decoding galvin

Special

Symantec: Top 5 Social Media Attacks in 2013


Be street smart on social media with Norton by Symantec

Sharing-on-social-media-helps-hackers-sharpen-spear-phishing-attacks-they-use-to-trick-their-way-into-computers-AFP

While social networks play an important part in my life, it could also potentially destroy my life. Today, there are hundreds of social networking sites that connect us in ways that were never even thought of a decade ago. While social networks are a great way to keep in touch with friends and family, they can also be used against us. By being just a little conscious of what personal information gets out to other people can be very instrumental in keeping our important information safe and private, where it belongs.

As we welcome 2014, learn how to stay vigilant and protect yourself on social networks. Knowing the common social media attacks will help us to know what to look out for. The following are the Top 5 Social Media Attacks in 2013 and a description of what they are.

Top 5 Social Media Attacks, 2013 (Source: Symantec)

Fake Offering.
These scams invite social network users to join a fake event or group with
incentives such as free gift cards. Joining often requires the user to share credentials with
the attacker or send a text to a premium rate number.

Fake Plug-in Scams.
Users are tricked into downloading fake browser extensions on their machines. Rogue browser extensions can pose like legitimate extensions but when installed can steal sensitive information from the infected machine.

Likejacking.
Using fake “Like” buttons, attackers trick users into clicking website buttons that install malware and may post updates on a user’s newsfeed, spreading the attack.

Fake Apps.
Applications provided by attackers that appear to be legitimate apps; however, they contain a malicious payload. The attackers often take legitimate apps, bundle malware with them, and then re-release it as a free version of the app.

Manual Sharing Scams.
These rely on victims to actually do the hard work of sharing the scam by presenting them with intriguing videos, fake offers or messages that they share with their friends.

Capture

Protect yourself from social media traps with these simple steps
Here are a few simple tips you can follow to protect yourself on social networks:

  • Be Discrete: Be careful of what you post in your profile page, a forum, instant message, or any form of electronic communication to help thwart possible ID theft of other forms of malicious threats. Stuff like personal and business names, addresses, phone numbers, birth dates etc. are potentially dangerous to have fully exposed. Be more general in your posts/information making it harder for someone to potentially use the information against you.
  • Skepticism is your friend: While social network sites have tons of useful and useless information, it is important that you keep a high level of skepticism. People often lie for their own gain, or just spout rubbish out of ignorance.
  • Think Before You Speak You Mind: Although the internet does provide a small level of anonymity things can sometimes come back and bite you in the rear. This includes anything from obscenity, insults, or wild statements. Be chill, be professional. Simply put, think before you type.
  • Professionalism is your friend: Everything you put online including the photos, videos and status updates are there for the world to see. Only post information that you don’t mind people knowing. Besides cyber thieves, often university admissions teams and potentials employers will look at your social networking profile to find out more about you. So be sensible and professional.
  • Be Vigilant: Well ever think if that person you’re talking to is who they say they are? People aren’t always who they say they are. And until you can somehow verify the information they give you, never reveal any personal, financial, or business information.
  • Check Your Privacy Settings: Social networks have sometimes been notorious for allowing others to see your information, even if they are not your “friend”. However, they will also have available their privacy guidelines/rules. Review the privacy settings and restrict the access to your personal information.
  • Beware of fake invitations: Beware of fake invitations on social media. Do not accept invitations to events with incentives such as free gifts on social networks. Joining usually requires personal and credit information, which could open you up to fraud or attacks.

 

[Photo source: RawStory.com]



Related Posts with Thumbnails




Tagged ,

Share this post:

About Galvin Tan

A creative professional and social media junkie, Galvin Tan has been blogging since 2005 and he writes about everything from food to gadget. An avid fan of football and loves playing foosball and basketball. For latest updates, follow him @galvintan on Twitter.

View all posts by Galvin Tan →

Related Posts

Facebook comments:

1 comments
Epicbeaverinstagram
Epicbeaverinstagram

In order to make the launch successfuly our website is designed and developed it works smoothly content has been added, when it comes to launch your website in this article were going to cover some of buy instagram followers the most buy instagram followers things buy instagram likes that everyone should keep in mind and consider before they launch their website for the first time.

Our Sponsors
Post Calendar
March 2014
M T W T F S S
« Feb   Jun »
 12
3456789
10111213141516
17181920212223
24252627282930
31  
Follow Me on Imotiv.ly
LIKE IT!
Latest Comment
  • TeryAlBartaz: http://www.spesialisobatherbal.com/obat-sakit-kepala-berkepanjangan/ View Post