With gasoline rookie of social networks, user information appears to be in danger. Actually a network accounts like Facebook more than 500 million users and stock data on all these people. Imagine that the owner of Facebook or other hacker who managed to recover data decides to use it! There is no privacy that can be challenged on social networks. The use of Facebook, Twitter, YouTube or MySpace, to name a few, can reserve surprises for the portfolio of the user. Social networks regularly experience the onslaught of hackers and are the hunting ground for cybercriminals. The most used social networking site is the Facebook which resides millions of users and their private data. (Finkle)This private data, images, videos or conversations can be used by criminals for several reasons which we do not think about while sharing it. It is easier for a person to get your password, than it is for you to even change it. The private things shared on Facebook can be used for stimulating and increasing cybercrime in the society by criminals and exploiting your personal data, making your life difficult.
The misdeeds are much easier to perform behind a computer screen than in reality. Some people do not even realize they are pirates but we do not necessarily realize or we say that since everyone does it, why we cannot also do it.As life spreads on Facebook, it can be used to retrieve information for targeted scams, as a phishing for your bank, or photos to make you chanter.(Finkle) From addition, once spread, information becomes indelible: it cannot be deleted, so it’ll be extremely simple for a cybercriminal to trace the journey of a person since the creation of his account. On a social network, a user theoretically talking to “friends” of which it is easy to impersonate despite the need to know the username and password. The first information is usually found on the person’s profile about the password the work is hardly more complicated for cybercriminals.
The intrusion is the penetration of a network or organization by a foreign person, called hacker or hacker, to that organization.(Wall*)The “Trojan horse” is legitimate-looking software designed for hidden way to perform actions without the knowledge of the user. It attempts to spread, destroy or divert information or allow a hacker to take remote control of the computer. The “worm or worm” is malicious software that does not need a host program to reproduce. It can be used to spy on a computer, allowing hackers access to your computer, destroy the data by the computer. The “virus” is malicious software that can infect other programs by modifying them to include a copy of it. It requires the implementation of the host program to activate. It develops and causes corruption, disruption and / or destruction. “Adware or advertising supported software” is software that displays advertising banners.”Phishing or phishing” is a technique used by hackers to obtain personal information in order to commit identity theft. This technique is for example to make the victim believe that it is addressed to his bank and steal their bank details so to practice embezzlement. All these malwares and viruses tend to manipulate user’s data and personal information and all these actions can be easily implied through our very own Facebook. Just a message in your inbox containing these malwares, and as soon as you open it you’ll become target of cybercrime. Remember also that Facebook have been the target of attacks by a virus called Koobface. (Frank) The latter is completely infiltrated the network operating system and then has two means of action: either he awaits a person buys something online and then retrieve the information on his credit card or virus research in its computer cookies by former links with its previous purchases and withdrawn the information sought.
For Facebook, this is “malware” (malicious software) and “phishing” (messages inciting to provide confidential information such as bank details). The aim of cybercriminals is not so much to instill a virus in a machine in order to disrupt the operation. Rather, they seek to deposit a small invisible software allowing them to collect confidential information (IDs, passwords …), which are then used to log on to a banking site. For example, transfer money without the knowledge of the account holder. “Cybercriminals are looking to make money quickly. (Finkle) With social networking like Facebook, they easily obtain information on the Internet users, and have a trusted environment, which lends credibility to their demands,” said Laurent Heslault, Director of Technology Security at Symantec. On Facebook, a user theoretically talking to “friends” is easy to impersonate. A priori, the site connection is secured with a username and password. The first is often the email address or the name of one who is enrolled. This information is not very hard to find: it often appears on the user profile. To find the password, the cybercriminal work is more complicated sentence.(Frank)The hacker can retrieve passwords on the site itself. When a member of a social network has forgotten his own, he can find it by answering a question he had previously chosen during registration, “What is your cat’s name?” Or “Where was your mother born?
According to a report, another risk faced by young users of social media would cyberbullying phenomenon of using digital media to disseminate false, embarrassing or hostile to others. Here, the report noted that a distinction must be made between cyberbullying and online harassment. In short, online harassment is not as common as harassment, while cyberbullying is very common and can happen to all young using Facebook.