Metadata

4th August 2020 | Cybrary Metadata


metadata cybrary

Metadata is information that describes the characteristics of specific data file or data set. For example, photos often embed metadata within the photo file itself. Photo metadata includes things like the date, time, and location a photo was taken. Sometimes photo metadata includes copyright or licensing information about the image. Metadata is often automatically created by your camera.

Metadata isn’t free from being tampered with. Crafty hackers often edit metadata to hide sensitive information or to improve the “believably” of their phishing schemes. As mentioned in this CyberHoot article, metadata can be modified to trick customers into believing the photo is authentic. Hackers put fake postings onto the Internet for various products.  It’s important to be able to look up metadata to help users investigate potential fraud.  Changing Metadata should not be confused with the more sophisticated technique of hiding data known as Steganography, in which pixels of an image are manipulated systematically to hide data that can be reconstructed if you know the key to doing so.

Sources: NIST, IPTC

Additional Reading: Hackers Latest Scam: Pet Adoptions

Related Terms: Phishing, Social Engineering, Steganography

What does this mean for an SMB?

Metadata may not directly affect your business operations, although it can be beneficial to your employees and clients. Educating staff and clients on cybersecurity awareness can reduce the chances of them becoming victim to attacks leveraging metadata for simulated authenticity. It’s equally important for users to understand the importance of metadata and how it can be used.  For example, insurance underwriters can use the geolocation tags for legal proof of a photo’s authenticity.
 

Metadata should be used to validate online product purchases, especially when buying from potentially insecure sites (craigslist, pet adoption site, etc). Oftentimes, photos are sent to prospective buyers considering purchasing the product. These photos are generally sent via email, but also to mobile devices directly. When inspecting photos that are sent to you, there are a few things that you should be doing:

  • Check the MetaData of the photo – Timestamp and GPS (if taken on GPS-enabled device) of photo
      • MetaData2Go.com is a free online tool
      • Right click and select “Inspect” if you are on a Mac to retrieve the MetaData
      • Right click and select “Properties” if you are on a PC to retrieve the MetaData
          • Review the results to determine if the photo matches up with details from the seller (ex: GPS: Kentucky, Seller: Florida)
  • Do a reverse image search on Google
      • Right click on the photo and select “Search Google for Image”
      • Review the results to see if the photo sent to you has appeared anywhere else on the Internet
          • If the photo appears elsewhere you’re likely dealing with fraud

If any of these metadata tags have been removed, modified or seem suspicious, move on to some other product vendor. It’s not worth the risk of purchasing fraudulent goods or services online.

To learn more about Metadata, watch this short 2 minute video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

CyberHoot Newsletter – June 2025

CyberHoot Newsletter – June 2025

CyberHoot June Newsletter: Stay Informed, Stay Secure Welcome to the June edition of CyberHoot’s newsletter,...

Read more
Make Phishing Training Count with HootPhish

Make Phishing Training Count with HootPhish

Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...

Read more
Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...

Read more