ALL >> Computers >> View Article
Security Experts Warn Users On Twitter Account Suspension Scam
Recently, security researchers at Internet security firm Sophos identified an account suspension scam on Twitter. Internet users receive an e-mail, which appears to arrive from Twitter. The e-mail seeks users to re-verify their Twitter account within two days to avoid suspension. The e-mail also attempts to lure users to click on the e-mail by offering free offers. The e-mail reportedly carries an embedded image, which if clicked redirects Internet users to survey pages. The survey pages seek personally identifiable information from Internet users. Cybercriminals may use the collected information for fraudulent purposes.
Social media sites are growing in popularity as a convenient medium to connect, interact and collaborate. People share loads of personal information including photos on social networking and micro blogging sites such as Facebook and Twitter. People also share professional information on professional networking sites such as Linkedin. As such, these sites become a favorite hunting ground for perpetrators of crime. The ease with which, cybercriminals are able to defraud users has raised concerns regarding ...
... information confidentiality, integrity and availability.
In the latest attack, perpetrators apparently spoofed the e-mail to make it appear as coming from Twitter admin. Usually, legitimate companies do not seek confidential details through e-mail. Internet users must be cautious of e-mails seeking personal and financial information, redirecting to surveys or asking to download anti-virus software. Internet users must directly visit a legitimate site by typing the URL on the address bar. When Internet users are redirected to a site, which resembles a site of a legitimate company, they must check for spelling mistakes, prefixes and suffixes attached to the web address to confirm the authenticity of the website. Users of social media sites must adjust their privacy settings to prevent access of personal information to people other than those users intend to share. IT professionals must keep themselves updated on the evolving security scenario and security mechanisms through attending seminars, workshops and undertaking online university degree programs.
Attackers use diverse ways to attempt and defraud Internet users. Social engineering is one of the techniques used to deceive users. Both insiders as well as external agents may use social engineering techniques to extract confidential information. Attackers are increasingly using spear phishing techniques to extract confidential information from business organizations. Information security is crucial for retaining customer loyalty and continued business activities. Training sessions, mandatory e-learning and online degree may help employees in understanding security fundamentals. Organizations must also keep employees updated on latest security threats, and best practices.
Professionals qualified in masters of security science and security certification programs may help in proper evaluation of the security threats, implementation of new monitoring mechanisms, application of patches and software updates, and improving security practices in an organization. Proactive approach to cyber security may help in reducing security and data breach incidents in an organization.
Adherence to recommended cyber security practices, regular software updates, following security blogs, and alerts issued by vendors, government bodies and computer emergency response teams may help in strengthening the defenses against numerous Internet-based threats.
Add Comment
Computers Articles
1. Exploring How Ai In The Cloud Can Transform Your BusinessAuthor: TechDogs
2. The Power Of Cloud And Ai: A New Era Of Collaboration
Author: TechDogs
3. Get Business Insights Using Expedia & Booking. Com Review Data Scraping
Author: DataZivot
4. Top 10 Reasons A Strong Communication Strategy Drives Prm Program Success
Author: Archi
5. Achieve Scalable Web Scraping With Aws Lambda
Author: Devil Brown
6. Overcoming Common Challenges In Iso 27001 Implementation
Author: Jenna Miller
7. Basic Computer Course: Your Gateway To Skill Development | The Institute Of Professional Accountants
Author: Tipa Institute
8. Top 7 Advantages Of React Js
Author: Bella Stone
9. Top 7 App Marketing Tools For Mobile Success
Author: Bella Stone
10. Revolutionizing Education Management With Samphire It Solution Pvt Ltd’s Erp Software
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD
11. Top 10 Healthcare Technology Trends
Author: goodcoders
12. "building Tomorrow’s Factories: The Role Of Automation & Robotics In Modern Manufacturing"
Author: andrew smith
13. The Ultimate Guide To The Best Ecommerce Plugin For Wordpress
Author: Rocket Press
14. Xsosys Erp: A Scalable Solution For Businesses In Any Industry
Author: Xsosys Technology(S) Pte. Ltd.
15. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA