<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>The Escapist</provider_name><provider_url>https://www.escapistmagazine.com</provider_url><author_name>The_root_of_all_evil Legacy Author</author_name><author_url>https://www.escapistmagazine.com/author/therootofallevil/</author_url><title>"Social Hackers" On The Rise - The Escapist</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="pWEHCh6rZP"&gt;&lt;a href="https://www.escapistmagazine.com/social-hackers-on-the-rise/"&gt;&#x201C;Social Hackers&#x201D; On The Rise&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.escapistmagazine.com/social-hackers-on-the-rise/embed/#?secret=pWEHCh6rZP" width="600" height="338" title="&#x201C;&#x201C;Social Hackers&#x201D; On The Rise&#x201D; &#x2014; The Escapist" data-secret="pWEHCh6rZP" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/*! This file is auto-generated */
!function(c,d){"use strict";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(/[^a-zA-Z0-9]/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),n=d.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),o=new RegExp("^https?:$","i"),l=0;l&lt;n.length;l++)n[l].style.display="none";for(l=0;l&lt;i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute("style"),"height"===t.message){if(1e3&lt;(s=parseInt(t.value,10)))s=1e3;else if(~~s&lt;200)s=200;r.height=s}if("link"===t.message)if(s=d.createElement("a"),a=d.createElement("a"),s.href=r.getAttribute("src"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener("message",c.wp.receiveEmbedMessage,!1),d.addEventListener("DOMContentLoaded",t,!1),c.addEventListener("load",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf("MSIE 10"),a=!!navigator.userAgent.match(/Trident.*rv:11\./),i=d.querySelectorAll("iframe.wp-embedded-content"),n=0;n&lt;i.length;n++){if(!(r=(t=i[n]).getAttribute("data-secret")))r=Math.random().toString(36).substr(2,10),t.src+="#?secret="+r,t.setAttribute("data-secret",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute("security"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:"ready",secret:r},"*")}}}}(window,document);
&lt;/script&gt;
</html><description>According to Trend Micro, an internet security firm, more than 40% of teens are &#x201C;social hackers&#x201D;. The idea of a hacker as being a solitary geek in their parents&#x2019; basement has long been pushed to one side, but the new generation of hackers probably wouldn&#x2019;t know a shell script from a sea shell. The &#x201C;new&#x201D; idea of &#x201C;social hacking&#x201D; is that many social details are on view via social networking sites such as Facebook. A competent social hacker can find information which tends to give away security question answers. So that rather than rummaging through dustbins for passwords, social hackers [&hellip;]</description><thumbnail_url>http://cdn.themis-media.com/media/global/images/galleries/display/56/56221.jpg</thumbnail_url></oembed>
