By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    Wordfence Intelligence Weekly WordPress Vulnerability Report (October 9, 2023 to October 15, 2023)
    Wordfence Intelligence Weekly WordPress Vulnerability Report (October 9, 2023 to October 15, 2023)
    2 months ago
    WordPress 6.4.2 Security Release – Patchstack
    WordPress 6.4.2 Security Release – Patchstack
    3 days ago
    Webcams vs. Humans
    1 year ago
    Latest News
    Is macOS as secure as its users think?
    21 hours ago
    High Severity File Upload Vulnerability in Elementor Patched
    23 hours ago
    Letters with Remcos RAT hosted in Discord
    2 days ago
    Wordfence Intelligence Weekly WordPress Vulnerability Report (November 27, 2023 to December 3, 2023)
    2 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    ✅How To Fix Error PS1 Can Not Be Loaded Because Running Scripts Is Disabled On This System
    1 year ago
    Windows 10 22H2 releases as a preview for testers
    1 year ago
    How to check for app updates on Windows 11
    1 year ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    10 months ago
    Now you can speed up any video in your browser
    10 months ago
    How to restore access to a file after EFS or view it on another computer?
    10 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    11 months ago
  • How To
    How ToShow More
    ML Ops Platform at Cloudflare
    ML Ops Platform at Cloudflare
    2 days ago
    La nouvelle décision en matière de droit d’auteur en Allemagne rejette le blocage par le biais des résolveurs DNS mondiaux
    La nouvelle décision en matière de droit d’auteur en Allemagne rejette le blocage par le biais des résolveurs DNS mondiaux
    3 days ago
    How we used OpenBMC to support AI inference on GPUs around the world
    How we used OpenBMC to support AI inference on GPUs around the world
    3 days ago
    Latest copyright decision in Germany rejects blocking through global DNS resolvers
    Latest copyright decision in Germany rejects blocking through global DNS resolvers
    4 days ago
    Restricted Settings in Android 13 and 14
    4 days ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    How to View Instagram Stories Anonymously
    1 year ago
    How to make sure the site is safe?
    1 year ago
    Check APK files for viruses
    1 year ago
    Latest News
    How to check GPU temp on Windows 11
    1 day ago
    How to disable Defender Antivirus permanently on Windows 11
    2 days ago
    How to check CPU temp on Windows 11
    4 days ago
    How to disable news feed from Widgets on Windows 11
    5 days ago
  • Glossary
  • My Bookmarks
Reading: Are you a target?
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
Wordpress Threats

Are you a target?

Vitus White
Last updated: 11 October
Vitus White 4 years ago
Share
4 Min Read

At the RSA Conference in San Francisco, I sat in on a panel that raised an interesting question in the insecure big data world that we live in. Ian Amit of Zerofox gave a talk on how social media usage could be leveraged by cybercriminals to target individuals to infiltrate a company.

Contents
What makes you a target?What can you do?Should companies use this type of profiling?How can I keep my social profiles safe?

The theory is quite simple — we put a lot of personal data out there that can be accessed by pretty much anyone. This includes cybercriminals and it is a variable that they can leverage to help infiltrate a company.

What makes you a target?

In theory this idea is quite plausible. We already know that social media sites are prime targets for phishing schemes, and if we know that, so do the criminals. By leveraging the big data, they can look at people who they feel could be easy prey, or a prime target for attack.

Did you know that #socmedia sites are prime areas for phishing schemes? Find out more: https://t.co/eNlAvarhAy #SMM pic.twitter.com/8k12NuAdIp

— Kaspersky Lab (@kaspersky) December 12, 2015

In the talk, Amit noted that some factors that could increase the risk for someone being targeted is to look at people who actively post on polarizing topics like sports, politics, religion and certain social causes. In some of these areas, you could see a person who is highly interested in a given politician, we’ll call him Bernie Trump, potentially clicking on or sharing links from accounts that could be a spoof of the real one with similar posts, but instead of campaign messaging they are sending a phishing link.

You could also be a target if you are in your company’s IT, Corp Communications or Finance department as all have ties into sensitive corporate information. High ranking executives and board members can also be potential targets.

What can you do?

The quick and easy answer to this is to follow basic cybersecurity best practices. This means no clicking on links that you are unsure of, only opening files that you know are verified and also knowing sender. The last one is perhaps most important as we recently learned with Snapchat falling victim to phishing.

#ICYMI Snapchat caught in a #phishing campaign #somedia https://t.co/9F9dgrnzuS pic.twitter.com/7TYjKZOIAW

— Kaspersky Lab (@kaspersky) February 29, 2016

You should also be careful of who you follow back on social sites as spoof accounts could really come back to hurt you.

Should companies use this type of profiling?

This use of big data to assess risk seems to be a little bit of too soon for the market. Many companies do not fully leverage the power of big data while having millions of customers, so it seems unlikely for mass adoption when it comes to companies looking at thousands of employees.

I am sure that there are plenty of use cases and companies doing this, but think that these would fall into highly sensitive or controversial industries.

How can I keep my social profiles safe?

The team at Kaspersky Daily has you covered with these articles on best practices from a security standpoint for social networks:

  • Google
  • Facebook
  • Instagram
  • Snapchat
  • VK.com

Source: kaspersky.com

Translate this article

TAGGED: Facebook, Phishing, PoC, RTF, Security, Software, Threats
Vitus White October 11, 2022 September 30, 2019
Share This Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

Is macOS as secure as its users think?
Threats 24 hours ago
High Severity File Upload Vulnerability in Elementor Patched
High Severity File Upload Vulnerability in Elementor Patched
Wordpress Threats 1 day ago
How to check GPU temp on Windows 11
News 1 day ago
ML Ops Platform at Cloudflare
ML Ops Platform at Cloudflare
Apps 2 days ago
Letters with Remcos RAT hosted in Discord
Threats 2 days ago

You Might Also Like

Threats

Is macOS as secure as its users think?

24 hours ago
High Severity File Upload Vulnerability in Elementor Patched
Wordpress Threats

High Severity File Upload Vulnerability in Elementor Patched

1 day ago
ML Ops Platform at Cloudflare
Apps

ML Ops Platform at Cloudflare

2 days ago
Threats

Letters with Remcos RAT hosted in Discord

2 days ago
Show More

Related stories

Several Critical Vulnerabilities including Privilege Escalation, Authentication Bypass, and More Patched in UserPro WordPress Plugin
BridesMaid – neuron writes toasts For those very occasions when you need to give out a powerful
The other day Yandex pleased us with the announcement of a new Midi station – an excellent reason to listen
REMIX – remixes of pictures from neural networksCreate, share and correct works
How to download Diablo IV for free and absolutely legallyBlizzard has opened a free
Rostelecom employees were forced to abandon Android and iOS in favor of Aurora.
Previous Next

10 New Stories

Wordfence Intelligence Weekly WordPress Vulnerability Report (November 27, 2023 to December 3, 2023)
Check out The Critical Thinking Podcast
How to disable Defender Antivirus permanently on Windows 11
WordPress 6.4.2 Security Release – Patchstack
La nouvelle décision en matière de droit d’auteur en Allemagne rejette le blocage par le biais des résolveurs DNS mondiaux
How we used OpenBMC to support AI inference on GPUs around the world
Previous Next
Hot News
Is macOS as secure as its users think?
High Severity File Upload Vulnerability in Elementor Patched
How to check GPU temp on Windows 11
ML Ops Platform at Cloudflare
Letters with Remcos RAT hosted in Discord
10alert.com10alert.com
Follow US
© 10 Alert Network. All Rights Reserved.
  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?