Transcript of "4 social networking mistakes to avoid"
4 Social Networking Mistakes To Avoid <br />From the Cocoon Team!<br />www.GetCocoon.com<br />
Facebook<br />Cybercriminals often code rogue applications that redirect you to sites that distribute malware or survey scams.<br />Rogue applications often exploit permissions to post to your wall so that your wall is automatically spammed.<br />Everyone who clicks on the rogue link on your wall will become part of the scam (if they give the rogue application permission).<br /> Cybercriminals rely upon sensationalism and gullibility as the main focus of their social engineering plan.<br />Cybercriminals Target Current Events That Are Tragic In Nature<br />
Mistake #1: <br />If it seems too good to be true – it is probably false.<br />Apple is not giving away free iPads in memory of Steve Jobs<br />
Twitter<br />An email that contains a link to a fake Twitter site that steals your Twitter credentials if you login.<br />A direct message (DM) from someone that you do not know that contains a shortened URL to a phishing site.<br />A URL-only mention (@Your-Twitter-Name) -- these almost always link to bogus survey scams or a malicious site.<br /> Twitter Follower Scamsoften hijack accounts.<br />An invite to have someone famous follow you – this scam targets you for a monthly smartphone mobile content subscription fee.<br />At Minimum: Cybercriminals Use Twitter To Pass Dangerous URLs, Hijack User Accounts And To Promote Viral Scams <br />
Mistake #2: <br />Clicking on shortened viral URLs, giving your mobile number to fake websites and re-entering your Twitter credentials on phishing sites will compromise your Twitter account and share your private data with the bad guys .<br />Justin Bieberwill follow you back if you give them your mobile number and take their IQ Test! NOT!<br />
Mistake #3: <br />Creating a profile on social networking sites that have a strong history of shoddy behavior and a spotty online reputation is bad news .<br />MyLife gives you no control over your data or your credit card…<br />
LinkedIn<br />Cybercriminals target businesses to locate and build profiles of key people within an organization.<br />They send fraudulent LinkedIn messages with malicious links that can deliver a drive-by-download attack to an unsuspecting user.<br />Be wary of accepting invitation requestsfrom people that you do not know.<br />Beware of any email that claims your account was blocked for inactivity, it is a scam to gain access to your contact list.<br />Employment scams.<br />At Minimum: Cybercriminals use LinkedIn to target key people within organizations in order to further phishing campaigns <br />
Mistake #4: <br />By not carefully screening LinkedIn invites, you could open the back door to some unsavory business alliances.<br />You will not get that fabulous job offer by clicking on that link! <br />
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.