Family robbed after cash photo posted to Facebook

Powered by SC Magazine
 

Armed men attack home seeking wads of cash.

The family of a 17-year-old girl was robbed after their daughter uploaded a photo of a wad of cash to Facebook.

Two men armed with a knife and a wooden club broke into the Bundanoon home in the NSW Southern Highlands last week demanding to speak with the unnamed girl about the cash.

The girl had helped her grandmother count her life savings in Sydney when she posted the photo of the undisclosed sum of cash to the social media site.

At 11.30pm, seven hours after the photo was uploaded, the men entered the girl’s family residence where she no longer lived.

The men searched the house and stole a small amount of cash. Noone was injured in the incident.

Police inspectors were unanable to disclose how the girls’ family address was known. However, dozens of potential avenues of attack exist.

Facebook promotes location information sharing within profiles and allows users to include address information. But even if such information was withheld, location data could be extracted from geo-tagged photographs.

The dangers of geo-tagged photos was dramatically illustrated when US helicopters located in the Middle East were destroyed after enemy soldiers extracted the data from pictures uploaded by US marines.

Anyone with information is urged to contact Bowral Police Station on 02 4862 9299 or Crime Stoppers on 1800 333 000.

Copyright © SC Magazine, Australia


Family robbed after cash photo posted to Facebook
Tags
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  2%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 725

Vote