In the world there are more than 4,500 million users of social networks like Facebook, Twittereither Instagrampeople who have become the target of hackers and that they are exposed to social engineering, imposters, data mining, and cyberattacks.
Therefore, on the occasion of World Social Media Day which is celebrated tomorrow, June 30, some cybersecurity companies have taken the opportunity to give some advice to avoid the most common attacks.
According to Cisoverse -private community of cybersecurity professionals- one in five users will be attacked in the next 24 hours; and it is that networks have become a common way of accessing personal and work information that allows hackers to collect contact data to launch ‘phishing’ attacks through ‘spam’ or to carry out brute force attacks.
For this reason, Cisoverso reminds that it is important to make people aware so that they monitor the information they share on social networks and that, in the event of an attack, it recommends that they report the crime.
“The easiest way to hack social network profiles or to get personal data is still phishing”highlights Enrique Serranofounder of HackRocks and member of the board of Cisoverse.
“Users receive an email, a message or a photo from someone they know or are close to and end up clicking on a link that contains some malicious code that allows the cybercriminal to compromise the account and get hold of the information that interests them”Add.
Some of the most common and simple attacks on Facebook are a message or link from FacebookMessenger that asks the user to reconfirm or update their personal information and preferences; a message from a friend inviting you to view a photo or access a promotion, and an email from Facebook warning of a possible security incident and asking you to update your password.
On Instagram, the risk lies in the synchronization with third-party applications (photo editing and special filters, follower analysis…) for which you have to connect through the user’s profile. If those third-party applications are bogus or unreliable, the user easily hands over their credentials to cybercriminals.
In LinkedIn, the difficulty in this network is that the company has several valid domains that can lead to user confusion. The usual thing is to receive friend requests from fake profiles that little by little will try to get information or messages to update security policies.
Twitter has become a popular platform for phishing attacks in which hackers use the same phishing techniques and attacks as in other social networks, although the most common is the professional or hacker who promises to get many followers for a couple of euros.
In TikTok Y Twitter The scam through fake profiles of celebrities to steal money from their followers is still common.
And on WhatsApp, in addition to messages forwarded with fantastic promotions and coupons that are accompanied by a malicious link, the message from a friend or relative who writes about a money problem at the airport or on a trip outside the country is also common.
To avoid these cyberattacks, the cybersecurity company bitdefender advises reviewing the privacy settings of networks to control who can see, react or comment on the content you share.
Likewise, it reminds users that all their interactions leave a digital footprint that could affect their online reputation, it advises protecting their personal information, using strong passwords and accessing networks from secure devices, reporting suspicious users or users who may be in danger and block them, and watch out for spam and ads that promise something too good to be true.