Skip to main content

Why LinkedIn Is A Hacker's Dream?

LinkedIn may be the world's leading professional social network, but that is also contributing to its potential value to hackers.

Social networks have always attracted hackers. Sites like Facebook are regularly prone to a variety of different attacks, as members' willingness to share stuff quickly becomes there undoing. Before thinking about that hilarious picture of a singing cat that came from somebody they didn't know, they've clicked it and downloaded malware. As LinkedIn grows (150 million members and counting), the interest from hackers grows with it. Behavior on LinkedIn makes it a particularly useful target for hackers.

linkedin hacker


On Facebook, users can be encouraged to keep their accounts private and secure and they tend to be wary about the people they share personal information with. On LinkedIn, a different set of rules exist by the very nature of the site.

For a start, users potentially want to be sought out and contacted by recruiters and potential employers. That means that they need to be easy to find, so a public profile is an absolute must. Limiting the data on that profile generally limits the interest that potential recruiters might have too. If you can't demonstrate very specific career experience, then a recruiter is more likely to go and find somebody that can. If your employer is easily visible then your company's vulnerability to attack increases greatly.

It's not easy to guess somebody's personal email address but when it comes to corporate email accounts, things get a whole lot simpler. Chances are that it's name.surname@companyname.com and that makes it easy for people to get in touch with you, even if you don't want them to. The other problem, particularly in larger businesses, is that it makes it more likely that there will be people on LinkedIn that work for your company that you don't know. If you get a connection request from one of them, then the chances are that you won't decline, particularly because LinkedIn continually encourages you to connect with more and more people.

This problem was highlighted in a recent article on the CNN website, which outlined the efforts of a security specialist to 'infiltrate' a company network. Within days, he had achieved his goal, proving the theory that employees 'connect first and think later', by which time it may be too late.

For LinkedIn users this means simple precautions:

1 – Don't connect with somebody that you do not personally know and trust (even if LinkedIn suggests that you do otherwise).

2 – When administering groups, ensure that membership is controlled by an administrator to ensure that only genuine employees are able to join.

3 – When discussing your current role, be careful to talk in generic terms. Don't give away the details of specific projects or assignments.

Sensible precautions can help mitigate many of the risks that LinkedIn users face, but the fact remains that this is becoming an increasingly attractive proposition to hackers.

Comments

Popular posts from this blog

Huawei Improved Loading Time Of Smartphone Battery

Huawei has developed by its own account, a new technology that allows to boost smartphone battery within ten minutes at 50 percent of their capacity. Overall, batteries should be charged approximately ten times faster than is currently standard.  The technology comes from the Huawei subsidiary Watt Lab. On the Battery Symposium in Japan they recently showed three different concepts. A 600 mAh battery for example reached within two minutes 68 percent of its capacity. Another current memory with 3000 mAh was charged after five minutes to 48 percent, which is rich with a Huawei smartphone for a talk time of ten hours. The quick charging is made possible by the addition of heteroatoms to the molecules of the graphite anode of the battery. They serve as a catalyst for the reception and transit of lithium by the carbon deposits. The heteroatoms shorten loud Huawei charging time, without lowering the energy density or the battery life. Currently Huawei subjects neither th...

Bitcoin: Can Anyone Hack It? Its More Secure Than People Think

One of the main issues holding back the popularity of Bitcoin right now is security. Bitcoin security is a tricky subject, and it's not something that can be described in a three to five minute news segment on CNBC or Bloomberg. While there have been plenty of stories of bitcoins being stolen by bad actors over the past few years, it's important to realize that there is a difference between Bitcoin and bitcoins. Bitcoin, with a capital "B", is the name of the protocol and payment system, while bitcoins are the currency used on that network. By differentiating between the two, it becomes easier to understand the truth about Bitcoin security.   Bitcoin Has Never Been Hacked The first thing that needs to be pointed out when it comes to the security of this cryptocurrency is that Bitcoin has never been hacked . All of the stories of stolen or hacked bitcoins are referring to online exchanges and wallets that are created as services outside of the Bitcoin bl...

Office 2016 For Mac - These Are The New Features

Office 2016 for Mac offers several interesting innovations, especially for professionals. The new version works optimally with the cloud and the Windows version of Office 2016th Microsoft not only Office 2016 for Windows available, but in parallel also the version for OS X. Thus, it is the first time for years finally a common version for both operating systems, which interact perfectly with each other and their documents are compatible with each other. Especially companies benefit if they use Macs parallel to Windows PCs. Because with the new version, users get also common features and the same operating options. The surface is almost identical, but differs in one capacity or another, for example when it comes to the new intelligent search or search in the ribbon. These functions remain the Windows version reserved. Microsoft has finally made it into the new version that documents also are compatible between the different systems and the representation or calculations do n...