Labuschagne, WAEloff, MMVeerasamy, Namosha2012-10-222012-10-222012-09Labuschagne, WA, Eloff, MM and Veerasamy, N. The dark side of Web 2.0. ICT Critical Infrastructure and Society, Amsterdam (Netherlands), 27 to 28 September 2012. Published in IFIP Advances in Information and Communication Technology, 2012, Volume 386/2012, 237-249, DOI: 10.1007/978-3-642-33332-3_22978-3-642-33331-6http://www.springerlink.com/content/2l16p44123137325/http://hdl.handle.net/10204/6201Copyright: 2011 Springer-Verlag. This is a post-print version of the work. The definitive version is published in IFIP Advances in Information and Communication Technology, 2012, Volume 386/2012, 237-249, DOI: 10.1007/978-3-642-33332-3_22Social networking sites have increased in popularity and are utilized for many purposes which include connecting with other people, sharing information and creating content. Many people on social networking sites use these platforms to express opinions relating to current affairs within society. People do not realize the value of their data divulged on these platforms and the tactics implemented by social engineers to harvest the seemingly worthless data. An attack vector is created when a user can be profiled using responses from one of these platforms and the data combined with leaked information from another platform. This paper discusses methods for how this data, with no significant value to the users, can become a commodity to social engineers. This paper addresses what information can be deducted from responses on social news sites, as well as investigating how this information can be useful to social engineers.enSocial networkingWeb 2.0Social news sitesSocial engineersInformation securityDigital footprintFacebookInformation gatheringInternetLIWCSocial engineeringProfilingThe dark side of Web 2.0Conference PresentationLabuschagne, W., Eloff, M., & Veerasamy, N. (2012). The dark side of Web 2.0. Springer. http://hdl.handle.net/10204/6201Labuschagne, WA, MM Eloff, and Namosha Veerasamy. "The dark side of Web 2.0." (2012): http://hdl.handle.net/10204/6201Labuschagne W, Eloff M, Veerasamy N, The dark side of Web 2.0; Springer; 2012. http://hdl.handle.net/10204/6201 .TY - Conference Presentation AU - Labuschagne, WA AU - Eloff, MM AU - Veerasamy, Namosha AB - Social networking sites have increased in popularity and are utilized for many purposes which include connecting with other people, sharing information and creating content. Many people on social networking sites use these platforms to express opinions relating to current affairs within society. People do not realize the value of their data divulged on these platforms and the tactics implemented by social engineers to harvest the seemingly worthless data. An attack vector is created when a user can be profiled using responses from one of these platforms and the data combined with leaked information from another platform. This paper discusses methods for how this data, with no significant value to the users, can become a commodity to social engineers. This paper addresses what information can be deducted from responses on social news sites, as well as investigating how this information can be useful to social engineers. DA - 2012-09 DB - ResearchSpace DP - CSIR KW - Social networking KW - Web 2.0 KW - Social news sites KW - Social engineers KW - Information security KW - Digital footprint KW - Facebook KW - Information gathering KW - Internet KW - LIWC KW - Social engineering KW - Profiling LK - https://researchspace.csir.co.za PY - 2012 SM - 978-3-642-33331-6 T1 - The dark side of Web 2.0 TI - The dark side of Web 2.0 UR - http://hdl.handle.net/10204/6201 ER -