Social networking sites have increased in popularity and are utilized for many purposes which include connecting with other people, sharing information and creating content. Many people on social networking sites use these platforms to express opinions relating to current affairs within society. People do not realize the value of their data divulged on these platforms and the tactics implemented by social engineers to harvest the seemingly worthless data. An attack vector is created when a user can be profiled using responses from one of these platforms and the data combined with leaked information from another platform. This paper discusses methods for how this data, with no significant value to the users, can become a commodity to social engineers. This paper addresses what information can be deducted from responses on social news sites, as well as investigating how this information can be useful to social engineers.
Reference:
Labuschagne, WA, Eloff, MM and Veerasamy, N. The dark side of Web 2.0. ICT Critical Infrastructure and Society, Amsterdam (Netherlands), 27 to 28 September 2012. Published in IFIP Advances in Information and Communication Technology, 2012, Volume 386/2012, 237-249, DOI: 10.1007/978-3-642-33332-3_22
Labuschagne, W., Eloff, M., & Veerasamy, N. (2012). The dark side of Web 2.0. Springer. http://hdl.handle.net/10204/6201
Labuschagne, WA, MM Eloff, and Namosha Veerasamy. "The dark side of Web 2.0." (2012): http://hdl.handle.net/10204/6201
Labuschagne W, Eloff M, Veerasamy N, The dark side of Web 2.0; Springer; 2012. http://hdl.handle.net/10204/6201 .
Copyright: 2011 Springer-Verlag. This is a post-print version of the work. The definitive version is published in IFIP Advances in Information and Communication Technology, 2012, Volume 386/2012, 237-249, DOI: 10.1007/978-3-642-33332-3_22