LinkedIn is a social network for finding and getting jobs. There you can get information about job offers related to your field of interest and vacancies available in local businesses or large companies.

The application is alsoe allows recruiters to analyze the profile of people applying for positions at the companies they represent We enter the selection process with the candidates most suitable for the position offered.

While it is true that the platform is a great alternative to research the labor market and get the possibility of even finding your dream job by chance, Trendy cybercriminals are not exempt from this situation, as they wait for any carelessness on the part of users.

(You may be interested in: The company in Canada offers remote work: they pay up to 135 thousand per hour).

Since users must share some of their personal data, names, emails and other information so that companies can analyze their profiles, digital criminals have found a way to exploit this data.

According to José Luis Benitez, head of information security at ‘Xcapit’ Thieves expect users to fall for different types of scams To steal their victims’ data.

“Who knows if your email account or the accounts of people you interact with every day are under the scrutiny of someone who does not know your identity or the identity of your loved ones and is still waiting for a chance for your information to fall into their hands? There are traps,” the expert says on his LinkedIn account.

Digital criminals have a variety of methods of operation, including ‘Web Crawlers’, a web crawler that inspects pages and collects profile data by systematically exploring platforms. This information can be used to deceive users and even attack companies.

(Continue reading: How to use AI to create a good bio on Linkedin.)

These cybercriminals first conduct a study on the target profile to know: their interests, the environments in which they act, their connections or the company they work for, among other details.

Whether it’s access to a list of employees or a supply chain where the same employees’ connections to potential suppliers and business partners can be examined, both options make data vulnerable to this tracking system, according to software company ESET. cyber security.

(

NATHALIA GÓMEZ PARRA
DIGITAL COVERAGE EDITORIAL
TIME

Source: Exame

Previous articleSwitch 2 coming out in 2024? The President of Nintendo America responds
Next articleVideo: Shocking motorcycle crash in middle of Llano road tunnel

LEAVE A REPLY

Please enter your comment!
Please enter your name here