Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

07:50 AM

Anti-Social Networks

Security problems make social networking a bad habit

3:50 PM -- I received a press release from Sophos yesterday with the ridiculously long title "Sophos Facebook ID Probe Shows 41 percent of Users Happy to Reveal All to Potential Identity Thieves." My first reaction was... "Duh!"

The security problems on social network networking sites have been evident for some time now. We all know that these sites are a drain on productivity. I'm stunned by how much time both students and professionals spend on these sites. It is the new addiction. Forget rushing to the bar after work -- employees are now getting their fix by posting useless messages like "OMG! Did you see what that sales rep was wearing?" or "Dude, your server just got pwned!"

Not only are these sites a drain, but they could cost you a job. Many companies today do online searches (or hire a third party) to find out what they can about a prospective employee on the Web. Kudos to those employers, and a warning to those who speak loosely about their current employers on social networking sites. (See Leak Hunters.)

Finally, social networking sites are enablers for attackers. They've been used for spam, phishing scams, and cross-site scripting (XSS) attacks. Even stalkers and pedophiles use them to find new prey. It seems elementary that identity thieves use them to find new targets, and it certainly seems likely that they are also used by corporate spies.

Of course, social networking sites aren't the only sources of personal information. Much of this data could be obtained from any number of other Websites -- including phone numbers, email addresses, birthdates, and physical addresses. Most social networkers are not handing over their Social Security Numbers or credit card information. But for an attacker who looks hard enough, there's plenty of useful information there.

When you or your employees transmit data, even socially, consider what might happen if that data is exposed online. If you are an enterprise IT worker, you should be aware that the questions you post to mailing lists could be used to enumerate what security measures you have in place.

If you are responsible for security in your organization, you should think long and hard about implementing a policy restricting social networking site usage. Alternatively, consider hiring a third party to surf these sites every couple of weeks to see what your employees may be leaking about you. The message that the Sophos study delivers may not be new, but we can thank them for the reminder.

— John H. Sawyer is a security geek on the IT Security Team at the University of Florida. He enjoys taking long war walks on the beach and riding pwnies. When he's not fighting flaming, malware-infested machines or performing autopsies on blitzed boxes, he can usually be found hanging with his family, bouncing a baby on one knee and balancing a laptop on the other. Special to Dark Reading

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-13
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.