: An Ethical Hacker's View
Unpatched Systems: An Ethical Hacker's View
 
Prime Targets in Network Infrastructure
Prime Targets in Network InfrastructurePrime Targets in Network Infrastructure
Prime Targets in Network Infrastructure
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
Out of the Blue: Responding to New Zero-Day Threats
Out of the Blue: Responding to New Zero-Day ThreatsOut of the Blue: Responding to New Zero-Day Threats
Out of the Blue: Responding to New Zero-Day Threats
 
Top Five Internal Security Vulnerabilities
Top Five Internal Security VulnerabilitiesTop Five Internal Security Vulnerabilities
Top Five Internal Security Vulnerabilities
 

Recently uploaded

02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptxFinTech Belgium
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingAggregage
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...ssifa0344
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfGale Pooley
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure servicePooja Nehwal
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex
 
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxOAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxhiddenlevers
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfAdnet Communications
 
Quarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingQuarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingMaristelaRamos12
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...shivangimorya083
 
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...makika9823
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Commonwealth
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdfFinTech Belgium
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyTyöeläkeyhtiö Elo
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdfAdnet Communications
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdf
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024
 
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxOAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdf
 
Quarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingQuarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of Marketing
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
 
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
 

Social Networking - An Ethical Hacker's View

  • 1. Social Networking An Ethical Hackers’ View Peter Wood Chief Executive Officer First•Base Technologies LLP
  • 2. Who is Peter Wood? Worked in computers & electronics since 1969 Founded First•Base in 1989 (one of the first ethical hacking firms) CEO First Base Technologies LLP Social engineer & penetration tester Conference speaker and security ‘expert’ Chair of Advisory Board at CSA UK & Ireland Vice Chair of BCS Information Risk Management and Audit Group Director UK/Europe Global Institute for Cyber Security + Research Member of ISACA London Security Advisory Group Corporate Executive Programme Expert FBCS, CITP, CISSP, MIEEE, M.Inst.ISP Registered BCS Security Consultant Member of ACM, ISACA, ISSA, Mensa Slide 2 © First Base Technologies 2011
  • 3. Information leakage Slide 3 © First Base Technologies 2011
  • 4. Social technologies • Blogs and Wikis • Social networking • Instant Messaging • Web conferencing • VoIP • P2P • IPTV Slide 4 © First Base Technologies 2011
  • 5. Yada yada yada • People have always talked about work to their friends • What has changed is the nature of how we interact • We talk about our lives on our blogs, on social networking sites such as Facebook and Twitter, and on message boards pertaining to the work we're doing • What was once intimate and ephemeral is now available to the whole world, indexed by Google, and archived for posterity • A good open-source intelligence gatherer can learn a lot about what a company is doing by monitoring its employees’ online activities Bruce Schneier Slide 5 © First Base Technologies 2011
  • 6. Putting it all together Slide 6 © First Base Technologies 2011
  • 7. Information harvesting • Identity theft - Both personal & business • Corporate hierarchy (social engineering) • E-mail addresses (spam, social engineering, malware) • Phone numbers (sales calls, social engineering) • Technical infrastructure (hacker footprinting) • Business plans (industrial espionage) • Sensitive information (legal, contractual penalties) Slide 7 © First Base Technologies 2011
  • 8. A hacker’s perspective • “It's the easiest way passively to gain intelligence on the largest groups of society and nearly every walk of life” Robert Hansen, aka RSnake, founder of SecTheory LLC • Social networking sites by nature aren't secure • They typically don’t authenticate new members - you can’t always be sure that your online friend is who she says she is - and attackers can easily exploit and capitalize on the “trusted” culture within the social network • Users often don't deploy the security and privacy options that some of these sites offer, either Kelly Jackson Higgins, DarkReading Slide 8 © First Base Technologies 2011
  • 9. Twitter from a hacker’s perspective • Twitter introduces a whole other element to social networking security - physical security ... leading to burglary, stalking, etc. • “I never talk about where I am, who I'm with, where I'm going, or any other specific details, but that doesn't stop anyone else who knows that same information from doing that behind my back - maliciously or not.” Robert Hansen, aka RSnake, founder of SecTheory LLC Slide 9 © First Base Technologies 2011
  • 10. Please burgle my house A survey of >2,000 social media users in UK: • 38% posted status updates detailing their holiday plans • 33% posted that they are away for the weekend Legal & General’s Digital Criminal Report "We were saying, 'This has been the best vacation we ever had'," Claudette McCubbin said about her recent vacation to Florida. Unfortunately, all the relaxation was lost when they arrived back to Knoxville Wednesday. The family room and bedrooms in the West Knoxville house were all trashed. Thousands of dollars in electronics were missing. Claudette posted messages stating when the family was leaving and how much fun they were having when they arrived in Florida. "I wanted to share with our friends everything that we were doing. We know a lot of people. We have a really good support group. Who would've thought that one of them [a thief] saw that or maybe a friend of a friend. That was a huge mistake," Claudette WBIR.com said. 02/04/2010 Slide 10 © First Base Technologies 2011
  • 11. LinkedIn from a hacker’s perspective • Hamiel and Moyer demonstrated at Black Hat USA and Defcon 16 that you don’t even have to have a social networking profile to be targeted • They were able to easily impersonate Marcus Ranum (with his permission) on LinkedIn • Ranum didn’t have an account, so they lifted Ranum’s photo off the Internet and gathered information on him online and built a convincing phony Ranum profile. Slide 11 © First Base Technologies 2011
  • 12. SPAM and Trojans on social sites • Attackers hijacked some Facebook accounts • Posed as members and sent messages to their friends to dupe them into viewing a video clip link • In fact it was a Trojan that downloaded malware onto their machines once they opened the link http://news.cnet.com/8301-1009_3-10246536-83.html Slide 12 © First Base Technologies 2011
  • 13. Widgets and apps • Users don’t always realize that third-party apps for Facebook, for example, aren’t written by Facebook • Some collect more information than necessary or safe • Others have been written specifically to install adware or generate revenue • “Secret Crush” on Facebook spread spyware • Victims received an invitation to find out who has a secret “crush” on them, lured them into installing the Secret Crush app, which spread spyware via an iFrame • The attack became worm-like when it required the victim to invite at least five friends before learning who their “crush” was Kelly Jackson Higgins, DarkReading Slide 13 © First Base Technologies 2011
  • 14. Some key problems • Impersonation and targeted personal attacks • Identity theft • Spam and bot infections • Crossover of personal to professional online presence • Data Leakage • Corporate espionage Slide 14 © First Base Technologies 2011
  • 15. Tips to minimise exposure • Don’t reveal personal or sensitive information in social networking sites or blogs • Set the privacy options in social networking sites • Don’t discuss confidential information online • Don’t ‘friend’ people (or accept invitations from people) you don’t know • Don’t post anything you wouldn’t want everyone to see • … and remember: what goes on the Internet, stays on the Internet! Slide 15 © First Base Technologies 2011
  • 16. The social media attack Slide 16 © First Base Technologies 2011
  • 17. Slide 17 © First Base Technologies 2011
  • 18. Mr Bloggs is away from the office on holiday and will return on 5th May
  • 19. “It’s great to be away from the Mr Bloggs office with no interruptions!”
  • 20. “I’m a new boy at Fine Widgets and I report to Mr Bloggs” “Please connect with me!”
  • 21. “Be my “Be my friend!” “Be my friend!” friend!” Help Desk person “Be my “Be my friend!” friend!” Help Desk person “Be my “Be my friend!” friend!” “Be my friend!”
  • 22. “Hello Harry, this is Andy the new boy – we met on LinkedIn. I need an email account and a Windows account please!”
  • 23. “Hello Andy. I’m sorry but I need authorisation from your manager before I can set up any accounts for you”
  • 24. “My manager, Mr Bloggs, is on holiday, but he sent an email authorising this – I’ll send you a copy!” (Forwards fake email from personal mail account)
  • 25. “Well, since you have an email from your manager, and as I know you from LinkedIn … I’ll set up your accounts for you now.”
  • 26. “Now I have a valid email account, everyone will believe I work here!”
  • 27. “With a valid Windows account, I can get access to all that sensitive data!”
  • 28.
  • 29.
  • 30. Need more information? Peter Wood Chief Executive Officer First•Base Technologies LLP peterw@firstbase.co.uk http://firstbase.co.uk http://white-hats.co.uk http://peterwood.com Blog: fpws.blogspot.com Twitter: peterwoodx

Editor's Notes

  1. Do you know why huskies run together, in harness, in front of a sledge? It’s not because they’re chasing the leader and it’s nothing to do with food, either, or the whip. They run together because they like running together… The scientist who made this discovery said that just as huskies enjoy running together, humans gossip because they like gossiping together. It’s in the make-up of the creature: huskies are sociable running animals; humans are sociable gossiping animals. Neither we nor the huskies can change those core characteristics of our natures. I thought knowing that might help tee-up what we’re talking about today.
  2. Web 2.0 appeals to that facet of human nature: we’re gossiping animals. We’re sociable, we seek companionship however and wherever we can get it. And now we can get it everywhere ... It’s good to talk, and it feels great to share – and not just words, but voices, pictures, videos, music, websites: first with workmates and friends, then with strangers who seem sympathetic. First locally, then nationally, and then, if you like, over the entire planet. There are blogs, where everyone has their own soap box or on-line diary, depending on their personality. And there are wikis, where the knowledgeable (and the not so knowledgeable) share their expertise with the world. Of course, social networking sites have proved to be incredibly popular, with Facebook claiming 750 million members at the last count. Then there’s instant messaging – a sort of on-line text messaging system, and web conferencing - providing virtual meetings and seminars. VoIP (or voice over IP) provides free or low-cost telephone calls via the Internet, and peer-to-peer networks which allow people to share files wherever they are. Together these technologies allow us to share not just text but all kinds of media – photos, videos, music, cross-linking of sites
  3. This slide is a take on our predicament by Bruce Schneier, one of the top industry gurus. What he’s saying is essentially this: thanks to Web 2.0, what we can do online is more or less what we do when, say, we meet friends in a café or pub. Which is gossip about work, or friends. I show you my holiday snaps, or lend you that DVD or CD you wanted to borrow... What happens in the café or pub if a stranger gets too close? We lower our voices. We move away to a table in the corner... But in the virtual world, you don’t know the stranger is at your shoulder, and there’s nowhere secluded to move to. And there’s two other big differences. Everything we say in the café or pub vanishes into the air, and while it remains for a while in our two memories, it’s locked there for a bit and usually fades away. But everything we say and do on-line is imprinted, indelibly and publicly, forever. And it’s searchable, of course, by our old friend Google.
  4. The second difference is that the technology lets us link our all our favourite places together So, to keep the analogy going, we can connect the café to the pub and the restaurant and the bowling alley and the library and the social club and the works canteen... So that when we say something in one of them, either it turns up in all the others, or intruders can make their way from one to the next picking up items of critical intelligence as they go. Which means that a crook who knows what he or she is doing can gather pieces of the jigsaw from the disparate places where we left them and begin to assemble a whole picture. And it’s probably a picture, if you looked at it in its entirety, which you wouldn’t want to share with strangers.
  5. So where are the main dangers? Personal? Professional? Both, I’m afraid. Just look at the kinds of intelligence a skilled hacker can harvest from these sites: intelligence that can be used for impersonation, or to attack an IT system with a virus, or to entrap individuals’ computers without their knowledge and use them to distribute spam or pornography; or to enslave a whole lot of computers and use them to jam a company’s website and hold it to ransom. Then there’s varieties of sensitive and secret corporate information which can be stolen and sold; and crooks can raid your sites to steal your identity and use it for all kinds of nefarious purposes; or seize your passwords and credit card details and empty your bank account... The Web 2.0 industrial spy doesn’t need a set of disguises and skeleton keys. All he or she needs is just a laptop, web-literacy, patience and brainpower.
  6. Robert Hanson [ CEO of SecTheory, a security consulting firm, and who has been working with web application security since the mid 90’s ] points out here how very simple it is to harvest information and Kelly Jackson Higgins [ senior editor at Dark Reading, and who has been called ‘the best connected reporter in security’ ] shows why it’s so easy: in essence, the social sites are open spaces and the users don’t bother to fence them in – or to mix the metaphor, the users are holding great big dinner parties with open front doors and letting anyone who wants to come in and join them at the table. Have you done anything to secure your social sites? Most people try but don’t know whether they’ve ever done quite enough, and to be honest, the sites themselves hardly make it a front page issue with an easy-steps guide, do they? There are an awful lot of settings to contend with, but also (some would say) it’s in the interest of social networking sites to have people expose their personal information. After all, selling personal information and targeted advertising is how they make their money! Can we boil down all these vulnerabilities to a single factor? Yes - it’s about our psychology: our innocent, trusting nature.
  7. Do you use Twitter? What kind of things do you tweet to your vast army of followers? Do you tell your select group of fans what you’re doing, thinking... Tell them where you are, ever? Here’s a true story from a client: A young lady started to receive emails at work from an anonymous Hotmail account.  At first they were annoying but the emails continued over a period of time (perhaps some weeks).  It came to a head and caused some distress when the girl received an email which said something along the lines of "you looked gorgeous in your gym-kit last night". We were then contacted by her line manager and asked to investigate.  We were unable to trace the source or the sender of the emails.  A Google search on the girl's email address took us straight to her Facebook profile which he accessed and discovered that her contact email was her employer’s email address, her presence at the gym and a variety of social events were advertised and her photo albums contained photos of her at some of those social events …The girl was informed and the emails stopped abruptly (as far as we know).
  8. Here’s a real world example of how posting your location on social networking sites can result in burglary. Legal and General’s survey of more than 2,000 social media users in the UK showed that people just don’t think about the risks of what they post!
  9. Let’s move on from tweeting to twocking. If you don’t know, it’s police slang. T.W.O.C stands for “taking without the owner’s consent.” Only in this instance we’re not talking about twocking a car, but an ID. Now, in the example on the slide, which is two guys working a couple of conferences, the ID was twocked with the owner’s consent, but the theory concerns “without” Let’s suppose we’re con artists. We find a desirable person, and we pinch his photo from here, and his biog and CV from somewhere else, and his blog from another site again, then we go to an online business forum where he doesn’t have a presence, and we bring it all together and put him there large as virtual life – only the traffic from that forum comes back to us. If the person behind whose ID we’re now masquerading is, as I say, one with desirable intellectual or commercial goodies, then a lot of folks will want to link up with him, and their lives, their secrets and their goodies might be ours for the taking.
  10. You should always make sure that anyone you connect to really is who you think they are. Impersonation is an online epidemic. Sometimes the motives are criminal and sometimes they’re just plain malevolent, and sometimes they’re a mixture of both. Once tricksters or fraudsters have stolen a Facebook ID, and it happens all the time, then they’re got a route through to all the victim’s friends, and maybe they send them a video clip with “hey, you have to look at this”, and once the friends open up and look, in comes the Trojan and down comes the malware onto their machines. Be circumspect, be cautious. Ask yourself, “would he, would she, really send me this? Is this typical behaviour?” Fall back on an old technology. Make a phone call. Ask and check. I’ll give you another human vulnerability that’s there for the exploitation. “I can’t be bothered.” So you don’t check “I’ll take it on trust.” So you hit the key and it’s “bye bye security, farewell identity.”
  11. Facebook and sites like it are pretty generous hosts – actually, a harsher description would be undiscriminating hosts – not just for you, but for outsiders offering games, quizzes, services, all kinds of apps Some of them aren’t the harmless fun they pretend to be. So your basic rule is always, if in doubt, check. And if you can’t check, say no – say no, in particular, to anything that’s appealing to your baser instincts – sex, greed, something-for-nothing, because that’s precisely where the scammers hope your reaction will be “oh, what the heck? I’ll take it on trust.” Like the “secret crush” scam. Who wouldn’t be tempted to find out who had a “secret crush” on them? But then you should think, “wait a minute, why do I have to get at least five friends to join in before I find out who is this lunatic who fancies me?” Why else, if not to lure five friends and then five more and five more again into the same trap and spread the virus.
  12. A security expert called Graham Cluley created a fake profile of a small plastic frog called Freddi Staur (which is an anagram of ID Fraudster) and invited strangers to become Freddi's friend. And sure enough scores of people accepted the invitation, and many of them revealed their full names, addresses, dates of birth, phone numbers and even - in one case of a real klutz - their mother's maiden name. Freddi Staur ate my ID. Identity theft is a real and present danger on social sites and it takes on average 6 months for victims to restore their credit rating! Then you get spam and bot infections where attackers hijack Facebook accounts and send messages to the victims’ friends to dupe them into viewing a video clip link, which, once they open it, turns out to be a Trojan that silently downloads malware onto their machine. The crossover of personal to professional online presence is something you have to watch out for like a hawk: Even if you keep a Facebook account for personal use, and a LinkedIn one for professional networking, there’s no guarantee that those late-night partying pictures aren’t going to end up in front of your colleagues on LinkedIn, or worse, your boss. So don’t post anything on the one that you wouldn’t want to turn up unannounced in the other. And real Fredi Staurs with their eyes on crime could eat up the organisation’s secrets as well – both from information you accidentally broadcast to the world on a social networking site and by using your details to conduct a social engineering attack - take a look at this next slide …