Social Media: a hunting ground for cybercriminals
Correlation between Social media means it is an ideal breeding ground for illegal activity,
people are increasingly aware that the “friend” is not so much in fact be their friend.
Internet crime on social networks can be divided into three categories:
Tricks and large conventional invasion,
in an attempt to lure you to click on something or visit the pages that will pay the malicious software on your computer
Find public exposure neglect of personal data
The use of social media as a platform for communication
and exchange of ideas and business information stolen
Malware, and ransomware tricks
The first category is the most prevalent.
“The problem with social media is that people have confidence in the underlying
,” explains Mark James, the security expert with the information technology security firm ESET.
“This is what is going to be exploited by those cybercriminals.”
“People still believe that you have to click on something and upload file to injury,” he says.
“This is really not so anymore.
There are things such as drive by downloads, infected ads and things like that.
It’s very easy to be exposed to danger on your devices.”
“We have the only effective protection is a multi-layered approach,” Mr. James ESET explains.
“There is no one to protect anymore,
and there is no magic bullet or a single piece of software that will protect us.”
While security software is important,
it is only the first step. A cat and mouse game where bad guys produce malware
and the good guys trying to produce the means to stop it
Social media, though, is not just an arena where criminals can steal information.
“Anyone who is just two clicks away from finding the financial statements of risk in social media,” says Gabriel Guzman, head of electronic intelligence in RSA,
the Security Division of EMC technology company
a hunting ground for cybercriminals
In fact doing so from the real squad of their own.”
In Facebook, for example, a quick search for some
credit card details will be in a matter of minutes takes you to the people to provide information stolen.
Social networks provide an ideal infrastructure to contact like-minded individuals, experts say.
“Most of the social networks do not have a verification of identity
and the police have a very difficult process,” explains Bryce Boland,
Chief Technology Officer for Asia and the Pacific FireEye.
Create Profile fake to avoid detection takes a few minutes, locations and social media have inherent interest in keeping simple access.
After all, they want to attract many users as possible.
Most social networks are trying to be strict vigilance against such activity.
But the open nature of the nature of these sites means that the battle between the disclosure and security may be only just beginning.