SlideShare a Scribd company logo
HOW SAFE IS YOUR
CHECKING YOUR "SOCIAL SECURITY”
SOCIAL
NETWORK?
SOCIAL MEDIA STATS
FACEBOOK
49%FEMALE USERS
51%MALE USERS
310,000,000UNIQUE VISITORS
28%FEMALE USERS
72%MALE USERS
GOOGLE +
20,000,000UNIQUE VISITORS
27,500,000 48%FEMALE USERS
52%MALE USERSUNIQUE VISITORS
STUMBLE UPON
55%FEMALE USERS
45%MALE USERS
180,000,000UNIQUE VISITORS
TWITTER
25%FEMALE USERS
75%MALE USERS
13,752,948UNIQUE VISITORS
REDDIT
AVERAGE MINUTES PER VISITOR PER MONTH
FACEBOOK
6.75HOURS
1.5HOURS
PINTERESTTWITTER
21MINUTES
LINKEDIN
17MINUTES
GOOGLE +
3MINUTES
STUMBLE UPON
1.5HOURS
SOCIAL MEDIA PRIVACY SCORES
based off of 260 metrics from data-collection to privacy policies.
1
.9
.8
.7
.6
.5
.4
.3
.2
.1
LINKEDIN
CLASSMATES.COM
FACEBOOK
TWITTER
MYSPACE
HI5
FRIENDSTER
PRIVACYSCORE
(weak)
(average)
(strong)
SOCIAL NETWORKING WORMS
Enlist more machines into its botnet, and hijack more accounts to
send more spam to enlist more machines. All the while making
money with the usual botnet business, including scareware and
Russian dating services.
Multiple worm attacks. Mikeyy
worm started to spread via
Twitter posts by encouraging
you to click on a link.
1/6/2013TWITTER
TOP 10 THREATS
PHISHING BAIT
The e-mail that lured you to sign into Facebook, hoping you don't
pick up on the fbaction.net URL in the browser.
Phishing attacks designed to
gain passwords for profit.FACEBOOK 5/18/2013
TROJANS
URL Zone is a similar banking Trojan, but even smarter, it can
calculate the value of the victim's accounts to help decide the
priority for the thief.
SHORTENED LINKS
URL shortening services (e.g., Bit.ly and Tinyurl) to fit long URLs
into tight spaces. They also do a nice job of obfuscating the link so
it isn't immediately apparent to victims that they're clicking on a
malware install.
DATA LEAKS
Users share a bit too much about the organization -- projects,
products, financials, organizational changes, scandals, or other
sensitive information.
Passwords have been stolen.
6 million were compromised.LINKEDIN 6/6/2012
ADVANCED PERSISTENT THREATS
(APT) is the gathering of intelligence about persons of interest
(e.g., executives, officers, high-net-worth individuals), for which
social networks can be a treasure trove of data.
BOTNETS
Twitter accounts being used as a command and control channel for
a few botnets. The standard command and control channel is IRC,
but some have used other applications -- P2P file sharing in the
case of Storm -- and now, cleverly, Twitter.
!
CROSS-SITE REQUEST FORGERY (CSRF)
CSRF attacks exploit the trust a social networking application has
in a logged-in user's browser. So as long as the social network
application isn't checking the referrer header, it's easy for an attack
to "share" an image in a user's event stream that other users might
click on to catch/spread the attack.
IMPERSONATION
Several impersonators have gathered hundreds and thousands of
followers on Twitter -- and then embarrassed the folks they
impersonate.
TRUST
Like e-mail, when it hit the mainstream, or instant messaging when
it became ubiquitous, people trust links, pictures, videos and
executables when they come from "friends".
87%of small to medium-sized
businesses do not have formal,
written internet security policies.
70%of these businesses lack
policies for employees’ use of
social media, despite the fact that
they are increasingly favored by
cybercriminals for phishing attacks.
Once an attacker gains access to their account, they
can easily find a way to mine more information and to
use this to access their other accounts. The same is
true for corporate accounts, which are publicly
available on sites, like LinkedIn.
!
90% of sites don’t require a full name or date of
birth for permission to join.
80%of users failed to use standard encryption
protocols to protect sensitive user data from hackers.
71%of websites reserve the right to share user
data with third parties in their privacy policies.
CLICK TO SEE THE FULL INFOGRAPHIC HERE:
RESOURCES
http://preibusch.de/publications/Bonneau_Preibusch__Privacy_Jungle__2009-05-26.pdf
http://www.hula-hub.com/2012/03/21/top-social-media-statistics-infographic-2012/
http://www.marketingprofs.com/charts/2010/3596/social-networks-influential-not-always-trusted
http://www.digitaladvocate.net/?p=504
http://mashable.com/2012/11/28/social-media-time/
http://www.networkworld.com/news/2010/010710-social-networking-hacks.html?page=2
http://detroit.cbslocal.com/2012/06/06/report-linkedin-networking-site-hacked/
http://blog.ussignalcom.com/blog-1/bid/278223/Cyber-Attacks-2013-Hackers-Exploit-Social-Media
http://about-threats.trendmicro.com/us/webattack/75/spam%20scams%20and%20other%20social%20media%20threats
http://www.computerweekly.com/news/1280090217/Privacy-rankings-LinkedIn-and-Bebo-high-Facebook-and-MySpace-average-Badoo-low

More Related Content

PPTX
Social network privacy & security
PPTX
Security threats in social networks
PDF
SOCIAL NETWORK SECURITY
PPTX
Social Networking Security Issues
PPT
Security Dangers of Social Networking
PDF
Online Social Networks: 5 threats and 5 ways to use them safely
PPT
Social media and Security risks
PPTX
How to Like Social Media Network Security
Social network privacy & security
Security threats in social networks
SOCIAL NETWORK SECURITY
Social Networking Security Issues
Security Dangers of Social Networking
Online Social Networks: 5 threats and 5 ways to use them safely
Social media and Security risks
How to Like Social Media Network Security

What's hot (20)

PPTX
Privacy issues in social networking
PPTX
Social media and Security: How to Ensure Safe Social Networking
PDF
Social media and security essentials.pptx
PPTX
Social Media Basics: Security Loopholes with Twitter & Other Social Media
PPTX
Social Network Privacy, Security and Identity:One
PDF
Social Media Safety Tips
PPT
Social media risk
PPTX
Social media privacy and safety
PDF
Dangers to social media
PPTX
Social Media Security
PDF
Social media-threats
PPTX
Social media privacy issues
PPT
When web 2.0 sneezes, everyone gets sick
PPT
Social media & cyber crime
PDF
Privacy and Security in Online Social Media : Privacy and Social Media
PPT
Privacy and Social Networks
PPTX
Security and social media
PPTX
Social Media Security
PPT
Social Media May 2009
PPTX
Cyberspace slide show
Privacy issues in social networking
Social media and Security: How to Ensure Safe Social Networking
Social media and security essentials.pptx
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Network Privacy, Security and Identity:One
Social Media Safety Tips
Social media risk
Social media privacy and safety
Dangers to social media
Social Media Security
Social media-threats
Social media privacy issues
When web 2.0 sneezes, everyone gets sick
Social media & cyber crime
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Social Networks
Security and social media
Social Media Security
Social Media May 2009
Cyberspace slide show
Ad

Viewers also liked (20)

PDF
Journal of Physical Security 7(2)
PPTX
Sonderwerbeformen | Goldbach Audience Austria
PPT
My power point
PPTX
Órganos sensoriales -Línea de tiempo
PPTX
SDL BeGlobal im Unternehmensumfeld
PPTX
Reklama na facebooku
PPT
Crisis y modelo de desarrollo. Faustino García M.
PDF
Sondagem especial indústria da construção copa do mundo 2014 outubro 2011
PDF
Programme Spectacles du 22 Novembre
PDF
Edicion octubre 2015
PDF
Fire performance of recycled rubber-filled high-strength concrete
PPT
Progenika
PDF
Sigue a Advantia en Facebook
PDF
Adrián aragonés cv (esp)
PDF
La medida del mundo renacentista.
PPTX
Trabajo gustavo dario esteban
PPT
imágenes chistosas
PPTX
Reflect In-Store Digital Media Solutions
DOCX
Journal of Physical Security 7(2)
Sonderwerbeformen | Goldbach Audience Austria
My power point
Órganos sensoriales -Línea de tiempo
SDL BeGlobal im Unternehmensumfeld
Reklama na facebooku
Crisis y modelo de desarrollo. Faustino García M.
Sondagem especial indústria da construção copa do mundo 2014 outubro 2011
Programme Spectacles du 22 Novembre
Edicion octubre 2015
Fire performance of recycled rubber-filled high-strength concrete
Progenika
Sigue a Advantia en Facebook
Adrián aragonés cv (esp)
La medida del mundo renacentista.
Trabajo gustavo dario esteban
imágenes chistosas
Reflect In-Store Digital Media Solutions
Ad

Similar to How Safe Is YOUR Social Network? (20)

PPTX
Users and behaviors social internet: Safety & Security
PPTX
Users and Behaviors- Social Internet
PPTX
Brandon + Eddie users guide phi 235
PDF
The Social Takeover
PPTX
osn-threats-solutions-2
PDF
Insecure trends in web technologies 2009
PPTX
Project
PDF
Social Media: Infiltrating The Enterprise
PPTX
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
PDF
fissea-conference-2012_srinivasan.pdf
PPTX
Internet Safety
PDF
socialnetworkprivacysecurity-130718062319-phpapp02.pdf
PPTX
Social media-threats
PPTX
Social network and digital security
PPTX
PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL N...
PDF
Presentación - Protecting your Employess, Customers, and Investments in the A...
PPTX
Risk Assessment of Social Media Use v3.01
PDF
Social network privacy
PPTX
20160317 ARMA Wyoming Social Media Security Threats
PPTX
Darkside
Users and behaviors social internet: Safety & Security
Users and Behaviors- Social Internet
Brandon + Eddie users guide phi 235
The Social Takeover
osn-threats-solutions-2
Insecure trends in web technologies 2009
Project
Social Media: Infiltrating The Enterprise
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
fissea-conference-2012_srinivasan.pdf
Internet Safety
socialnetworkprivacysecurity-130718062319-phpapp02.pdf
Social media-threats
Social network and digital security
PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL N...
Presentación - Protecting your Employess, Customers, and Investments in the A...
Risk Assessment of Social Media Use v3.01
Social network privacy
20160317 ARMA Wyoming Social Media Security Threats
Darkside

More from Blue Coat (13)

PDF
Education is the Key to Fighting Cyber Crime
PDF
What is Heartbleed?
PDF
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
PDF
Empowering the Campus Network
PDF
Revolutionizing Advanced Threat Protection
PDF
Why Your Mobile Device Isn’t As Secure As You Think
PDF
CAS MAA Infographic
PPTX
Content Analysis System and Advanced Threat Protection
PPTX
Advanced Threat Protection - Sandboxing 101
PDF
Advanced Threat Protection Lifecycle Infographic
PDF
Big Data Security Intelligence and Analytics for Advanced Threat Protection
PDF
Are You a Hacker's Target?
PDF
How To Catch A Hidden Spammer
Education is the Key to Fighting Cyber Crime
What is Heartbleed?
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Empowering the Campus Network
Revolutionizing Advanced Threat Protection
Why Your Mobile Device Isn’t As Secure As You Think
CAS MAA Infographic
Content Analysis System and Advanced Threat Protection
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection Lifecycle Infographic
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Are You a Hacker's Target?
How To Catch A Hidden Spammer

Recently uploaded (20)

PPTX
1. Introduction to Computer Programming.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Modernising the Digital Integration Hub
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
observCloud-Native Containerability and monitoring.pptx
PPT
What is a Computer? Input Devices /output devices
PDF
STKI Israel Market Study 2025 version august
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
1. Introduction to Computer Programming.pptx
cloud_computing_Infrastucture_as_cloud_p
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Web App vs Mobile App What Should You Build First.pdf
Chapter 5: Probability Theory and Statistics
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Programs and apps: productivity, graphics, security and other tools
Final SEM Unit 1 for mit wpu at pune .pptx
Modernising the Digital Integration Hub
Developing a website for English-speaking practice to English as a foreign la...
O2C Customer Invoices to Receipt V15A.pptx
Hindi spoken digit analysis for native and non-native speakers
Enhancing emotion recognition model for a student engagement use case through...
observCloud-Native Containerability and monitoring.pptx
What is a Computer? Input Devices /output devices
STKI Israel Market Study 2025 version august
NewMind AI Weekly Chronicles - August'25-Week II
Getting started with AI Agents and Multi-Agent Systems
From MVP to Full-Scale Product A Startup’s Software Journey.pdf

How Safe Is YOUR Social Network?

  • 1. HOW SAFE IS YOUR CHECKING YOUR "SOCIAL SECURITY” SOCIAL NETWORK?
  • 2. SOCIAL MEDIA STATS FACEBOOK 49%FEMALE USERS 51%MALE USERS 310,000,000UNIQUE VISITORS 28%FEMALE USERS 72%MALE USERS GOOGLE + 20,000,000UNIQUE VISITORS
  • 3. 27,500,000 48%FEMALE USERS 52%MALE USERSUNIQUE VISITORS STUMBLE UPON 55%FEMALE USERS 45%MALE USERS 180,000,000UNIQUE VISITORS TWITTER 25%FEMALE USERS 75%MALE USERS 13,752,948UNIQUE VISITORS REDDIT
  • 4. AVERAGE MINUTES PER VISITOR PER MONTH FACEBOOK 6.75HOURS 1.5HOURS PINTERESTTWITTER 21MINUTES LINKEDIN 17MINUTES GOOGLE + 3MINUTES STUMBLE UPON 1.5HOURS
  • 5. SOCIAL MEDIA PRIVACY SCORES based off of 260 metrics from data-collection to privacy policies. 1 .9 .8 .7 .6 .5 .4 .3 .2 .1 LINKEDIN CLASSMATES.COM FACEBOOK TWITTER MYSPACE HI5 FRIENDSTER PRIVACYSCORE (weak) (average) (strong)
  • 6. SOCIAL NETWORKING WORMS Enlist more machines into its botnet, and hijack more accounts to send more spam to enlist more machines. All the while making money with the usual botnet business, including scareware and Russian dating services. Multiple worm attacks. Mikeyy worm started to spread via Twitter posts by encouraging you to click on a link. 1/6/2013TWITTER TOP 10 THREATS
  • 7. PHISHING BAIT The e-mail that lured you to sign into Facebook, hoping you don't pick up on the fbaction.net URL in the browser. Phishing attacks designed to gain passwords for profit.FACEBOOK 5/18/2013 TROJANS URL Zone is a similar banking Trojan, but even smarter, it can calculate the value of the victim's accounts to help decide the priority for the thief.
  • 8. SHORTENED LINKS URL shortening services (e.g., Bit.ly and Tinyurl) to fit long URLs into tight spaces. They also do a nice job of obfuscating the link so it isn't immediately apparent to victims that they're clicking on a malware install. DATA LEAKS Users share a bit too much about the organization -- projects, products, financials, organizational changes, scandals, or other sensitive information. Passwords have been stolen. 6 million were compromised.LINKEDIN 6/6/2012
  • 9. ADVANCED PERSISTENT THREATS (APT) is the gathering of intelligence about persons of interest (e.g., executives, officers, high-net-worth individuals), for which social networks can be a treasure trove of data. BOTNETS Twitter accounts being used as a command and control channel for a few botnets. The standard command and control channel is IRC, but some have used other applications -- P2P file sharing in the case of Storm -- and now, cleverly, Twitter. !
  • 10. CROSS-SITE REQUEST FORGERY (CSRF) CSRF attacks exploit the trust a social networking application has in a logged-in user's browser. So as long as the social network application isn't checking the referrer header, it's easy for an attack to "share" an image in a user's event stream that other users might click on to catch/spread the attack. IMPERSONATION Several impersonators have gathered hundreds and thousands of followers on Twitter -- and then embarrassed the folks they impersonate. TRUST Like e-mail, when it hit the mainstream, or instant messaging when it became ubiquitous, people trust links, pictures, videos and executables when they come from "friends".
  • 11. 87%of small to medium-sized businesses do not have formal, written internet security policies. 70%of these businesses lack policies for employees’ use of social media, despite the fact that they are increasingly favored by cybercriminals for phishing attacks.
  • 12. Once an attacker gains access to their account, they can easily find a way to mine more information and to use this to access their other accounts. The same is true for corporate accounts, which are publicly available on sites, like LinkedIn. !
  • 13. 90% of sites don’t require a full name or date of birth for permission to join. 80%of users failed to use standard encryption protocols to protect sensitive user data from hackers. 71%of websites reserve the right to share user data with third parties in their privacy policies.
  • 14. CLICK TO SEE THE FULL INFOGRAPHIC HERE: RESOURCES http://preibusch.de/publications/Bonneau_Preibusch__Privacy_Jungle__2009-05-26.pdf http://www.hula-hub.com/2012/03/21/top-social-media-statistics-infographic-2012/ http://www.marketingprofs.com/charts/2010/3596/social-networks-influential-not-always-trusted http://www.digitaladvocate.net/?p=504 http://mashable.com/2012/11/28/social-media-time/ http://www.networkworld.com/news/2010/010710-social-networking-hacks.html?page=2 http://detroit.cbslocal.com/2012/06/06/report-linkedin-networking-site-hacked/ http://blog.ussignalcom.com/blog-1/bid/278223/Cyber-Attacks-2013-Hackers-Exploit-Social-Media http://about-threats.trendmicro.com/us/webattack/75/spam%20scams%20and%20other%20social%20media%20threats http://www.computerweekly.com/news/1280090217/Privacy-rankings-LinkedIn-and-Bebo-high-Facebook-and-MySpace-average-Badoo-low