Social Networking Crimes

Privacy and Security in Online Social Media

How many of you have posted mobile numbers and email ID's on Social Networks?

The Problem arises from here. Even though, you have specified your privacy settings, your privacy is violated.

  • The very same mobile number and email ID's are linked with your bank accounts.
  • A simple Google search of your email ID or mobile number would provide your digital foot print.

Think about it?

If you receive a friendship request on your most frequently used Social Network, which of the following people will you add as friends?

  • Person of opposite gender
  • People from your hometown
  • Person with nice profile picture
  • Mutual / common friends

You tend to accept them even if they are Strangers but fit it the above criteria.

The Problem arises from here. Those strangers would keep following you on all your posts and activities including your spouse, siblings, family members, your & their locations, your & their movements etc.

Think about it?

Social Engineering

It is the art of psychologically manipulating victims of social engineering into performing actions or revealing confidential information without realizing it's a fraud. In most cases the attacker never comes face-to-face with the victims.

They rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it.

A social engineer runs what is to be called a con game. Social engineers often rely on the natural helpfulness of people as well as on their weaknesses. Social engineering techniques appeal to the victims' kindness, appeal to vanity, appeal to authority, appeal to greed, and old-fashioned eavesdropping.

Think about it?

Report

Report an Incident

Send us information about your case, we will respond to you promptly

SUBMIT ONLINE