1. threats / attacks
in social media ?
Basically two different approaches:
1. Manipulating computer code to gain access or install unwanted software on a computer or a mobile device.
2. Manipulating people through social interactions (in person, over the phone, or in writing), known as "social engineering".
Manipulating CODE
Click-jacking
Concealing hyperlinks beneath legitimate clickable content which, when clicked, causes a user to unknowingly perform unwanted actions.
Can be used to use e.g. “Like” and “Share” buttons on social networking sites.
MANIPULATING CODE
Cross-Site Scripting (XSS)
Malicious code is injected into a trusted website. People can be directed to sites with a XSS Attack by sharing a link through a hijacked or a fake profile.
A Stored XSS Attack is when malicious code is permanently stored on a server.
A Reflected XSS Attack is when a person is tricked into clicking on a malicious link that causes the XSS attack.
Social engineering
Elicitation
Using conversation to extract information from people without giving them the feeling they are being interrogated. E.g. in Facebook chat.
Scams
Fake deals that trick people into providing money, information, or service in exchange for the deal.
E.g. fake competitions or giveaways, where the participant is directed to a malicious website in order to be able to participate.
SOCIAL ENGINEERING
Doxing
Retrieving personal information from e.g. social networking site profiles and releasing them publicly or e.g. blackmailing them with threats to release the information.
Manipulating code +
Social engineering
Phishing
Impersonating a legitimate organization or person.
In social media many times sharing a link that looks like it is legitimate but leads to a file with malware or a frauded website (e.g. bank websites). Phishing attacks are typically aimed at random victims.
Spear phishing attacks target a specific person or organization as their intended victim.
MANIPULATING CODE +
SOCIAL ENGINEERING
Abusing social-sign in
"Sign-in with Facebook" , "Connect to Facebook" etc. can be used to direct the user to a fake sign-in, through which the login details can be extracted and the user account can be hijacked. Especially noteworthy on mobile apps.
3. Possibilities and drawbacks of Web 2.0 -technology
Based on Top 8 Web 2.0 Security Threats, by Sarah Perez
WEB 2.0 POSSIBILITIES
- Allows use of the Web beyond static pages.
- Makes it possible to have interactive apps online.
- Allows people to communicate and share information with one another effectively through e.g. social media sites.
WEB 2.0 DRAWBACKS
1. Insufficient Authentication Controls
"In many Web 2.0 applications, content is trusted in the hands of many users, not just a select number of authorized personnel."
If users are allowed to access or modify data that they are not supposed to, it can affect the whole system negatively. Especially, if the users credentials are leaked or stolen.
WEB 2.0 DRAWBACKS
2. Cross Site Scripting (XSS)
Services based on social sharing (e.g. wikis) are easier targets for XSS attacks.
3. Cross Site Request Forgery (CSRF)
A lot of applications use AJAX, where the user cannot easily see what data is being transferred. Therefore, Web 2.0 applications are potentially more vulnerable to this type of attack.
WEB 2.0 DRAWBACKS
4. Phishing
"[T]he multitude of dissimilar client software in use makes it harder for consumers to distinguish between the genuine and the fake web sites. "
5. Information Leakage
Web 2.0, social media and "work-from-anywhere" lifestyle combined can blur the lines on work and private life, which can lead to "slips" of sensitive information.
WEB 2.0 DRAWBACKS
6. Injection Flaws
Web 2.0 made multiple new technologies popular (XML, XPath, JavaScript and JSON), which makes the services prone to new type of injection attacks.
7. Information Integrity
Social data sharing and editing (e.g. in Wikipedia) can lead to the spread of false information.
WEB 2.0 DRAWBACKS
8. Insufficient Anti-automation
The lack of anti-automation can help hackers to automate their attacks or help them to acquire a lot of information fast.
Anti-automation mechanisms (like CAPTCHAs) can be used to slow these attacks down or stop them.