<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>protect from OSINT Archives - Demysti5</title>
	<atom:link href="https://demysti5.com/tag/protect-from-osint/feed/" rel="self" type="application/rss+xml" />
	<link>https://demysti5.com/tag/protect-from-osint/</link>
	<description>Your Personal Online Safety Guide</description>
	<lastBuildDate>Sun, 22 Jun 2025 03:09:41 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.3.8</generator>

<image>
	<url>https://demysti5.com/media/2022/08/Untitled-design-22.png</url>
	<title>protect from OSINT Archives - Demysti5</title>
	<link>https://demysti5.com/tag/protect-from-osint/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How Hackers Use OSINT to Target You: Real Examples and How to Stay Safe</title>
		<link>https://demysti5.com/how-hackers-hack-you/</link>
					<comments>https://demysti5.com/how-hackers-hack-you/#respond</comments>
		
		<dc:creator><![CDATA[Demysti5]]></dc:creator>
		<pubDate>Thu, 19 Jun 2025 02:54:46 +0000</pubDate>
				<category><![CDATA[Personal Threat Intelligence]]></category>
		<category><![CDATA[how attackers use OSINT]]></category>
		<category><![CDATA[open source intelligence threats]]></category>
		<category><![CDATA[OSINT for cyber attacks]]></category>
		<category><![CDATA[protect from OSINT]]></category>
		<category><![CDATA[public data hacker tactics]]></category>
		<guid isPermaLink="false">https://demysti5.com/?p=8123</guid>

					<description><![CDATA[<p><span class="rt-reading-time" style="display: block;"><span class="rt-label rt-prefix">Reading Time: </span> <span class="rt-time">2</span> <span class="rt-label rt-postfix">minutes</span></span> Learn how attackers use OSINT (Open Source Intelligence) to target individuals, and discover simple steps to protect yourself from public data exploitation.</p>
<p>The post <a href="https://demysti5.com/how-hackers-hack-you/">How Hackers Use OSINT to Target You: Real Examples and How to Stay Safe</a> appeared first on <a href="https://demysti5.com">Demysti5</a>.</p>
]]></description>
										<content:encoded><![CDATA[<span class="rt-reading-time" style="display: block;"><span class="rt-label rt-prefix">Reading Time: </span> <span class="rt-time">2</span> <span class="rt-label rt-postfix">minutes</span></span><div class="wp-block-post-date__modified-date custPostDateBlog wp-block-post-date"><time datetime="2025-06-22T03:09:41+00:00">June 22, 2025</time></div>


<h2 class="wp-block-heading">What Is OSINT (Open Source Intelligence)?</h2>



<p>OSINT stands for <strong>Open Source Intelligence</strong>, which refers to collecting information from <strong>publicly accessible sources</strong> — like social media, blogs, websites, forums, and even search engines.</p>



<p>Attackers use OSINT to create detailed profiles of their targets, which helps them carry out phishing, identity theft, stalking, or even physical crimes.</p>



<h2 class="wp-block-heading">Why It Matters</h2>



<p><strong>You don’t need to be famous to be targeted.</strong> Anyone with a digital presence is vulnerable. Attackers use OSINT to:</p>



<ul>
<li>Find your email, phone number, address</li>



<li>Learn about your job, family, and habits</li>



<li>Craft convincing fake messages (&#8220;Hi, I’m from your gym…&#8221;)</li>



<li>Bypass security questions (mother’s maiden name, pet’s name, etc.)</li>
</ul>



<h2 class="wp-block-heading">Real Examples of OSINT Attacks</h2>



<ul>
<li><strong>Social Media Oversharing:</strong> A hacker followed a public Instagram account to learn a woman’s routine, then called pretending to be from her child’s school.</li>



<li><strong>Data Broker Leaks:</strong> Using leaked phone numbers and names from public databases, attackers created phishing texts that included the victim’s address.</li>



<li><strong>LinkedIn Exploits:</strong> Attackers impersonated recruiters using job and work history scraped from LinkedIn.</li>
</ul>



	<div class="RelatedArticalMn inSingleBlogUsed">
		<div class="RelatedArticalTtl" style="justify-content: left;"><h3>Also Read</h3></div>
		<div class="RelatedArticalGrd">
				<div class="blog-slider-item">
			<div class="blog-slider-img">
				<a href="https://demysti5.com/how-to-verify-an-email-address-phishing/">
						
						<img src="https://demysti5.com/media/2025/02/Purple-Pink-Gradient-Minimalist-How-to-Blog-Banner-94.png">
									</a>
			</div>
			<div class="blog-slider-content">
				<h4><a href="https://demysti5.com/how-to-verify-an-email-address-phishing/">How to Verify an Email Address &#8211; Phishing</a></h4>
				<ul>
											<li>Published on: <span>February 13, 2025</li></span> 				</ul>
			</div>
		</div>
				<div class="blog-slider-item">
			<div class="blog-slider-img">
				<a href="https://demysti5.com/how-to-verify-email-body-for-phishing-scams/">
						
						<img src="https://demysti5.com/media/2025/02/Purple-Pink-Gradient-Minimalist-How-to-Blog-Banner-93.png">
									</a>
			</div>
			<div class="blog-slider-content">
				<h4><a href="https://demysti5.com/how-to-verify-email-body-for-phishing-scams/">How to Verify Email Body for Phishing Scams</a></h4>
				<ul>
											<li>Published on: <span>February 13, 2025</li></span> 				</ul>
			</div>
		</div>
				</div>
	</div>
	



<h2 class="wp-block-heading">How Attackers Gather OSINT</h2>


<p><iframe style="border: 0; min-height: 640px;" src="https://scribehow.com/embed/How_Attackers_Use_OSINT_Open_Source_Intelligence_to_Target_Individuals__VfsFbQoZRT2i3cuutFDdCQ?as=scrollable" width="100%" height="800"></iframe></p>
<h2 data-start="2514" data-end="2543">What It Protects Against</h2>
<p data-start="2544" data-end="2602">Learning how OSINT is used against you protects against:</p>
<ul data-start="2603" data-end="2766">
<li data-start="2603" data-end="2636">
<p data-start="2605" data-end="2636"><strong data-start="2605" data-end="2634">Phishing &amp; Spear Phishing</strong></p>
</li>
<li data-start="2637" data-end="2666">
<p data-start="2639" data-end="2666"><strong data-start="2639" data-end="2664">Stalking &amp; Harassment</strong></p>
</li>
<li data-start="2667" data-end="2689">
<p data-start="2669" data-end="2689"><strong data-start="2669" data-end="2687">Identity Theft</strong></p>
</li>
<li data-start="2690" data-end="2729">
<p data-start="2692" data-end="2729"><strong data-start="2692" data-end="2727">Business Email Compromise (BEC)</strong></p>
</li>
<li data-start="2730" data-end="2766">
<p data-start="2732" data-end="2766"><strong data-start="2732" data-end="2764">Doxxing &amp; Social Engineering</strong></p>
</li>
</ul>
<h2 data-start="2768" data-end="2820">How to Protect Yourself from OSINT Exploitation</h2>
<h3 data-start="2822" data-end="2857">1. <strong data-start="2829" data-end="2855">Lock Down Social Media</strong></h3>
<ul data-start="2858" data-end="3019">
<li data-start="2858" data-end="2885">
<p data-start="2860" data-end="2885">Set profiles to private</p>
</li>
<li data-start="2886" data-end="2933">
<p data-start="2888" data-end="2933">Remove birthdate, school info, phone number</p>
</li>
<li data-start="2934" data-end="2973">
<p data-start="2936" data-end="2973">Avoid location tagging in real-time</p>
</li>
<li data-start="2974" data-end="3019">
<p data-start="2976" data-end="3019">Don’t post your child’s school or routine</p>
</li>
</ul>
<h3 data-start="3021" data-end="3072">2. <strong data-start="3028" data-end="3070">Use Alias or Pseudonyms Where Possible</strong></h3>
<ul data-start="3073" data-end="3198">
<li data-start="3073" data-end="3149">
<p data-start="3075" data-end="3149">Use separate emails for different purposes (shopping, banking, personal)</p>
</li>
<li data-start="3150" data-end="3198">
<p data-start="3152" data-end="3198">Avoid using your full name everywhere online</p>
</li>
</ul>
<h3 data-start="3200" data-end="3238">3. <strong data-start="3207" data-end="3236">Regularly Google Yourself</strong></h3>
<p data-start="3239" data-end="3327">Search your name + city, name + email, and check images to see what’s publicly exposed</p>
<h3 data-start="3329" data-end="3370">4. <strong data-start="3336" data-end="3368">Opt Out of Data Broker Sites</strong></h3>
<p data-start="3371" data-end="3541">Visit sites like <a class="cursor-pointer" target="_new" rel="noopener" data-start="3388" data-end="3446">https://optout.prescott.dev</a> or <a class="" href="https://joindeleteme.com" target="_new" rel="noopener" data-start="3450" data-end="3502">https://joindeleteme.com</a> to remove your info from aggregators</p>
<h3 data-start="3543" data-end="3578">5. <strong data-start="3550" data-end="3576">Be Mindful of Metadata</strong></h3>
<p data-start="3579" data-end="3680">Strip metadata from photos before uploading — use tools like <a class="" href="https://exifcleaner.com" target="_new" rel="noopener" data-start="3640" data-end="3678">ExifCleaner</a></p>
<h3 data-start="3682" data-end="3717">6. <strong data-start="3689" data-end="3715">Think Like an Attacker</strong></h3>
<p data-start="3718" data-end="3832">Try to build a profile of yourself using only public data — whatever you find is what others can use against you</p>
<h2 data-start="3834" data-end="3869">Recommended Tools and Services</h2>
<ul data-start="3870" data-end="4132">
<li data-start="3870" data-end="3937">
<p data-start="3872" data-end="3937"><strong data-start="3872" data-end="3884">DeleteMe</strong> – removes your data from 750+ data broker websites</p>
</li>
<li data-start="3938" data-end="3995">
<p data-start="3940" data-end="3995"><strong data-start="3940" data-end="3955">ExifCleaner</strong> – strips identifying data from photos</p>
</li>
<li data-start="3996" data-end="4071">
<p data-start="3998" data-end="4071"><strong data-start="3998" data-end="4039">Firefox with Multi-Account Containers</strong> – separates online identities</p>
</li>
<li data-start="4072" data-end="4132">
<p data-start="4074" data-end="4132"><strong data-start="4074" data-end="4091">Google Alerts</strong> – set up alerts for your name or email</p>
</li>
</ul>


<p><img src="https://s.w.org/images/core/emoji/14.0.0/72x72/1f6e1.png" alt="🛡" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Explore More on Demysti5</strong><br>Want to dive deeper into personal online safety? <a class="" href="https://demysti5.com/">Demysti5</a> offers tailored guides and tools for everyone—from <a class="" href="https://demysti5.com/cyber-safety-for-parents-and-families/">parents and families</a>, <a class="" href="https://demysti5.com/cyber-safety-for-students-and-young-adults/">students</a>, and <a class="" href="https://demysti5.com/cyber-safety-for-senior-citizerns/">senior citizens</a> to <a class="" href="https://demysti5.com/cyber-safety-for-remote-workers-and-freelancers/">remote workers</a>, <a class="" href="https://demysti5.com/cyber-safety-for-job-seekers/">job seekers</a>, and <a class="" href="https://demysti5.com/cyber-safety-for-hnwi/">high net worth individuals</a>.</p>



<p>You can also:</p>



<ul>
<li><a class="" href="https://demysti5.com/cyber-defense/">Check your Online Safety Score</a></li>



<li><a class="" href="https://demysti5.com/cyber-advice/">Get practical Cyber Advice</a></li>



<li><a class="" href="https://demysti5.com/cyber-habits-rewards/">Adopt Secure Habits</a> to protect your digital life</li>



<li>Explore <a class="" href="https://demysti5.com/cyber-safety-business/">Cyber Safety for Business</a> and <a class="" href="https://demysti5.com/cyber-safety-for-colleges/">Colleges</a></li>



<li><a class="" href="https://demysti5.com/spread-the-word/">Spread the Word</a> to help others stay secure</li>



<li>Read the latest on the <a class="" href="https://demysti5.com/news">Demysti5 Blog</a></li>



<li><a class="" href="https://app.demysti5.com">Access the Web App</a> to track your cyber safety progress and complete personalized tasks</li>



<li><a class="" href="https://demysti5.com/download-demysti5-online-safety-app/">Download the Android App</a> or <a class="" href="https://play.google.com/store/apps/details?id=com.demysti.app">get it on Google Play</a></li>



<li>Follow Demysti5 on <a class="" href="https://www.facebook.com/people/Demysti5/100091226075937/">Facebook</a> and <a class="" href="https://www.youtube.com/channel/UCAF_CKt436MgwhhXSrIacpQ">YouTube</a></li>
</ul>



<p>Stay informed. Stay protected. Demysti5 it.</p>
<p>The post <a href="https://demysti5.com/how-hackers-hack-you/">How Hackers Use OSINT to Target You: Real Examples and How to Stay Safe</a> appeared first on <a href="https://demysti5.com">Demysti5</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://demysti5.com/how-hackers-hack-you/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
