"Your Digital Footprints Are More Than A Privacy Risk – They Could Help Hackers Infiltrate Computer Networks"

Ravi Sen, a Texas A&M cybersecurity researcher, brings further attention to how information shared online can help hackers successfully execute phishing attacks. Using the Internet results in the creation of a trail of data or a set of digital footprints, including social media activities, web browsing behavior, health information, travel patterns, mobile device information, location maps, and more. Big social media companies, app developers, data brokers, and other various organizations collect, store, and analyze this data, putting privacy and cybersecurity at risk. Sen tracks the threat posed by digital footprints on cybersecurity. The researcher pointed out that hackers can use personal information gathered online to answer security questions or increase the effectiveness of phishing attacks by posing as a colleague or work associate. There are open-source intelligence gathering tools that hackers could use to discover the digital footprints of their targets. These tools can help hackers mine a target's digital footprints, including audio and video, to gather information about contacts, relationships, professions, careers, likes, dislikes, interests, hobbies, travel, and locations. This information can then be used to craft legitimate-looking phishing messages that appear to come from a trusted source. The attacker can deliver these personalized messages to the victim or pose as the victim to attack the victim's colleagues, friends, and family. It is essential for organizations to educate their employees about managing their digital footprints. Training should cover how to find the extent of your digital footprints, how to securely browse the Internet, and how to responsibly use social media. This article continues to discuss how digital footprints can help hackers perform different malicious activities. 

Texas A&M Today reports "Your Digital Footprints Are More Than A Privacy Risk – They Could Help Hackers Infiltrate Computer Networks"

Submitted by Anonymous on