4 Social Networking Mistakes To Avoid From the Cocoon Team! www.GetCocoon.com
Facebook Cybercriminals often code rogue applications that redirect you to sites that distribute malware or survey scams. Rogue applications often exploit permissions to post to your wall so that your wall is automatically spammed. Everyone who clicks on the rogue link on your wall will become part of the scam (if they give the rogue application permission). Cybercriminals rely upon sensationalism and gullibility as the main focus of their social engineering plan. Cybercriminals Target Current Events That Are Tragic In Nature
Mistake #1: If it seems too good to be true – it is probably false. Apple is not giving away free iPads in memory of Steve Jobs
Twitter An email that contains a link to a fake Twitter site that steals your Twitter credentials if you login. A direct message (DM) from someone that you do not know that contains a shortened URL to a phishing site. A URL-only mention (@Your-Twitter-Name) -- these almost always link to bogus survey scams or a malicious site. Twitter Follower Scamsoften hijack accounts. An invite to have someone famous follow you – this scam targets you for a monthly smartphone mobile content subscription fee. At Minimum: Cybercriminals Use Twitter To Pass Dangerous URLs, Hijack User Accounts And To Promote Viral Scams
Mistake #2: Clicking on shortened viral URLs, giving your mobile number to fake websites and re-entering your Twitter credentials on phishing sites will compromise your Twitter account and share your private data with the bad guys . Justin Bieberwill follow you back if you give them your mobile number and take their IQ Test! NOT!
Mistake #3: Creating a profile on social networking sites that have a strong history of shoddy behavior and a spotty online reputation is bad news . MyLife gives you no control over your data or your credit card…
LinkedIn Cybercriminals target businesses to locate and build profiles of key people within an organization. They send fraudulent LinkedIn messages with malicious links that can deliver a drive-by-download attack to an unsuspecting user. Be wary of accepting invitation requestsfrom people that you do not know. Beware of any email that claims your account was blocked for inactivity, it is a scam to gain access to your contact list. Employment scams. At Minimum: Cybercriminals use LinkedIn to target key people within organizations in order to further phishing campaigns
Mistake #4: By not carefully screening LinkedIn invites, you could open the back door to some unsavory business alliances. You will not get that fabulous job offer by clicking on that link!