123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Security Experts Warn Users On Twitter Account Suspension Scam

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Recently, security researchers at Internet security firm Sophos identified an account suspension scam on Twitter. Internet users receive an e-mail, which appears to arrive from Twitter. The e-mail seeks users to re-verify their Twitter account within two days to avoid suspension. The e-mail also attempts to lure users to click on the e-mail by offering free offers. The e-mail reportedly carries an embedded image, which if clicked redirects Internet users to survey pages. The survey pages seek personally identifiable information from Internet users. Cybercriminals may use the collected information for fraudulent purposes.

Social media sites are growing in popularity as a convenient medium to connect, interact and collaborate. People share loads of personal information including photos on social networking and micro blogging sites such as Facebook and Twitter. People also share professional information on professional networking sites such as Linkedin. As such, these sites become a favorite hunting ground for perpetrators of crime. The ease with which, cybercriminals are able to defraud users has raised concerns regarding ...
... information confidentiality, integrity and availability.

In the latest attack, perpetrators apparently spoofed the e-mail to make it appear as coming from Twitter admin. Usually, legitimate companies do not seek confidential details through e-mail. Internet users must be cautious of e-mails seeking personal and financial information, redirecting to surveys or asking to download anti-virus software. Internet users must directly visit a legitimate site by typing the URL on the address bar. When Internet users are redirected to a site, which resembles a site of a legitimate company, they must check for spelling mistakes, prefixes and suffixes attached to the web address to confirm the authenticity of the website. Users of social media sites must adjust their privacy settings to prevent access of personal information to people other than those users intend to share. IT professionals must keep themselves updated on the evolving security scenario and security mechanisms through attending seminars, workshops and undertaking online university degree programs.

Attackers use diverse ways to attempt and defraud Internet users. Social engineering is one of the techniques used to deceive users. Both insiders as well as external agents may use social engineering techniques to extract confidential information. Attackers are increasingly using spear phishing techniques to extract confidential information from business organizations. Information security is crucial for retaining customer loyalty and continued business activities. Training sessions, mandatory e-learning and online degree may help employees in understanding security fundamentals. Organizations must also keep employees updated on latest security threats, and best practices.

Professionals qualified in masters of security science and security certification programs may help in proper evaluation of the security threats, implementation of new monitoring mechanisms, application of patches and software updates, and improving security practices in an organization. Proactive approach to cyber security may help in reducing security and data breach incidents in an organization.

Adherence to recommended cyber security practices, regular software updates, following security blogs, and alerts issued by vendors, government bodies and computer emergency response teams may help in strengthening the defenses against numerous Internet-based threats.

Total Views: 187Word Count: 508See All articles From Author

Add Comment

Computers Articles

1. Upgrade Your Skills With The Best Business Analytics Courses In Bhopal
Author: Rohan Rajput

2. Virtual Security Guard
Author: james

3. Virtual Guard Fencing
Author: james

4. Exploring The Growth Of Mobile App Development Companies In Calgary: A 2025 Insight
Author: Josh Mark

5. Enhance Decision-making With Opentable Reviews Data Scraping
Author: DataZivot

6. How To Choose The Right Computer Repair Shop In Denver
Author: Timothy

7. Why Your 3pl Business Needs A Smarter Wms: Discover Fulfillor’s Edge
Author: Visvendra Singh

8. Top Antivirus Coupon Codes & Promo Deals
Author: Dhruv

9. Virtual Guard Video Tour & Ai Analytics System
Author: james

10. Security Incident Management
Author: james

11. Small Business Accounting Software: A Game Changer For Entrepreneurs
Author: Cecilia Robert

12. Security Guard Human Resource
Author: james

13. Guard Time And Attendance
Author: james

14. Cheap Web Design Singapore
Author: cheap

15. Video Editing Course In Hyderabad
Author: venky

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: