There is a growing trend in the “echo” generation. They’re knee deep in the social networking world without a care for consequences of hacking. It’s amazing how many times I see the MySpace denizens act as if they have some sort of anonymity. News flash folks, you don’t.

From CNET:

On Thursday morning, at this year’s RSA conference in San Francisco, Chris Boyd of Facetime and I will present a talk “How to Adapt to the Echo Generation’s Social Media Hacking Game.” The following is a preview of that talk, presented in three parts. On Tuesday we learned who the Echo Generation are. Wednesday we saw how they use online social media for hacks. Today, we’ll see how Chris uses features of social networks and Web 2.0 to shut these kids down.

Known as the Sherlock Holmes of France, famed criminologist Edmond Locard once said that every contact between two items leaves a trace, and that’s also true when talking about online crimes. IP addresses are left behind with every site we visit. Posts to newsgroups remain accessible via Google long after the initial discussion has ceased to have relevance. And there’s also that embarrassing MySpace page that was started but abandoned years ago that’s still active. So when a person suddenly decides to commit an online crime, all that prior online history follows them, and that’s a good thing for Chris Boyd, director of malware research at Facetime Security Labs.

Have a read of the full piece by Robert Vamosi. A very interesting article.

Article Link

[tags]Social Media, Social Media Hacker, Online Crime[/tags]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.