• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
2B CyberBright

2B CyberBright

Security Awareness Training

  • About
  • Services
    • CyberSecurity Awareness Training
    • Simulated Phishing Attacks
    • Social Media Threat Monitoring
    • Security Consulting Services
  • Training
    • CyberSecurity Awareness Training
    • Course Outline
  • Resources
  • Contact

Glossary of Terms: Types of Social Media Threats

Glossary of Terms:

Types of Social Media Threats

Profile Hacking is what happens when you are not able to log in to your account. Someone has complete control of your account and has changed all the credentials. Facebook is the most hacked social networking site and it generally happens because of the following reasons:

  • Not logging out from the account
  • Sharing passwords or having passwords that are easily predicted
  • Hacking the email with which you login to your Facebook account
  • Logging in through Facebook options for apps

Photo Morphing is a special effect that allows a person to morph or change one image or shape into another without any difficulty. With billions of photos shared every day it’s easy for a hacker to use your images, morph it and then use it for porn sites or blackmailing for financial/sexual gains

Imposter Accounts & Fake News. Imposters and hackers may be operating from a foreign country and thus may not know the native language very well, leading to easily identifiable typos. Hasty efforts to set up accounts or websites may lead to them looking unprofessional or sloppy. Legitimate organizations will want their online presence to look good and free of typos!

Watch out for sensational or outrageous titles. False news relies on catchy titles that pack in a lot of detail to grab readers, possibly for nefarious reasons.

Click Bait Scams. Scammers have started creating intriguing posts to bait consumers into clicking and subsequently falling victim to sharing personal information or downloading malware and viruses.  Once a user clicks the sensational or outlandish link a pop up asks them to “update your video player” or “scan” your computer for possible viruses.

Chain Letters. You’ve likely seen this one before — the dreaded chain letter, “Retweet this and receive good fortune” or outcome. Most often it is a prankster looking for a laugh, or a spammer needing “friends” to hit up later. Many well-meaning people pass these fake claims onto others. Break the chain

Hidden Charges. “What Disney character are you? Find out with our quiz! All of your friends have taken it!” Hmm, this sounds interesting, so you enter your info and cell number, as instructed. You’ve also just unwittingly subscribed to some dubious service that charges $9.95 every month.
As it turns out, that “free, fun service” is neither. Be wary of these bait-and-switch games. They tend to thrive on social sites.

Phishing & Brand Impersonation. Phishing typically involves setting up a website that resembles that of the company whose customers are targeted as part of the phishing attack. The idea is to convince the individuals that the website belongs to the trusted company, such as the person’s bank, so that the victim reveals sensitive information (such as login credentials, credit card information, etc.).

Connected Apps & Permissions. Most companies have applications that are connected to their social media accounts. These may include your listening system, your publishing system, your analytics system, etc. Know that other applications can be in-roads to access, so understanding the security practices around your connected apps is critical. Notice how many apps ask for access to your photos, microphone, camera, location? Take a few minutes to look over the most sensitive permissions and ensure you aren’t handing over too much info.

Cryptomining and digital currency scams. Since 2017 there has been a 400 to 600% increase in the amount ofcryptomining malware being detected globally, the vast majority of which has been found on social media platforms like Twitter, Facebook, Messenger and YouTube. Apps, adverts and links have been the primary delivery mechanism for cryptomining software on social platforms.

Hijacking of Trustworthy Verified Accounts. Hackers take over the verified account. Messages are sent out from the stolen account sabotaging creditability and demanding ransome in cryptocurrency.

Social Media Enabling Traditional Crime. Social media platforms are also hosting a thriving criminal ecosystem for more traditional criminal activity. They serve as a recruitment centre for money mules used for laundering, with posts or adverts offering opportunities to earn large amounts of money in a short time. Reports of a large amounts of drugs like cannabis, GHB and even fentanyl being sold on Twitter, Facebook, Instagram and Snapchat.

Primary Sidebar

Search

Categories

  • Cyber Threats
  • Glossaries of Terms
  • Infographics

Be Aware. Be Safe and Be Informed.

Be CyberBright

Learn More

Footer

Let’s Connect

Follow us on social media.

  • Facebook
  • Instagram
  • LinkedIn
  • Twitter

Join Now

Subscribe to "Bright News" email updates for emerging cybersecurity news.

Copyright © 2022

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptReject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT