Search, tagging and comments on social media are exploited by predators to harvest children’s data without direct contact, says a cybersecurity expert