Beware Security Threats on Five Popular Social Networking Sites

1 | 2 | 3 | 4 | 5 | 6 | 7
Previous Beware Security Threats on Five Popular Social Networking Sites-1 Next

Click through for common threats to five popular social networking sites, as identified by GFI Software.

Are social networking sites inherently more vulnerable to security risks, malware and malicious attacks? Social media is all about, well, being social, and because most interactions occur within a network of confirmed “friends,” users often let their guard down when using these sites. When you factor in the vast amount of personally identifiable information (PII) housed on these channels, social networks are a prime target for cyber criminals.

Understanding what types of attacks are most common on different social media platforms, and why, can help users identify and defend against malware lurking on them. With this in mind, GFI Software analyzed the most common threats on five popular social networking sites to better understand what makes them such easy targets.

More Slideshows:

Five Must-Have Tools from Any Cloud Provider A list of the top tools that CIOs should demand from any prospective cloud or managed services partner.

Ten Phones That Put the 'Smart' in Smartphone Hot new smartphones including offerings from Apple, HTC, Samsung, Nokia, LG, Huawei and Motorola.

Top 10 Myths about IPv6 WildPackets takes a closer look at 10 myths and set the record straight about this enigmatic protocol.


Related Topics : E-mail Security, E-mail Servers, Passwords, Security Metrics, Spam

More Slideshows

gig economy How the Gig Economy Is Changing the Tech Industry

The gig economy is clearly disrupting the tech industry, both in positive and negative ways. ...  More >>

HCI 10 Reasons Why the Enterprise Is Turning to Hyperconverged Infrastructure

While HCI is certainly innovative in design, its true measure lies in the practical benefits it brings to data center management and operations. ...  More >>

IIoT IIoT Gaining Momentum in Adoption and Results

Cost reduction has been the main driver of IIoT adoption. Other contributors are the emergence of ancillary and complementary technologies, including low-power hardware devices, the cloud, Big Data analytics, robotics and automation and smart sensors. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.