Chapter 5: Public profiles & public Wi-Fi

In this chapter, the risks of sharing too much information on your social media profiles will be explained as well as the risks of using common public Wi-Fi spots.

The keyword of this chapter is privacy, because being connected and sharing everything might not always be the best idea.

Social media profiles

Table of content

Select the part you want to go towards or just start straight from the beginning.

1: Social media sharing risks

All the data that you share online can be used against you. Ethical hackers can show us how it’s done (click here for the video’s) Oversharing on social media is quite common nowadays.

All of this free flow of information can be turned against you as the hacker can accumulate all that information and try to answer basic security questions and crack passwords.

Now, what are specific scenarios of risks of oversharing on social media?

Level of detail

As shown with the statistics, with social engineering hackers try to gain a profile out of all the information avaliable of you online. Take a look and try to Google yourself for instance, do you like what you find? Does it say something sensitive about you? Password related, your adress? Answers to security questions?

Where to find you

The fact that you are are on vacation with your friends is not something you like to share publicly all the time. Think about the old-fashioned burglar who just happens to see that? Or if everybody knows you travel on a certain highway to get to your work, you might more prone to react to a false phishing mail saying that you went over the speed limit on that certain highway.

What's most important to you

If you just got into a new job, you are more likely to want to please the boss or any other employee. For example, if one of your colleagues asks if you can buy a present for his/her daughter’s birthday because he didn’t have the time because of X amount of meetings, wouldn’t you want to help out a bit? Hackers know you are inclined to say yes, so please always double-check.

2: How public information can be abused

You might think that this would never happen to you. Sadly, you many victims thought the same.

For this reason, we grouped some videos of victims explaining how they got hacked. In addition, a book example.

3: Risks of careless usage of public Wi-Fi spots

Despite of what you might think, these public wifi-spots at a local store might not always be as convenient. If you enter these networks for the first time, you have to be a bit careful.It might seem a little less straightforward so we go over the details, step by step.


Risks of using a public Wi-Fi spot

But not to worry. There are a few steps that you can take to prevent taking unnecessary risks.

Have you ever thought or heard of these risks before?


Be careful

Good to hear! Feel free to use public wifi spots that you know are legit. Be sure to remain cautious.


You might wanna check it out

Not to worry, just be critical whenever you are using a wifi network in a public area. If you are at Starbucks and you see a few with the same name then it's best to ask yourself if you really need to be conected right now.

Summary of the chapter

Time for chapter 6: What to do when you get hacked?

You have been made aware of the risks of oversharing information on social media! In the last chapter, we will find out what to do in case you get hacked. Some indicators to see if you have been hacked will be brought to your attention. To top it off, we will discuss how to regain control of your account for each social media.  Let’s get started!

What do in case you get hacked