Downloads: 137 | Views: 346 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Case Studies | Information Technology | India | Volume 3 Issue 6, June 2014 | Popularity: 6.9 / 10
Profile Impostoring: A Use Case on the Rising Social Engineering Attack on Facebook Users
Cephas Mawere, Thabiso Peter Mpofu
Abstract: Social engineering attacks have taken a new twist as a growing number of people use online social networking sites to foster social relationships among each other and market products. Of interest is Facebook whose users have exponentially increased; some of these users are prominent individuals with high influence in various communities like celebrities; philanthropists; religious ministers and non- profit organizations. Data retrieval from Facebook profiles is thus becoming a major tool for business which has led to most unsuspecting users being victims of deception. Profile impostoring; also known as identity theft; is increasingly on the rise and becoming an underlying threat to information security. The cyber perpetrators are creating fake Facebook profiles of prominent individuals who have a large following. Ordinary individuals are also not at their mercy. With such high pending risk of identity theft there is need to develop methods that help Facebook fans to automatically detect deception; identify imposters and get them arrested.
Keywords: Social engineering, social networking, profile impostoring, identity theft, information security, cyber perpetrators
Edition: Volume 3 Issue 6, June 2014
Pages: 69 - 74
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 357 | Views: 1000 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Information Technology, Ghana, Volume 8 Issue 6, June 2019
Pages: 64 - 69The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana
Abu Sulemana, Yahuza Abdul-Kadir
Downloads: 301 | Views: 558 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Information Technology, India, Volume 8 Issue 1, January 2019
Pages: 456 - 460Analysis of Blockchain and its Working Principle
S. Banupriya, G. Renuka Devi
Downloads: 266 | Views: 407 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Information Technology, China, Volume 9 Issue 1, January 2020
Pages: 107 - 112Network Optimization using Multi-Agent Genetic Algorithm
Sikandar Hanif
Downloads: 260 | Views: 471 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Information Technology, Malaysia, Volume 8 Issue 1, January 2019
Pages: 64 - 70University of the Future (UotF): Redesign Business Model for Local University in Malaysia through Humanising Education and 4IR
Nor Zaiasron Bin Yahaya, Abdul Rahman Bin Ahmad Dahlan
Downloads: 254 | Views: 418 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Information Technology, India, Volume 9 Issue 1, January 2020
Pages: 477 - 479IoT Based Smart Street Light for Energy Efficiency and Safety
Tanmay Patil, Arjun Ramendra