123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Security Professional Exposes Vulnerability On Professional Networking Site

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Over the recent years, social media sites have grown in popularity and usage. Professionals and businesses are also leveraging the benefits offered by these sites to promote their professional and business interests. However, the popularity and loads of information available on these sites has made them one of the favorite targets for cybercriminals. Attackers take advantage of user negligence and security vulnerabilities on the sites to gain access to confidential information, spread spam and mislead users. Recently, a security researcher identified security vulnerabilities on LinkedIn's website. LinkedIn is one of the popular networking sites used by professionals. The vulnerability could allow attackers to gain access to user accounts without providing login credentials. Reuters first reported the security flaw, identified by Rishi Narang, an independent security researcher based in India. The vulnerability is associated with cookie management by LinkedIn. Cookies are files placed on a user's computer system by websites. These files may contain information regarding the sites visited by Internet users. Usually, session ...
... cookies expire within a reasonable period depending on the log in activity, while persistent cookies remain for a longer duration on a user's computer system. In the case of LinkedIn, the researcher identified that cookies do not expire for a period of one year from their creation. If attackers gain access to cookies stored for user authentication, they may misuse the same for gaining unauthorized to user accounts on a website. A user account may contain sensitive data such as names, date of births, photographs, e-mail addresses, and contact numbers, list of friends, hobbies or areas of expertise and employment details. Attackers may extract or alter contents of the compromised user account, send arbitrary messages impersonating as a legitimate user, extract details from accounts of user's friends listed on the site, spread spam messages and malicious links.

Social media sites are prone to regular attacks by cybercriminals. Facebook and Twitter, in particular have been the favorite targets of attackers. With increase in popularity of other sites, cybercriminals may attempt to exploit weaknesses and security flaws to defraud users. As such, social media sites must be proactive in identifying and mitigating threat vectors through regular security audits by professionals qualified in penetration testing and masters of security science.

Internet users must use strong and unique passwords, and be wary of divulging personal and financial information on social media sites. Social media sites may encourage safe usage of the sites by users by sending e-flyers, security alerts, scam alerts, and creating awareness on privacy threats, and proper use of privacy settings.

Organizations must advise employees on the precautions to be adhered while accessing social media sites on work computers. They may limit the information divulged on the professional networking sites as cybercriminals may use social engineering techniques to extract privileged business information from employees. Mandatory e-learning and online degree programs on cyber security may help employees understand security threats and implement safe online computing practices.

Security professionals may benefit from online university degree programs to update themselves on best information security and website security mechanisms and strengthen the defenses of the organizations against vibrant threats emanating from the cyber space.

Total Views: 169Word Count: 525See All articles From Author

Add Comment

Computers Articles

1. Cpd Accredited Typing Certificate Uk - Speed Test & Online Certification
Author: Kowser

2. Safe Connection With Mickey Mouse Cables- An Ultimate Guide
Author: Jennifer Truong

3. Develop A Widget For Ios App
Author: goodcoders

4. Develop An App From Scratch In 13 Steps
Author: goodcoders

5. The Best Antivirus Software For 2025
Author: Jasbeer SIngh

6. How To Develop An App From Scratch In 13 Steps
Author: goodcoders

7. 7 Steps To Create A Safe Mobile App
Author: goodcoders

8. Why Do Businesses Need Vendor Management Software?
Author: Kiran

9. React Native App Development By Alvi Software
Author: Alvi Software

10. Custome
Author: Owner

11. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

12. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

13. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

14. The Rise Of User Centered Web Design
Author: goodcoders

15. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: