How to Protect Social Media Profiles?

Your personal information on social networking sites must be secured not because of privacy but to prevent it from identity theft. Using social networking sites like Facebook, LinkedIn and Twitter is so fun but we are unaware of the insecurities walking with them and provide all our personal information carelessly. This may result in great personal, professional and financial losses as it becomes easier for the hackers to get your information easily. Therefore, privacy on social networks is an essential requirement for every online user.

Social media has become a part of our culture and spread all over the world. As social networking is gaining popularity among every user, it is also becoming a hunting ground for the hackers. Hackers are finding many creative ways to swindle you and are using various tricks to create dangers of Facebook. It is important to take proper precautions to protect your privacy on Facebook and keep your profile secured.

To protect your privacy on social networks you should trail some of the guidelines described below which would help you to keep away these online exploiters to perform the unfair activities with your personal information: –

1. Always use a strong password made up of 10 characters and should consist of letters, numbers and symbols as it becomes tougher for the hackers to trace your password. You should never use your name or any personal information as your password since it becomes easier to guess. Make sure you use different password for different sites so that rest of the sites remain safe if any of the passwords is being revealed.

2. You should never provide information like phone number, pin code, residential address or credit card information to your social networking account. Be smart enough to provide limited information to all these easily available sites.

3. Never accept friend requests from the strangers as you never know the person you are adding to your profile may bring danger to your social life.

4. You should never update your daily activities especially if it is related to some financial information since it gives a chance for the hackers to misuse your information and may put you in financial trouble.

5. If you receive any mails or links from others, be selective to open it since you know that sender and trust him/her. If you doubt about its authenticity you can email the sender and can confirm about the link.

Now you can surely come out of the dangers of Facebook. Even if you are in trap of online thefts, you can directly contact some of the websites, which can provide online management tools to fight against online identity thefts and can save your social network privacy.

It’s a Matter of Privacy

Everyday people make compromises to their privacy and some of us do not have as much privacy as we really want. You may not be a celebrity, but the moment you woke up in the morning your privacy could be compromised. Why? It is because some Android Phones have GPS enabled on the phone so any of the widgets installed on it could possibly know your geo location.

A recent study from master’s degree in information security experts have reviewed 30 regular phone widgets and half of them are gathering the user’s geo location information and sending it to advertising servers. Seven of those send phone identifier info’s – phone number and the SIM card’s serial number to the developers.

Unlike the widgets of Android Phones,Foursquare application of other phones doesn’t track the location of the person all the time. The person must update his location; personally checking in. However, this doesn’t mean that another person cannot use the same system to check on other persons.

Even some cars could be used to track you down. For example the OnStar system of recent car models, which can track the cars geo location anytime and anywhere. It also gathers diagnostic information such as the speed of the vehicle. That information was shared to authorities, credit card companies and others. It may sound agreeable, but it could be used by others who have other plans in their mind.

As a person drives downtown, he or she could be monitored by traffic light cameras. Although, one could be photographed only when beating the red light; the idea of cameras monitoring you while driving isn’t exactly heartwarming. In parking garage, there are cameras mounted above each ticket dispensers and from that distance and angle, the camera could capture clear images of the license plate as well as the face of the person.

When it comes to free internet access on establishments with wireless networks, a person could be at risk with wireshark or perhaps fireshark. Any person who has vile intent can use the wireshark to sniff any wireless packets and steal cookies or any other information. For example, if a person logs into his or her Facebook, they can steal the person’s authentication cookies and use the person’s Facebook account –impersonating the person.

Facial recognition technologies could be a heaven for stalkers.  For example, the Augmented ID system makes it possible for a person to capture a photo of someone using the phone. The application will then search its database for any matching face. This software will then identify the person and their social accounts using their pictures only.

A person doesn’t need to become a master’s degree information security expert just to understand the danger of credit card purchases to the privacy of an individual. In some purchases using credit cards, store clerks will ask for the person’s zip code. Together with the credit card information and the name and address, anyone could easily use the information to target the person. There are others who shop at grocery stores using credit cards; when paying for the purchase, the person has to put their fingers on the fingerprint reader to register that data together with the credit card info on the stores database. Thus the store will have all the records regarding the purchase, name and address of the person aside from credit card details.

A person could be tracked using Facebook with the location services offered by the social network. If left by default, anyone could know where the person has been; where he or she is now or where he or she is going. This geo location is completely voluntary just like Foursquare. The person has control over it; he or she can define who can access and view the information. If a person will leave his or her viewable information public, then he or she is saying that I am willing to be followed or stalked all the time.

Some privacy concerns can be small while some can be larger; it is a matter of personal preference.The concern of every ms in information security expert is that most people are unknowingly making compromises on their own privacy. In fact, some are losing their prized privacy everyday.

EC-Council University is a licensed university that offers degrees and master’s degrees on Security Science online. The degrees are recognized worldwide and may be used in any employment worldwide as well as the graduate certificates that they offer. With excellence and dedication as the core values, many professionals and degree holders have benefited from undergoing the programs in this university.

More information about master’s degrees in information security available at