dcsimg

Facebook

  • Facebook-

    Users often click on links in friends’ posts without thinking twice. Knowing this, cyber criminals propagate fake pages by including them in wall posts that tie into current affairs, such as breaking celebrity news. Exploiting popular Facebook features, such as comments and the “Like” button, is another common tactic used by attackers. And finally, trouble abounds for users who are tricked into downloading fake “Facebook profile viewer” applications. Regardless of the scam, the end game is always the same: unsuspecting victims are tricked into filling out malicious surveys that generate cash for the affiliates involved.

1 | 2 | 3 | 4 | 5 | 6 | 7

Facebook

  • 1 | 2 | 3 | 4 | 5 | 6 | 7
  • Facebook-2

    Users often click on links in friends’ posts without thinking twice. Knowing this, cyber criminals propagate fake pages by including them in wall posts that tie into current affairs, such as breaking celebrity news. Exploiting popular Facebook features, such as comments and the “Like” button, is another common tactic used by attackers. And finally, trouble abounds for users who are tricked into downloading fake “Facebook profile viewer” applications. Regardless of the scam, the end game is always the same: unsuspecting victims are tricked into filling out malicious surveys that generate cash for the affiliates involved.

Are social networking sites inherently more vulnerable to security risks, malware and malicious attacks? Social media is all about, well, being social, and because most interactions occur within a network of confirmed “friends,” users often let their guard down when using these sites. When you factor in the vast amount of personally identifiable information (PII) housed on these channels, social networks are a prime target for cyber criminals.

Understanding what types of attacks are most common on different social media platforms, and why, can help users identify and defend against malware lurking on them. With this in mind, GFI Software analyzed the most common threats on five popular social networking sites to better understand what makes them such easy targets.

More Slideshows:


Five Must-Have Tools from Any Cloud Provider A list of the top tools that CIOs should demand from any prospective cloud or managed services partner.

Ten Phones That Put the 'Smart' in Smartphone Hot new smartphones including offerings from Apple, HTC, Samsung, Nokia, LG, Huawei and Motorola.

Top 10 Myths about IPv6 WildPackets takes a closer look at 10 myths and set the record straight about this enigmatic protocol.