0
4 Social Networking Mistakes To Avoid  <br />From the Cocoon Team!<br />www.GetCocoon.com<br />
Facebook<br />Cybercriminals often code rogue applications that redirect you to sites that distribute malware or survey sc...
Mistake #1: <br />If it seems too good to be true – it is probably false.<br />Apple is not giving away free iPads in memo...
Twitter<br />An email that contains a link to a fake Twitter site that steals your Twitter credentials if you login.<br />...
Mistake #2: <br />Clicking on shortened viral URLs, giving your mobile number to fake websites and re-entering your Twitte...
MyLife(Formerly Reunion.com)<br />MyLife cookies are tied to personally identifiable information and they use  web beacons...
Mistake #3: <br />Creating a profile on social networking sites that have a strong history of shoddy behavior and a spotty...
LinkedIn<br />Cybercriminals target businesses to locate and build profiles of key people within an organization.<br />The...
Mistake #4: <br />By not carefully screening LinkedIn invites, you could open the back door to some unsavory business alli...
4 social networking mistakes to avoid
Upcoming SlideShare
Loading in...5
×

4 social networking mistakes to avoid

1,372

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,372
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "4 social networking mistakes to avoid"

  1. 1. 4 Social Networking Mistakes To Avoid <br />From the Cocoon Team!<br />www.GetCocoon.com<br />
  2. 2. Facebook<br />Cybercriminals often code rogue applications that redirect you to sites that distribute malware or survey scams.<br />Rogue applications often exploit permissions to post to your wall so that your wall is automatically spammed.<br />Everyone who clicks on the rogue link on your wall will become part of the scam (if they give the rogue application permission).<br /> Cybercriminals rely upon sensationalism and gullibility as the main focus of their social engineering plan.<br />Cybercriminals Target Current Events That Are Tragic In Nature<br />
  3. 3. Mistake #1: <br />If it seems too good to be true – it is probably false.<br />Apple is not giving away free iPads in memory of Steve Jobs<br />
  4. 4. Twitter<br />An email that contains a link to a fake Twitter site that steals your Twitter credentials if you login.<br />A direct message (DM) from someone that you do not know that contains a shortened URL to a phishing site.<br />A URL-only mention (@Your-Twitter-Name) -- these almost always link to bogus survey scams or a malicious site.<br /> Twitter Follower Scamsoften hijack accounts.<br />An invite to have someone famous follow you – this scam targets you for a monthly smartphone mobile content subscription fee.<br />At Minimum: Cybercriminals Use Twitter To Pass Dangerous URLs, Hijack User Accounts And To Promote Viral Scams <br />
  5. 5. Mistake #2: <br />Clicking on shortened viral URLs, giving your mobile number to fake websites and re-entering your Twitter credentials on phishing sites will compromise your Twitter account and share your private data with the bad guys .<br />Justin Bieberwill follow you back if you give them your mobile number and take their IQ Test! NOT!<br />
  6. 6. MyLife(Formerly Reunion.com)<br />MyLife cookies are tied to personally identifiable information and they use web beacons to track you.<br /> This site is listed in many spam indexes and has low reliability and a bad reputation.<br />56 complaints of Internet fraud were filed at Ripoff Reports. <br />Consumer Affairs reports many cases of unauthorized charges appearing on consumer credit cards<br />MyLife received an F rating from the BBB with 1185 complaints filed.<br />At Minimum: Research the company's reputation and review their privacy policy before you sign up for services <br />
  7. 7. Mistake #3: <br />Creating a profile on social networking sites that have a strong history of shoddy behavior and a spotty online reputation is bad news .<br />MyLife gives you no control over your data or your credit card…<br />
  8. 8. LinkedIn<br />Cybercriminals target businesses to locate and build profiles of key people within an organization.<br />They send fraudulent LinkedIn messages with malicious links that can deliver a drive-by-download attack to an unsuspecting user.<br />Be wary of accepting invitation requestsfrom people that you do not know.<br />Beware of any email that claims your account was blocked for inactivity, it is a scam to gain access to your contact list.<br />Employment scams.<br />At Minimum: Cybercriminals use LinkedIn to target key people within organizations in order to further phishing campaigns <br />
  9. 9. Mistake #4: <br />By not carefully screening LinkedIn invites, you could open the back door to some unsavory business alliances.<br />You will not get that fabulous job offer by clicking on that link! <br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×