Social network users vulnerable to cyber crime
In every successful endeavors, there will always be two sides to every story. The success of social networking sites is something nobody expected. It has change the way people view computing. As a matter of fact, it has change computing altogether.
The benefits of social networking sites like Facebook, Twitter, MySpace is unquestionable. It allows users to connect with other users – be it their friends or business counterparts. But being popular and being the most visited destination on the web has its downside as well.
A report published by IT security and data protection firm Sophos has revealed an alarming rise in attacks on users of social networks, such as Facebook and Twitter, by cybercriminals.
Sophos’s “Social Security” investigation reveals that criminals have increasingly focused attacks on social networking users in the last 12 months, with an explosion in the reports of spam and malware:
– 57% of users report they have been spammed via social networking sites, a rise of 70.6% from last year
– 36% reveal they have been sent malware via social networking sites, a rise of 69.8% from last year
The report reveals that computer users are spending more time on social networks, sharing sensitive and valuable personal information, and hackers have sniffed out where the money is to be made. The dramatic rise in attacks in the last year tells us that social networks and their millions of users have to do more to protect themselves from organized cybercrime, or risk falling prey to identity theft schemes, scams, and malware attacks.
72% of firms worried workers behavior on social networks is putting their business at risk
Sophos surveyed over 500 organizations, and discovered that 72% are concerned that employee behavior on social networking sites exposes their businesses to danger, and puts corporate infrastructure – and the sensitive data stored upon it – at risk.
The “Social Security” survey is just one part of Sophos’s 2010 Security Threat Report, which explores current and emerging computer security trends. It reveals that criminals identify potential victims on social networks, and then attack them, both at home and at work. In Sophos’s opinion, many Web 2.0 sites are concentrating too much on growing their marketshare at the expense of properly defending their existing users from internet threats.
Facebook – the most feared social network?
Survey respondents were also asked which social network they believed posed the biggest security risk, with 60% naming Facebook:
1. Facebook: 60%
2. MySpace: 18%
3. Twitter: 17%
4. LinkedIn: 4%
Facebook is by far the largest social network – and more bad apples can be found in the biggest orchard. The truth is that the security team at Facebook works hard to counter threats on their site – it’s just that policing 350 million users can’t be an easy job for anyone. But there is no doubt that simple changes could make Facebook users safer. For instance, when Facebook rolled-out its new recommended privacy settings late last year, it was a backwards step, encouraging many users to share their information with everybody on the internet.
Sophos’s Threat Report also reveals that 49% of firms allow all their staff unfettered access to Facebook, a 13% rise on a year ago.
Companies are loosening their attitude to staff activity on social networks, the threat of malware, spam, phishing and identity theft on Facebook is increasing. However, social networks can be an essential part of the business mix today, and the answer is not to bar staff from participating in them but to apply some ‘social security’ instead.”
LinkedIn – providing hackers with your company’s corporate directory
Although LinkedIn is considered to be by far the least threatening of the networks, Sophos advises that it can still provide a sizeable pool of information for hackers.
Targeted attacks against companies are in the news at the moment, and the more information a criminal can get about your organization’s structure, the easier for them to send a poisoned attachment to precisely the person whose computer they want to break into. Sites like LinkedIn provide hackers with what is effectively a corporate directory, listing your staff’s names and positions. This makes it child’s play to reverse-engineer the email addresses of potential victims.