HOW IT REALLY HAPPENED: NINJIO SEASON 1, PART 1, EPISODE 2 – SOCIAL MEDIA SOCIAL ENGINEERING

Rogue Usb Devices cybersecurity phishing awareness training
Posted by: Orhan Sari Category: Cyber-security Awareness Tags: Post Date: February 3, 2020

HOW IT REALLY HAPPENED: NINJIO SEASON 1, PART 1, EPISODE 2 – SOCIAL MEDIA SOCIAL ENGINEERING

Social media engineering cybersecurity phishing awareness training – how it really happened: Ninjio Season 1, Episode 2

As we saw in Season 1, Episode 2, Pat was haphazardly accepting friend requests from people he didn’t necessarily know, simply because he had friends in common.  This is a common tactic used by hackers to gain your trust.  As you watched, once they have your trust, and you let them into your personal social media world, they can use everything that they know about you, against you.  Article 1 below will tell you more about this particular breach.  The other articles are about the different types of Social Media threats and how else hackers can use these threats to attack us.  Articles 4 & 5 talk about best practices around Facebook Security.

Social media engineering cybersecurity phishing awareness training

1- HOW IT REALLY HAPPENED: BLACKMAIL AND THE ASHLEY MADISON HACK1

The Ashley Madison database was published online, and it gives extortionists a way to blackmail victims. One way to do this is through social engagement in Facebook. This article covers how the hack has become personal for Ashley Madison users and their friends and family.

2- FACEBOOK VULNERABILITIES 2

Social engineering takes several forms, and Facebook is a primary way for hackers to gain access to your information. Learn how to recognize several Facebook vulnerabilities and protect yourself from social engineering hackers.

3- FACEBOOK SECURITY BEST PRACTICES 3

Facebook security settings can be confusing. This article shows you how to go through each of your settings and identify the best ways to secure your privacy both from social engineering hackers and other strangers.

4- DETERMINING THE WAY YOU WANT TO BE SEEN ON FACEBOOK 4

Not all Facebook security settings are built the same. You can granularly go through settings and determine the way you want to be seen to the public. This article covers questions you should ask yourself when you set up your Facebook privacy settings.

Social media engineering cybersecurity phishing awareness training

Want try Keepnet's security solutions for free?

Click the button and start your free trial today

  1. http://www.cio.com/article/2987830/online-security/ashley-madison-breach-shows-hackers-may-be-getting-personal.html
  2. http://www.digitaltrends.com/social-media/facebook-vulnerabilities/
  3. https://www.sophos.com/en-us/security-news-trends/best-practices/facebook.aspx
  4. http://www.nytimes.com/2013/02/07/technology/personaltech/protecting-your-privacy-on-the-new-facebook.html?_r=0

Share this post