Attempt to manipulate outcomes of social behavior through orchestrated actions
Social hacking describes the act of attempting to manipulate outcomes of social behaviour through orchestrated actions. The general function of social hacking is to gain access to restricted information or to a physical space without proper permission. Most often, social hacking attacks are achieved by impersonating an individual or group who is directly or indirectly known to the victims or by representing an individual or group in a position of authority.[1] This is done through pre-meditated research and planning to gain victims’ confidence. Social hackers take great measures to present overtones of familiarity and trustworthiness to elicit confidential or personal information.[2]
Social hacking is most commonly associated as a component of “social engineering”.
Although the practice involves exercising control over human behaviour rather than computers, the term "social hacking" is also used in reference to online behaviour and increasingly, social media activity. The technique can be used in multiple ways that affect public perception and conversely, increase public awareness of social hacking activity. However, while awareness helps reduce the volume of hacks being carried out, technology has allowed for attack tools to become more sophisticated call details
^"Archived copy" (PDF). Archived from the original (PDF) on April 14, 2014. Retrieved April 3, 2014.{{cite web}}: CS1 maint: archived copy as title (link)
^Hodson, Steve (August 15, 2022). "Never Mind Social Media, How About Social Hacking?". Mashable.
Socialhacking describes the act of attempting to manipulate outcomes of social behaviour through orchestrated actions. The general function of social...
to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques...
Retrieved 2018-12-12. Rogers, David (7 July 2011). "Voicemail Hacking and the 'Phone Hacking' Scandal - How it Worked, Questions to be Asked and Improvements...
who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking. A blue hat hacker is someone outside...
Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security holes in the configuration...
The list of security hacking incidents covers important or noteworthy events in the history of security hacking and cracking. Magician and inventor Nevil...
hack and activism), is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change...
Trinity College. Hacking also earned his PhD at Cambridge (1962), under the direction of Casimir Lewy, a former student of G. E. Moore. Hacking started his...
spirit of playfulness and exploration is termed hacking. However, the defining characteristic of a hacker is not the activities performed themselves (e...
Hacker News (HN) is a social news website focusing on computer science and entrepreneurship. It is run by the investment fund and startup incubator Y Combinator...
component of a larger global hacking community, known as "the Community" or "the Com", itself having members who have hacked major American technology companies...
and in films. Considered a cornerstone of hacker culture, the Manifesto asserts that there is a point to hacking that supersedes selfish desires to exploit...
Social media are interactive technologies that facilitate the creation, sharing and aggregation of content, ideas, interests, and other forms of expression...
the hacking attempts. On the day following the FBI's accusation of North Korea's involvement, the FBI received an email purportedly from the hacking group...
target of a major hacking campaign involving alleged nude photos that have been leaked online. McCormick, Rich (September 1, 2014). "Hack leaks hundreds...
subvertisement can also be referred to as a meme hack and can be a part of socialhacking, billboard hacking or culture jamming. According to Adbusters, a...
their own press. This was a heyday of hacking, at a time before there was much law against computer crime. Hacker groups provided access to information...
"campy hacking" mimics that of films like WarGames (1983) and Jurassic Park (1993). Caldwell, Brendan (September 22, 2016). "Hackmud is an MMO Hacking Sim...
means of gaining information used included hacking the private voicemail accounts on mobile phones, hacking into computers, making false statements to...
BreachForums allows for the discussion of various hacking topics and distributed data breaches, pornography, hacking tools and various other services. On March...
Reality hacker, reality cracker or reality coder may refer to: Reality hacking, any phenomenon that emerges from the nonviolent use of illegal or legally...
Standard, 21 March 2024 "HACKING AT LEAVES – ethnocineca". Retrieved 2024-05-02. "Hacking at Leaves" in: Film Threat, 5 April 2024 "Hacking at Leaves" in: Diagonale...
effect Smear campaign Social data revolution SocialhackingSocial influence bias Social media bias Social media intelligence Social spam Sockpuppet (Internet)...
The Secret History of Hacking is a 2001 documentary film that focuses on phreaking, computer hacking and social engineering occurring from the 1970s through...
includes the following statement: "There is great potential for more than hacking and slashing in D&D or AD&D; there is the possibility of intrigue, mystery...