Typical Social Media Scams and How Not to Fall for Them [video]
Your data and information does not expire. Once cybercriminals have access to your full name, phone number, picture, email address, home address, location, or a combination of these, who knows what they can do with
Personal details such as these are the low-hanging fruits cybercriminals like to pick from social media users. Scams abound in social media channels because the bad guys are in touch with how people use it. Most users are fond of using social media to get updates on their contacts, local news, and current events. Social media has become so popular that cybercriminals have developed a taste for it.
Just recently, a new phishing technique has been discovered targeting online shoppers, and it could gain ground now that the holiday shopping season is near. Known as Operation Huyao (Chinese for monstrous fox), this method redirects online shoppers to fake copies of the checkout pages on shopping sites, making it difficult to spot the scam. It eventually tricks you into giving them your payment details. Among the many online channels Huyao operators use to lure people are social media sites.
A typical social media scam is motivated either by the bad guys wanting to take control of your accounts to use it for spam or get you to release personal payment details. They try to recreate the look and feel of popular social media sites or create seemingly normal social posts to appear harmless. They also try to make it seem as though they offer exclusive content you can take advantage of. With clickbait titles that entice users with sales and discounts, promise of the latest global news, faux celebrity deaths and scandals, and more, they can get anyone to click on their links and or share them to others.
Unsuspecting users are sure victims of social media scams that circulate online. How can you make sure that you don’t fall for them? You first have to make sure you know how to spot them. In case you spot seemingly outrageous offers online, such as customized social media settings, check with the service provider or social media provider first. It wouldn’t hurt to check as opposed to the alternative. There are also other ways to ensure you can stay safe.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
- Ransomware Spotlight: Trigona
- Steering Clear of Security Blind Spots: What SOCs Need to Know
- Understanding the Kubernetes Security Triad: Image Scanning, Admission Controllers, and Runtime Security
- Preempting Threats to Connected Cars: The Importance of Cybersecurity in a Data-Driven Automotive Ecosystem
- Your Stolen Data for Sale