Beware Security Threats on Five Popular Social Networking Sites - Slide 5

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Twitter-5 Next


Twitter is the most convenient tool for spammers to push rogue links, especially when spam runs are automated. With Twitter’s design, malware writers can’t do much scamming on Twitter itself. Rather, attackers rely heavily on users leaving the safety of Twitter by clicking on rogue links in Tweets that bring them to malicious sites hosted elsewhere. The true destinations of these links are often hidden behind shortened URL links, which were made popular on Twitter. Whether the site in question leads to fake AV launch pads, rogue Facebook pages or gift card scams, the result is equally dangerous. Interestingly enough, attackers often use Twitter as a gateway to threats on other social networking sites.

Are social networking sites inherently more vulnerable to security risks, malware and malicious attacks? Social media is all about, well, being social, and because most interactions occur within a network of confirmed “friends,” users often let their guard down when using these sites. When you factor in the vast amount of personally identifiable information (PII) housed on these channels, social networks are a prime target for cyber criminals.

Understanding what types of attacks are most common on different social media platforms, and why, can help users identify and defend against malware lurking on them. With this in mind, GFI Software analyzed the most common threats on five popular social networking sites to better understand what makes them such easy targets.

More Slideshows:

Five Must-Have Tools from Any Cloud Provider A list of the top tools that CIOs should demand from any prospective cloud or managed services partner.

Ten Phones That Put the 'Smart' in Smartphone Hot new smartphones including offerings from Apple, HTC, Samsung, Nokia, LG, Huawei and Motorola.

Top 10 Myths about IPv6 WildPackets takes a closer look at 10 myths and set the record straight about this enigmatic protocol.


Related Topics : E-mail Security, E-mail Servers, Passwords, Security Metrics, Spam

More Slideshows

The Spam Dirty Dozen: Top Spam-Relaying Countries for Q3 2012

IT security and data protection firm Sophos has published its latest 'Dirty Dozen' report of spam-relaying countries for the third quarter of 2012. ...  More >>

Security and Compliance: Violations and Lack of Confidence Are Widespread

Research shows lack of confidence in and widespread violations of corporate security and compliance policies. ...  More >>

Nine Document Security Tips Nine Tips to Keep Your Electronic Documents Secure

Tips to help ensure that your electronic document repository is 100 percent secure. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.