Social networks create opportunities for criminals

Social networking sites have gifted conmen with a raft of new criminal opportunities, according to security experts.

Social networking sites have gifted conmen with a raft of new criminal opportunities, according to security experts.

The problem is that end-users seem to suspend all rational judgement when dealing with people online, according to Mark Zielinski, security engineer with Arbor Networks' security engineering and response team.

"[Users'] exploits in social networking are an increasing concern - enterprise IT staffs are suddenly getting slammed with yet another set of security problems," said Zielinski.

Social networks offer the worst possible scenario for security experts. "Getting to people has always been a more effective method of stealing from a company than hacking. With social networks, the criminals are getting the best of both worlds," he said.

A particular problem is that social networking applications have somehow mutated from being a consumer network into enterprise tools, warned Ryan Olson, US-based analyst for VeriSign's iDefense malicious code operations.

"Thousands of new applications are being developed for users. While they enrich functionality, they present a perfect channel for distributing malware. The potential for disaster is all there," he said.

John Safa, chief technology officer at data security company DriveSentry, constantly monitors the activities of fraudsters and hackers in chatrooms and forums. He warned "[a social networking site] is like a nightclub where you can meet strangers you believe want to be your friends. Before you know it you have handed them the keys to your car and your wallet."

Hacking poses threats to business >>

The human factor is key to good security >>

Comment on this article:

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.






  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...