Social Media Network Harvesting: Some considerations
Threat actors harvest email addresses, identification numbers, user name/password combinations, credit card information, health information and other personally identifiable information for nefarious purposes. This practice is what we are calling…