Sharing Information, Beware!

Social networking sites are easy means of netting gullible browsers



How fraudsters penetrate into the computer system? In this context, we are mostly familiar with a concept typically paired with a sense of invasion from a distant and unknown source. Precisely we know it as computer hacking.
But there’s something else which carries dangerous dimensions. The fraudsters instead of working hard to crack a computer system, try to manipulate  the victim into divulging sensitive information, like password, personal credit card information etc. This kind of manipulation known as social engineering introduces an element of proximity, or at least direct contact. In social engineering nearly all fraudsters bank on exploiting trust and curiosity of the browser and steal his credentials which are enough to even bankrupt him. And these human hackers have assumed significance as social engineers.
Social engineering is not at all complex. For example, a person wants to break into your computer system. First he might try to gain your confidence for being an authorized user. Then he will get you to reveal information that compromises your network security. It has been found that these social engineers often rely on the natural helpfulness of people as well as on their weaknesses.
One of the most common aspects of social engineering is people's inability to keep up with a culture that relies heavily on information technology. We come across a section of people who are not aware of the value of the information they possess. So they are careless about protecting it. It’s here the social engineers take advantage of the situation and make them to pass on vital information
With the advent of social networking sites like Facebook, Twitter etc. these social engineers have gone on prowl to net the gullible browsers. Basically the social networking platforms over a period of time have become a space of strangers where they exchange information to each other without knowing each other. Most interesting part is that things, like family photographs which are basically meant for home archive and restricted to own family members are shared on the space to a huge network of strangers. Remember it’s here social engineers mingle with this group of strangers and look out for their victims. So in this cyber space we find photos which really have no place outside the home.
So, the question arises – what has a person achieved while being on Facebook or Twitter? He has just opened a window for others to peep into his personal affairs, as he gladly puts all personal information on the site. You invite people to intrude into your privacy. Even as it may be against your will, you are forced to accept it unpleasantly. So this kind of engagement is nothing but social engineering.
Precisely, I would say that social networking is simply social engineering. It triggers change of values and transforms ethics in the most benign form. Social engineering consumes a browser, invades your thoughts and consequently manipulates your action. The beauty of this socialising is that all this is engineered without making you to realize it.
To conclude, let’s understand that in the world of Internet we are all at risk and at the same time we are also a risk to others. At least we can protect ourselves from others. For this at our own end we need to have a better understanding of what the social engineering threats are and how to be vigilant. It’s a must for the people with little technology knowledge to learn the basics and always seek advice from experts while encountering a social engineering attack.

Lastupdate on : Mon, 10 Dec 2012 21:30:00 Makkah time
Lastupdate on : Mon, 10 Dec 2012 18:30:00 GMT
Lastupdate on : Tue, 11 Dec 2012 00:00:00 IST

  • StumbleUpon
  • Digg
  • TwitThis
  • Mixx
  • Technorati
  • Facebook
  • NewsVine
  • Reddit
  • Google
  • LinkedIn
  • YahooMyWeb
  • Print News

Enter the Security code exactly as you see it in the image security code is CaSe SeNsItIvE(Cookies must be enabled)

  • Kashmir

On IHR Day, Hurriyat (M) stages dharna in New Delhi

Srinagar, Dec 10: On the International Human Rights Day, a delegation of Hurriyat Conference (M) along with three dozens women victims of rights violations on Monday staged a dharna at Parliament Street More

  • Srinagar City


KU plans to reduce B Ed intake capacity, draws concern from academicians


Srinagar, Dec 10: At a time when Bachelors of Education is prerequisite for teacher’s job and many aspirants who cannot afford to pursue the B Ed in regular mode had been banking on the course through More

  • Jammu

No alternative to PDP in JK: Mufti


Jammu, Dec 10: Former Chief Minister and patron Peoples Democratic Party, Mufti Muhammad Sayeed, Monday said that there was no alternative to his party in Jammu and Kashmir.“The way people have been supporting More

  • South Asia

Appoint special representative to monitor HR situation in JK: APHC (M)

Muslim League Organizes Seminar


Islamabad, Dec 10:  The All Parties Hurriyat Conference (M) PaK chapter on Monday made a passionate appeal to the United Nations urging the highest body to appoint special representative to monitor More

  • World

UAE Cabinet approves extradition agreement with India


Dubai, Dec 10: The UAE Cabinet has approved an extradition agreement with India which will allow the transfer of around 1,200 Indian convicts languishing in the Gulf nation to their home country to spend More

  • Bandipora

R&B deptt goes into hibernation

Vital projects stalled in Bandipora from last 5 years

Bandipora: Inordinate delay by the Roads and Buildings department in completion of various developmental projects across the district has raised question marks over its functioning. Many projects More

  • GKeducation&Careers

‘Allow kids to think critically’


Since 2008, Kashmir Education Initiative (KEI), a volunteer-driven philanthropic organization with a focus on education in Kashmir, has been quietly supporting education of talented and deserving Kashmiri More

Designed Developed and Maintaned By Imobisoft Ltd /Algosol Software Solutions