Social Media Threats

Phishers Padding URLs with Hyphens to Aim at Facebook Users

Phishers Padding URLs with Hyphens to Aim at Facebook Users

Phishers are sending Facebook users fake login pages with URLs they’ve padded with hyphens, a trick which makes the sites look legitimate on mobile devices. The attack works by sending a real, legitimate domain within a larger URL that’s fake. Not so easy to spot the difference from the real Facebook mobile sign-in page, is it? Not only that, but the attackers include a work like...

Social Media Users Risking Identity Theft by Leaving Profiles Unlocked

Social Media Users Risking Identity Theft by Leaving Profiles Unlocked

A third of Scots leave their social media profiles open, allowing strangers to see their private information, a report from Experian has revealed. Furthermore, one in four admit to writing down their passwords, either on a piece of paper or on a note on their phone, not thinking about the increased risk of those passwords falling into the wrong hands. Phil Rance, director of identity products at...

Find Out if Your Favorite Messaging App Is Secure

Find Out if Your Favorite Messaging App Is Secure

Here are four benchmarks to evaluate the security of your favorite app: 1) Encryption: The most secure apps are those that use end-to-end encryption (E2EE). The current golden standard of end-to-end encryption is the Open Whisper Systems Signal Protocol used by Signal app. Facebook Messenger, WhatsApp and Telegram also use this protocol; 2) Open-source: Open-sourcing an application doesn’t make...

Addressing the Myths Surrounding Cyberbullying

Addressing the Myths Surrounding Cyberbullying

Cyberbullying Myths: Myth #1) Bullying, whether done face-to-face or online, only negatively affects the target: Several medical studies have shown both the offended and the offender experience emotional, physical, and social issues; Myth #2) Only kids and teens experience cyberbullying: According to a survey conducted by the Pew Research Center, 40% of adults in the United States have...

Now You Can Buy Instagram Likes from a Vending Machine

Now You Can Buy Instagram Likes from a Vending Machine

As Motherboard reports, there is a vending machine in a mall for buying Likes for your Instagram pics which was first spotted by journalist Vasily Sonkin and posted to Twitter by his colleague Alexey Kovalev. Kovalev said these are for real: he’s seen a couple of the machines across town, and he told Motherboard that he’s heard that they can be found in other Russian cities. For the low, low...

Why Is There an Army of Twitter Bots Being Created?

Why Is There an Army of Twitter Bots Being Created?

A security researcher wrote and ran a script that queried Twitter for the last 5,000 accounts to follow the “top 100” Twitter accounts (highest number of followers). The output of that script was a list of roughly 200,000 unique accounts. Of those 200,000, over 20,000 accounts follow 5 or more of the top 100 Twitter accounts. Roughly 8,000 of those 20,000 accounts were created on the 1st of...

From Gaining Control of Full Facebook Account to an Empty Bank Account

From Gaining Control of Full Facebook Account to an Empty Bank Account

How creative can Polish bank robbers get: It all starts with a Facebook account takeover. The source for account credentials can be either malware or phishing and while most users still don’t use 2FA and thieves know how to use socks to spoof user location, the takeover can be easily performed. Once logged into a victim’s account, the thief starts going though chat history to pick further...

Hackers Conceal Cyberattacks in Social Media Posts

Hackers Conceal Cyberattacks in Social Media Posts

While corporations and government agencies around the world are training their staff to think twice before opening anything sent by email, hackers have already moved on to a new kind of attack, targeting social media accounts, where people are more likely to be trusting. Pentagon officials are increasingly worried that state-backed hackers are using social media sites such as Twitter and Facebook...

Pentagon Workers Targeted by Russian Hackers with Malware-Laced Twitter Messages

Pentagon Workers Targeted by Russian Hackers with Malware-Laced Twitter Messages

Russia may have used Twitter as a tool of international espionage. An article published in Time describes an official report that circulated through the intelligence community, claiming agents of the Russian government sent malware-laced Twitter messages to more than 10,000 employees of the US Department of Defense. “Depending on the interests of the targets, the messages offered links to...

Make Your Twitter Safer in Simple Ways

Make Your Twitter Safer in Simple Ways

It turns out that an activity from over five years ago is compromising many people’s Twitter accounts. In Twitter’s first few years, third-party apps were used to analyze tweet views, automatically tweet messages or find followers. But Twitter themselves now offer similar services. The problem though is that many people downloaded these third-party apps years ago and have completely forgotten...

Social Media Emerging as Valuable Target Zones in India for Cyber Attackers

Social Media Emerging as Valuable Target Zones in India for Cyber Attackers

A recent report by EY on Cybercrime Incidents in India highlighted how social media was emerging as one of the biggest risk zones from the perspective of cyber attacks, with 90% of the 160 top executives responding to the survey identifying it as a major source of cyber attacks. “Employees post extensive details regarding their work profile on social networking websites. These social media...

What You Should Know about Social Media Scams

What You Should Know about Social Media Scams

The addictive nature of many social networks makes them ideal platforms for various scams, ranging from "fake news" and clickbait headlines to more dangerous links that might direct a victim to a phishing scam. A few common schemes to be on the lookout for are: 1) Angler phishing: Angler phishing exploits the growing use of social media by businesses for customer and technical support. To stay...

Leaked Document Shows How Facebook Can Target Emotionally Needy Teens for Ads

Leaked Document Shows How Facebook Can Target Emotionally Needy Teens for Ads

The Australian got its hands on a Facebook document, dated in 2017, marked as “Confidential: Internal Only,” and authored by two Australian Facebook executives, Andy Sinn and David Fernandez. The report allegedly explained how Facebook could analyze posts, photos and interactions to help determine the emotional states of 6.4M “high schoolers,” “tertiary” students and “young...

Facebook Confesses It Is Being Used as Propaganda Tool by ‘Malicious Actors’

Facebook Confesses It Is Being Used as Propaganda Tool by ‘Malicious Actors’

Facebook is being quietly manipulated by nation states to act as a gigantic “information operations” platform tuned for near-invisible political subversion. Facebook now admits: "Malicious actors engaged in false amplification using inauthentic Facebook accounts to push narratives and themes that reinforced or expanded on some of the topics exposed from stolen data." The way these accounts...

Online Troll: What Is it?

Online Troll: What Is it?

Online trolls are most similar to the playground bullies. These people deliberately provoke arguments and fights on social media and forums, often by saying the most grossly insensitive and offensive things. Often these people are perfectly normal and polite when met “in real life”; but when protected by the anonymity of the Internet, they can be incredibly aggressive. Often they will make...

Facebook Adds New Security Tools, Goes Harder after 'Fake News' Accounts

Facebook Adds New Security Tools, Goes Harder after 'Fake News' Accounts

Facebook is pressing its enforcement against what it calls "information operations" — bad actors who use the platform to spread fake news and false propaganda. The company said Thursday it's adding new technologies to find fake accounts and detect abuse on its platform. The company said it is combating "false amplifiers" of political stances — which can include fake accounts or groups,...

  • More at CNBC
  • |
  • |

Keep yourself updated with the social media hacking and different threats to account security

Cyware provides expertly curated news on the threats emerging from social media. In the present times, social media has emerged as our alter-ego. While, it has made our life easy in many aspects, there are also various security challenges emanating out of social media. Our social media profiles are a treasure trove of data. Our social media accounts can be hacked to steal our personal pictures, videos and other data. Criminals can further use it to blackmail us and make a demand for ransom. Our personal data can also be used to conduct identity theft. Social media is also full of strangers that can have serious implications for our physical security. With the growing user base, the hackers are also finding it easier to spread malware through social media. In such circumstances, it becomes very important for each one of us to maintain security hygiene on social media and be aware of the latest social media threats.