How Hackers use LinkedIn to Scam
Legacy signals
Legacy popularity: 1,158 legacy views
Hackers love LinkedIn because it links them in—straight through the portal of the targeted company. Geez, how much easier could this be, what with all the publically-exposed e-mail addresses of key players (and also worker bees) in big companies that someone wants to hack.

An article on blog.sungardas.com was written by a white-hatter (his job is to try to hack his clients' systems so that they know how to make them more impenetrable to the bad guys). The author says he'd make a beeline to LinkedIn if he became a black-hatter.
In addition to all of those revealed e-mail addresses, the hacker could also learn (without hacking, of course) what a business's e-mail structure is. He can then compile a list of employees for his social engineering attacks. (Can you just see him watering at the mouth over this—like putting a sizzling steak in front of a dog.)
A phishing campaign could trick the targets into giving up crucial information—essentially handing the company key to the hacker. The crook, however, knows better than to pull this stunt on IT employees. But fertile territory includes employees in the marketing, accounting and customer service departments.
Maybe you've read that every professional these days absolutely should have a LinkedIn account. You can bet that every hacker agrees!
Companies need to come up with a way to prevent hackers from sneaking into their network via that bastion of essentiality known as LinkedIn.
The penetration-tester, in his article recommends that businesses do the following:
Social engineering training. Workers must be aggressively trained in how to sniff out a phishy-smelling e-mail. No corners should be cut with this training program, which should include ongoing staged attacks.
A statement clarifying communication about security information. To help prevent employees from giving out sensitive information to the wrong people, the company must figure out how communication will be conducted, then get it down on paper. For example, "E-mails from our company will never ask you to reveal your use ame and password."
Definitive reporting process for suspicious activity. Employees need to have, on paper again, specific instructions in how to report suspicious activity, such as a questionable e-mail. These instructions should be simple and to the point.
Article author
About the Author
Robert Siciliano is an identity theft expert to TheBestCompanys.com discussing identity theft prevention.
Further reading
Further Reading
Article
The Seven Steps to Forgiveness
An Excerpt from The Feeling Soul - A Roadmap to Healing and Living By Mark Linden O’Meara Available at Amazon.com Seven Steps to Forgiveness Much has been written about forgiveness. Everywhere you turn people are saying you have to forgive, yet few people likely understand the process of ...
Related piece
Article
Book Review: Stand Up for Your Life: A Practical Step-by-Step Plan to Build Inner Confidence and Personal Power
Amazon.com Review: \ Oprah life makeover maven Cheryl Richardson wants you to start rocking the boat. Stand Up for Your Life urges readers to stop playing it safe by putting their needs and priorities aside. Her premise: by spending less time listening to others and more time strengthening your ... Amazon.com Revi
Related piece
Website
Cheryl Richardson's Official Site
Access practical tools, challenging ideas, resources, and helpful information that will support you in living a life that honors your soul.
Related piece
Article
Learning the Language of Feelings
Learning the Language of Feelings An excerpt from The Feeling Soul – A Roadmap to Healing and Living Mark Linden O’Meara, Soul Care Publishing ISBN: 0-968045928 Available at Amazon.com Part of self growth and developing self-knowledge involves learning to express the feelings, ideas and ...
Related piece