Click me
Transcript

The Geography of Social Media Threats

The Geography of Social Media Threats Scammers and cybercriminals take advantage of the element of trust present on social networking sites. Users' behaviors and the increasing number of social networking site features are giving the bad guys more venues in which to instigate their malicious activities. Wall Posts Users are asked to visit pages to see any of the following: Risk severity Private Messages Interesting photos, especially of themselves "Who viewed by profile?," top Bad Friends followers list, and notifications from fake applications Scammers spoof users' friends or popular entities and craft personalized messages to make them click links or reveal personal information. Malware like KOOBFACE variants create bogus accounts and automatically add people to list of users' friends. Exclusive, never-before- seen videos related to current events Spoofed notifications about security issues Celebrity gossip Wall Posts James • Events John A 1Event Invitaion Robert Bhdays: James, John Amy Winehouse Shocking VideoBefore Deat Exclusive Video -> http://vidfoscandal.con Albert Robert News Feeds Ben Messages 1 hour ago Like. Comment Chris Friends Events fyan Ben SEE WHO VIEWED YOUR PROFILE 3 Paul Horoscopes SHOOTI. I can't believe this really works! Now you really can see who views your profile even you're on private Game requests Ryan Eric 2 hours ago Like. Comment App requests Hello, what arevou doing in this??? LOYno colpment! http://bad.todệtty Dianne • Poker Mop dommenter Albert Mira OHow.commen is your hame Hey, I found a website with your picture on it. LOL. check it out http://bad.lyloh8gt9 Cathy 3huag via twitter Like. Comment Macky Apps Cross-Posts Events Chat Some apps request for access to more personal information than is necessary. Shortened links from other Aug Spammers "invite" targets to events. Regardless of 23 their response, users unwillingly spam the same event to their contacts. social networking sites like Twitter may lead some- where else. Bad contacts can automate replying to users, apart from sending bad links. Tọp 3 Pubļicly Available Personal Information 3 Most Commọn Attacks on Facebook Top 3 Security Risks Social Media Threats Pose to Users Email addresses Likejacking attacks Malware infection Rogue application propagation attacks Hometown Data leakage ! i High school Spam campaigns Unwilling attack participation TREND M ICRO TrendLabs eter o • .. MCC M C The Geography of Social Media Threats Scammers and cybercriminals take advantage of the element of trust present on social networking sites. Users' behaviors and the increasing number of social networking site features are giving the bad guys more venues in which to instigate their malicious activities. Wall Posts Users are asked to visit pages to see any of the following: Risk severity Private Messages Interesting photos, especially of themselves "Who viewed by profile?," top Bad Friends followers list, and notifications from fake applications Scammers spoof users' friends or popular entities and craft personalized messages to make them click links or reveal personal information. Malware like KOOBFACE variants create bogus accounts and automatically add people to list of users' friends. Exclusive, never-before- seen videos related to current events Spoofed notifications about security issues Celebrity gossip Wall Posts James • Events John A 1Event Invitaion Robert Bhdays: James, John Amy Winehouse Shocking VideoBefore Deat Exclusive Video -> http://vidfoscandal.con Albert Robert News Feeds Ben Messages 1 hour ago Like. Comment Chris Friends Events fyan Ben SEE WHO VIEWED YOUR PROFILE 3 Paul Horoscopes SHOOTI. I can't believe this really works! Now you really can see who views your profile even you're on private Game requests Ryan Eric 2 hours ago Like. Comment App requests Hello, what arevou doing in this??? LOYno colpment! http://bad.todệtty Dianne • Poker Mop dommenter Albert Mira OHow.commen is your hame Hey, I found a website with your picture on it. LOL. check it out http://bad.lyloh8gt9 Cathy 3huag via twitter Like. Comment Macky Apps Cross-Posts Events Chat Some apps request for access to more personal information than is necessary. Shortened links from other Aug Spammers "invite" targets to events. Regardless of 23 their response, users unwillingly spam the same event to their contacts. social networking sites like Twitter may lead some- where else. Bad contacts can automate replying to users, apart from sending bad links. Tọp 3 Pubļicly Available Personal Information 3 Most Commọn Attacks on Facebook Top 3 Security Risks Social Media Threats Pose to Users Email addresses Likejacking attacks Malware infection Rogue application propagation attacks Hometown Data leakage ! i High school Spam campaigns Unwilling attack participation TREND M ICRO TrendLabs eter o • .. MCC M C The Geography of Social Media Threats Scammers and cybercriminals take advantage of the element of trust present on social networking sites. Users' behaviors and the increasing number of social networking site features are giving the bad guys more venues in which to instigate their malicious activities. Wall Posts Users are asked to visit pages to see any of the following: Risk severity Private Messages Interesting photos, especially of themselves "Who viewed by profile?," top Bad Friends followers list, and notifications from fake applications Scammers spoof users' friends or popular entities and craft personalized messages to make them click links or reveal personal information. Malware like KOOBFACE variants create bogus accounts and automatically add people to list of users' friends. Exclusive, never-before- seen videos related to current events Spoofed notifications about security issues Celebrity gossip Wall Posts James • Events John A 1Event Invitaion Robert Bhdays: James, John Amy Winehouse Shocking VideoBefore Deat Exclusive Video -> http://vidfoscandal.con Albert Robert News Feeds Ben Messages 1 hour ago Like. Comment Chris Friends Events fyan Ben SEE WHO VIEWED YOUR PROFILE 3 Paul Horoscopes SHOOTI. I can't believe this really works! Now you really can see who views your profile even you're on private Game requests Ryan Eric 2 hours ago Like. Comment App requests Hello, what arevou doing in this??? LOYno colpment! http://bad.todệtty Dianne • Poker Mop dommenter Albert Mira OHow.commen is your hame Hey, I found a website with your picture on it. LOL. check it out http://bad.lyloh8gt9 Cathy 3huag via twitter Like. Comment Macky Apps Cross-Posts Events Chat Some apps request for access to more personal information than is necessary. Shortened links from other Aug Spammers "invite" targets to events. Regardless of 23 their response, users unwillingly spam the same event to their contacts. social networking sites like Twitter may lead some- where else. Bad contacts can automate replying to users, apart from sending bad links. Tọp 3 Pubļicly Available Personal Information 3 Most Commọn Attacks on Facebook Top 3 Security Risks Social Media Threats Pose to Users Email addresses Likejacking attacks Malware infection Rogue application propagation attacks Hometown Data leakage ! i High school Spam campaigns Unwilling attack participation TREND M ICRO TrendLabs eter o • .. MCC M C The Geography of Social Media Threats Scammers and cybercriminals take advantage of the element of trust present on social networking sites. Users' behaviors and the increasing number of social networking site features are giving the bad guys more venues in which to instigate their malicious activities. Wall Posts Users are asked to visit pages to see any of the following: Risk severity Private Messages Interesting photos, especially of themselves "Who viewed by profile?," top Bad Friends followers list, and notifications from fake applications Scammers spoof users' friends or popular entities and craft personalized messages to make them click links or reveal personal information. Malware like KOOBFACE variants create bogus accounts and automatically add people to list of users' friends. Exclusive, never-before- seen videos related to current events Spoofed notifications about security issues Celebrity gossip Wall Posts James • Events John A 1Event Invitaion Robert Bhdays: James, John Amy Winehouse Shocking VideoBefore Deat Exclusive Video -> http://vidfoscandal.con Albert Robert News Feeds Ben Messages 1 hour ago Like. Comment Chris Friends Events fyan Ben SEE WHO VIEWED YOUR PROFILE 3 Paul Horoscopes SHOOTI. I can't believe this really works! Now you really can see who views your profile even you're on private Game requests Ryan Eric 2 hours ago Like. Comment App requests Hello, what arevou doing in this??? LOYno colpment! http://bad.todệtty Dianne • Poker Mop dommenter Albert Mira OHow.commen is your hame Hey, I found a website with your picture on it. LOL. check it out http://bad.lyloh8gt9 Cathy 3huag via twitter Like. Comment Macky Apps Cross-Posts Events Chat Some apps request for access to more personal information than is necessary. Shortened links from other Aug Spammers "invite" targets to events. Regardless of 23 their response, users unwillingly spam the same event to their contacts. social networking sites like Twitter may lead some- where else. Bad contacts can automate replying to users, apart from sending bad links. Tọp 3 Pubļicly Available Personal Information 3 Most Commọn Attacks on Facebook Top 3 Security Risks Social Media Threats Pose to Users Email addresses Likejacking attacks Malware infection Rogue application propagation attacks Hometown Data leakage ! i High school Spam campaigns Unwilling attack participation TREND M ICRO TrendLabs eter o • .. MCC M C The Geography of Social Media Threats Scammers and cybercriminals take advantage of the element of trust present on social networking sites. Users' behaviors and the increasing number of social networking site features are giving the bad guys more venues in which to instigate their malicious activities. Wall Posts Users are asked to visit pages to see any of the following: Risk severity Private Messages Interesting photos, especially of themselves "Who viewed by profile?," top Bad Friends followers list, and notifications from fake applications Scammers spoof users' friends or popular entities and craft personalized messages to make them click links or reveal personal information. Malware like KOOBFACE variants create bogus accounts and automatically add people to list of users' friends. Exclusive, never-before- seen videos related to current events Spoofed notifications about security issues Celebrity gossip Wall Posts James • Events John A 1Event Invitaion Robert Bhdays: James, John Amy Winehouse Shocking VideoBefore Deat Exclusive Video -> http://vidfoscandal.con Albert Robert News Feeds Ben Messages 1 hour ago Like. Comment Chris Friends Events fyan Ben SEE WHO VIEWED YOUR PROFILE 3 Paul Horoscopes SHOOTI. I can't believe this really works! Now you really can see who views your profile even you're on private Game requests Ryan Eric 2 hours ago Like. Comment App requests Hello, what arevou doing in this??? LOYno colpment! http://bad.todệtty Dianne • Poker Mop dommenter Albert Mira OHow.commen is your hame Hey, I found a website with your picture on it. LOL. check it out http://bad.lyloh8gt9 Cathy 3huag via twitter Like. Comment Macky Apps Cross-Posts Events Chat Some apps request for access to more personal information than is necessary. Shortened links from other Aug Spammers "invite" targets to events. Regardless of 23 their response, users unwillingly spam the same event to their contacts. social networking sites like Twitter may lead some- where else. Bad contacts can automate replying to users, apart from sending bad links. Tọp 3 Pubļicly Available Personal Information 3 Most Commọn Attacks on Facebook Top 3 Security Risks Social Media Threats Pose to Users Email addresses Likejacking attacks Malware infection Rogue application propagation attacks Hometown Data leakage ! i High school Spam campaigns Unwilling attack participation TREND M ICRO TrendLabs eter o • .. MCC M C

The Geography of Social Media Threats

shared by rmmojado on Dec 28
311 views
0 shares
0 comments
Scammers and cybercriminals take advantage of the element of trust present on social networking sites. User's behaviours and the increasing number of social networking site features are giving the bad...

Publisher

Trend Micro

Source

Unknown. Add a source

Category

Social Media
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size