Metadata

4th August 2020 | Cybrary Metadata


metadata cybrary

Metadata is information that describes the characteristics of specific data file or data set. For example, photos often embed metadata within the photo file itself. Photo metadata includes things like the date, time, and location a photo was taken. Sometimes photo metadata includes copyright or licensing information about the image. Metadata is often automatically created by your camera.

Metadata isn’t free from being tampered with. Crafty hackers often edit metadata to hide sensitive information or to improve the “believably” of their phishing schemes. As mentioned in this CyberHoot article, metadata can be modified to trick customers into believing the photo is authentic. Hackers put fake postings onto the Internet for various products.  It’s important to be able to look up metadata to help users investigate potential fraud.  Changing Metadata should not be confused with the more sophisticated technique of hiding data known as Steganography, in which pixels of an image are manipulated systematically to hide data that can be reconstructed if you know the key to doing so.

Sources: NIST, IPTC

Additional Reading: Hackers Latest Scam: Pet Adoptions

Related Terms: Phishing, Social Engineering, Steganography

What does this mean for an SMB?

Metadata may not directly affect your business operations, although it can be beneficial to your employees and clients. Educating staff and clients on cybersecurity awareness can reduce the chances of them becoming victim to attacks leveraging metadata for simulated authenticity. It’s equally important for users to understand the importance of metadata and how it can be used.  For example, insurance underwriters can use the geolocation tags for legal proof of a photo’s authenticity.
 

Metadata should be used to validate online product purchases, especially when buying from potentially insecure sites (craigslist, pet adoption site, etc). Oftentimes, photos are sent to prospective buyers considering purchasing the product. These photos are generally sent via email, but also to mobile devices directly. When inspecting photos that are sent to you, there are a few things that you should be doing:

  • Check the MetaData of the photo – Timestamp and GPS (if taken on GPS-enabled device) of photo
      • MetaData2Go.com is a free online tool
      • Right click and select “Inspect” if you are on a Mac to retrieve the MetaData
      • Right click and select “Properties” if you are on a PC to retrieve the MetaData
          • Review the results to determine if the photo matches up with details from the seller (ex: GPS: Kentucky, Seller: Florida)
  • Do a reverse image search on Google
      • Right click on the photo and select “Search Google for Image”
      • Review the results to see if the photo sent to you has appeared anywhere else on the Internet
          • If the photo appears elsewhere you’re likely dealing with fraud

If any of these metadata tags have been removed, modified or seem suspicious, move on to some other product vendor. It’s not worth the risk of purchasing fraudulent goods or services online.

To learn more about Metadata, watch this short 2 minute video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more
Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more