Each day computer users give away a variety of personal information about themselves without even realizing it.
Often this happens when a person takes advantage of online services like search, social media, mobile applications, e-commerce and professional development.
For example, if a person bookmarks a visited page, adds an item to an e-commerce store “wish list”, or completes an “About Me” quiz on social media, a friend can share the information they provide or sold to interested or competitor business or on the dark web.
Additionally, with social media sites like Facebook, Twitter, or LinkedIn, created content like status updates, comments and uploaded photos and videos become a permanent part of those social media networks. Anyone can find them, read them, and use them for any purpose. The real question for the user is: “What does my digital footprint reveal about me?”
Users cannot control how others use information provided online but they can control their online behavior and therefore protect their electronic privacy.
Essentially, anyone that uses social media should be aware that identity thieves, scam artists, debt collectors, stalkers, employers and corporations use these services to gather information about you. Don’t post anything online that you would not mind seeing on the front page of a newspaper. Once done with a social media website, you should always log off.
Please find examples of more social media privacy attacks here.