Chapter 5: Public profiles & public Wi-Fi
In this chapter, the risks of sharing too much information on your social media profiles will be explained as well as the risks of using common public Wi-Fi spots.
The keyword of this chapter is privacy, because being connected and sharing everything might not always be the best idea.
Table of content
Select the part you want to go towards or just start straight from the beginning.
All the data that you share online can be used against you. Ethical hackers can show us how it’s done (click here for the video’s) Oversharing on social media is quite common nowadays.
All of this free flow of information can be turned against you as the hacker can accumulate all that information and try to answer basic security questions and crack passwords.
Now, what are specific scenarios of risks of oversharing on social media?
2: How public information can be abused
You might think that this would never happen to you. Sadly, you many victims thought the same.
For this reason, we grouped some videos of victims explaining how they got hacked. In addition, a book example.
3: Risks of careless usage of public Wi-Fi spots
Despite of what you might think, these public wifi-spots at a local store might not always be as convenient. If you enter these networks for the first time, you have to be a bit careful.It might seem a little less straightforward so we go over the details, step by step.
Risks of using a public Wi-Fi spot
But not to worry. There are a few steps that you can take to prevent taking unnecessary risks.
Good to hear! Feel free to use public wifi spots that you know are legit. Be sure to remain cautious.
You might wanna check it out
Not to worry, just be critical whenever you are using a wifi network in a public area. If you are at Starbucks and you see a few with the same name then it's best to ask yourself if you really need to be conected right now.
Summary of the chapter
Time for chapter 6: What to do when you get hacked?
You have been made aware of the risks of oversharing information on social media! In the last chapter, we will find out what to do in case you get hacked. Some indicators to see if you have been hacked will be brought to your attention. To top it off, we will discuss how to regain control of your account for each social media. Let’s get started!