12/24/2022 0 Comments F secure mobile securityCybercriminals also use Twitter, along with other social media platforms, to distribute links to malicious sites: so beware of clicking on links in tweets posted by unknown people.”Įmm added the attacks are in part successful due to the diverse amount of data collected and available on Twitter. “Also, check that the certificate for the site is valid using the padlock symbol in the browser. This theft can be a risk if you re-use your passwords across accounts,” said Emm. Cybercriminals will use the same page and graphics to tempt you into entering your credentials. “Previously we have seen phishing domains used where they look fairly close to the domain. Allowing them to steal the users credentials which they can access other accounts with.”Įmm mirrored Gaffney’s argument warning the number of attacks leveraging Twitter is increasing. “Being a widely used tool, hackers will use phishing mails purporting to be from Twitter asking users to change their password. “What is really interesting about twitter is hackers leveraging the platform to commit other attacks,” said Gaffney. Tom Gaffney, security consultant at F-Secure, told Trusted Reviews hackers are increasingly using Twitter as a platform to mount such campaigns. Ultimately, the goal is to steal personal information, including email addresses and passwords, to gain access to their account.” Do hackers target Twitter and if so, do they have any specific attacks? Hackers will try to send public links or direct messages to their intended victim, duping them into logging into fake webpages. “This type of phishing attack is a common security threat used to gain access to Twitter accounts. For instance, a hacker might attempt to gain access to a notable person’s Twitter account, such as Elon Musk,” Demetriades said. Attacks tend to be targeted, with celebrities and public figures becoming common victims of cybercrime on Twitter. “Twitter – like so many other digital platforms – is not immune to threats from hackers. It’s important that you never send personal information over the internet to someone you don’t know. Phishing emails or direct messages are usually fraudulent messages that encourage users to click a link or reply back with sensitive information. “This is particularly worrying for businesses considering over 80% of British and American employees overshare on social media, potentially exposing themselves and their organisation to online fraud, phishing and other cyber-threats,” Emm went on to say.Īnthony Demetriades, vice president at McAfee, told Trusted Reviews this information can then be used to mount targeting phishing attacks. “By giving away too many personal details over Twitter, cybercriminals can use the information to lend credibility to phishing e-mails or to guess the answers to security questions set by your bank, mobile provider, or other online account. It’s not just obvious things such as passwords and bank details, but any personal information that they can aggregate to build up a picture of potential victims,” said Emm. “Cybercriminals thrive on personal details. What are the main risks?ĭavid Emm, principal security researcher at Kaspersky, revealed to Trusted Reviews one of the biggest risk on social media is over sharing information which can be used by criminals to profile potential victims. Twitter was created in 2006, so just two years after Facebook, and in 2020 the site had 186 million users, with the key demographics being people between the ages of 25 and 34. Twitter is a microblogging and social networking site where users interact with each other through direct messaging or through Tweets, which can be seen by other registered users.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |