This is a PPT of SOCIAL MEDIA THREATS AND THEIR PREVENTION. This is help full for learning. Thanks.
Social media offers an outlet for people to connect, share life experiences, pictures and video. But too much sharing—or a lack of attention to impostors—can lead to a compromise of business and personal accounts.
Attackers often use social media accounts during the reconnaissance phase of a social engineering or phishing attack. Social media can give attackers a platform to impersonate trusted people and brands or the information they need carry out additional attacks, including social engineering and phishing.
1. A
Presentation
On
Social media threats and their
prevention
Presented by
Mr :-Ayush Undale
Mr :-Rohit Nadimetla
Mr :-Suraj Gurushetti
Mr :-Sumit Kshirsagar
For the partial fulfillment of SY (AI & DS) curriculum of Sem 3
at
VIKAS PRATISHTHAN INSTITUTE OF ENGINEERING &
TECHNOLOGY ,SOLAPUR
2. Contents
1. Introduction
2. Social media threats and methods of Scammers.
3. Prevention from social media threats
3. 1. Introduction
Social media refers to a variety of
technologies that facilitate the sharing of
ideas and information among their users.
From Facebook and Instagram to X
platform (formerly Twitter) and YouTube,
more than 4.7 billion people use social
media, equal to roughly 60% of the
world's population.
Social networks are websites and apps that
allow users and organizations to connect,
communicate, share information
4. 2. Social media threats and methods by
scammers
1. Social engineering
2. Phishing
3. Brand impersonation
4. Site compromise and data theft
5. Spread malware
6. Data breach
5. 3. Prevention from social media
threats
1. Avoid using social media sites on public Wi-Fi
hotspots.
2. users should also be encouraged to change their
own private social media account passwords.
3. Use ad blockers on corporate devices. If ad
blockers are not feasible, instruct employees to
avoid clicking ads etc.
6. 4. Conclusion
The conclusion of this 1`st presentation is that we have a lot social media threats as
well as it`s preventions the thing is we all have to be aware of those threats and
preventions.
7. Contents
Some dangerous sub type social media threats
1. Catfishing
2. Cyberbullying
3. Identity theft
How do scammers generate scamming links
1. How it works
8. Some dangerous sub type social
media threats
1. Catfishing
Catfishing refers to when a person takes information and images,
typically from other people, and uses them to create a new
identity for themselves. In some cases, a catfisher steals another
individual’s complete identity including their image, date of
birth, and geographical location and pretends that it is their own.
The catfisher then uses this identity to trick other people into
associating with them or doing business online.
9. 2. Cyberbullying
It is the use of technology to harass, threaten, embarrass, or target another person. Online threats and
mean, aggressive, or rude texts, tweets, posts, or messages all count. So does posting personal
information, pictures, or videos designed to hurt or embarrass someone else.
10. 3. Identity Theft?
Identity theft is the crime of obtaining the personal or financial
information of another person to use their identity to commit
fraud, such as making unauthorized transactions or purchases.
Identity theft is committed in many different ways and it`s
victims are typically left with damage to their credit, finances,
and reputation.
11.
12. How do scammers generate scamming
links
There are a lot of ways to generate the scamming links
but here I have one of the methods (tool) how
scammers create fishing links.
Blackeye is an open-source pen-testing tool
intended for simulating credential harvesting
phishing attacks. The goal is to show how easily
this type of attack can be done by someone with
little to no technical experience as well as make
others more aware of this type of attack.
13. How it works:-
Blackeye has 39 templates for hosting
a fake website. These templates span
many of the most popular services on
the internet such as social media,
banking, etc. Each template contains
everything needed to host the fake
website. This includes the necessary
HTML files as well as scripts to run on
the hosted site. The screenshots below
show the scripts that grab the victim’s
IP address, user agent, and credentials
(in this case the scripts are for the fake
Snapchat website template).
14. Conclusion
The conclusion of this presentation is there are a lot of threats like cyberbullying,
catfishing, identify theft and fishy link scam the users should be aware of these
threats and their preventions
15. Contents
1. Working diagram of blackeye tool
2. Basic software information about Scamming process
16. Templet
choosing
Generating
URL And
waits for
Data
Crafting a
phising
message in a
Email etc.
By
Scammer
Sending IP
address to
scammer (after
link clicked )
Sends the
user
information if
got through
Ngork
Shortens the
URL to not
look
Suspicious.
1. Working Diagram of Blackeye
18. 2. Basic software information about Phishing link scam
Front-end Development: The front-end is the
visible part of the website or web application
responsible for the user interactions. And, you
only interact with the front part of the web
application using web browsers.
Back-end Development: The back-end focuses on
how the website works. It runs queries and
presents you with the desired data.
There are verities of programming languages used
for the front end and back end web developing but
mostly Python and PHP is used for backend web
developing and for front end developing HTML
and CSS.
19.
20. Conclusion
There are a lot of ways to scam people that we saw only one of them today with a
bit of software explanation as of all we should be aware of these threats, methods
of scamming around us.
21. Contents
1. What is Artificial Intelligence
2. How artificial intelligence is used as a social threats
Abuse of data and loss and control
Privacy, security and deepfakes
3. Cases of Artifical intelligence threats Occurred
22.
23. 2. How artificial intelligence is used as
a social threats
Abuse of data is a huge possibility since both data
and AI tools are in the hands of a select few.
Unless values and ethics are built into digital
systems, decisions made by AI algorithms will
favor only selected parties. Privacy and power are
being handed over to digital tools over which very
few people have any control.
for an example I`ll just give few examples that
when we like create G-mails or create social
accounts on different apps our data is in hands of
that Ai of application or web that is controlled by a
person or an organization.
Abuse of data and loss of control
24. Privacy, security and deepfakes
Audio and video deepfakes are already gaining ground.
Video deepfakes are being successfully used in the
advertising world, making it difficult to differentiate
between real and virtual. Social media personalities could
be easily engineered to influence sections of society.
Similarly, audio clips of influential people can be
manipulated and misused.
25. Kerala man loses ₹40k to AI-enabled deep-
fake fraud
3. Cases of Artificial intelligence threats Occurred
A 73-year-old man in India fell victim to a deepfake scam
after receiving a call from someone impersonating his
former colleague and asking for money. The scammer
used deepfake technology to create a video call in which
the impersonator's face and voice matched the victim's
former colleague. The victim transferred money before
realizing he had been tricked. Police have traced the
money to an account in Maharashtra and are investigating
further. This is the first reported case of a deepfake scam
in India.
26. Conclusion
So from this presentation we conclude that Artificial intelligence is also a social threat to our
society and we should use or Share our information with precautions.
27. Contents
1. How AI creates deepfakes of audio and video
2. Example of Audio Deepfake
3. How to prevent ourselves from these scams
28. 1. How AI creates deepfakes of audio and video
Usually we all know that The voiced speech of
a typical adult male will have a fundamental
frequency from 85 to 155 Hz, and that of a
typical adult female from 165 to 255 Hz. So
what happens is the ai takes an audio input
anylizies it`s frequency like (pitch of an audio)
and at our command it generates similar type
frequency voice that given as input.
As for fake video generating the AI focuses on
the facial structural of the input given and
visualizes it as an output video the output may
be different depending upon the algorithms
provided.
30. Real Voice Note
of Rishik
AI generated Voice note (Deepfake)
Awkward facial positioning
Unnatural body movement
Unnatural coloring
Misalignment
Images that look unnatural as you zoom in or slow down
Inconsistent audio
Absence of blinking
1. How to prevent ourselves from these scams
31. Conclusion
In this presentation we conclude the Role of artificial intelligence as social media threats with
different methods and some preventions.
32. Contents
1. A different method of using fishing links
2. What is CamPhish ?
2. 6 signs someone is watching you through your webcam
3. Need of awareness of social media threats
33. 1. A different method of using fishing links
Webcams are everywhere: in our laptops, in our security systems, and in our phones wherever we go. Yet
webcam security is often a blind spot for even the most secure systems, leaving most webcams vulnerable to
hacking. Let`s see how to tell if your webcam is hacked, and find out how to improve your webcam security
and protect your privacy.
34. 2. What is CamPhish ?
CamPhish is techniques to take cam shots of target's phone front camera or PC webcam. CamPhish Hosts a
fake website on in built PHP server and uses Ngrok & server to generate a link which we will forward to
the target, which can be used on over internet. website asks for camera permission and if the target allows it,
this tool grab cam shots of target's device.
35.
36. Conclusion
With the increase of social media and technology there are a lot of different methods of threats
as we see in this world we should be aware about the threats around social media and other
technologies.
37. Contents
1. What is cybersecurity ?
2. Top cybersecurity Threats
3. Importance of cybersecurity
38.
39.
40. 3. Importance of Cybersecurity:-
Protecting Sensitive Data
Prevention of Cyber Attacks
Safeguarding Critical Infrastructure
Maintaining Business Continuity
Compliance with Regulations
Protecting National Security
Preserving Privacy
41. Conclusion
Cybersecurity plays major role that tries to solve threats around social networking and social
media as it helps us to be aware of threats around us and protects us.