Antivirus, Internet Security, Social Media

How safe are social media platforms?

Just how safe are social media platforms? Social networking companies are known to spend millions of dollars to keep their…

Just how safe are social media platforms? Social networking companies are known to spend millions of dollars to keep their users protected from hackers on the internet.

With over 2 billion people having at least one account on either Facebook, Instagram, Youtube or Whatsapp, it goes without saying that social media is one of the cyber criminals’ favorite playgrounds they are always looking to exploit. After all, where else would one find such a large database of active internet users?

In fact, it would be shocking to know that over 80 percent of all internet crimes involve some kind of a social media platform. Criminals might use this information as identity theft to carry out various other crimes on the internet.

But, shouldn’t social media companies make sure that the user information they possess is well protected? Ultimately, that’s where their money is…

They definitely do! Most social media websites and apps that are used today are either owned by Facebook or Google. And as far as any serious intrusion of their servers resulting in substantial data theft is concerned, that actually never happened. Rather, most security compromises happen due to intelligent social engineering by hackers. According to a figure released by Facebook, that number was as high as 500,000 accounts in a single day.

So, what is social engineering? And, how do hackers get access to users’ accounts?

To gain access to a user’s account, all that is required is their username and password. The concept is straightforward. Hackers may employ one of their many deceptive techniques that have been carefully planned to manipulate individuals into providing personal information voluntarily. All they need is a platform to carry it out and that being – social media! Let’s discuss a few of these methods one at a time:

 

Phishing

 

For many, this term might not be new and some might have already been a victim of it. Phishing is a technique to obtain confidential information like usernames, passwords, bank, and credit card details through fraudulent disguised emails or WebPages asking users for their usernames and passwords.

Before the advent of social media, cyber culprits used emails to facilitate such operations. Today, social media websites have made this process a lot easier as once a user’s account is compromised, hackers proceed further by exploiting others in his friend’s network. Since users tend to use the same username and password across multiple platforms for simplicity, a breach of one account might have consequences on others as well.

 

Keyloggers

 

Keyloggers are software that, once installed on the system, monitor every move of a user. This includes typing usernames, passwords, and other sensitive information. The easiest way for hackers to entice users to install such software is by providing a link to a disguised software that claims to have a different purpose.

 

Wi-Fi networks

 

While you should be pretty safe if you are just using your private Wi-Fi connection, things might get a little unpleasant when it comes to public networks. Of course, it depends on the type of network itself and the devices connected to it. Cyber criminals have certainly been able to sniff data from users who are connected to weakly secured networks.

 

Physical access and Theft

 

One doesn’t really need to be a cyber mastermind to gain access to ones social media accounts. All that is required is gaining access to a user’s device. In fact, letting your device be in the wrong hands even for a few minutes is enough to have your valuable data stolen.

Most of us rely on our browsers and different website to remember our usernames and passwords. After all, why should we type in our information when our devices can remember them for us. However, these must be stored somewhere, right? Depending on the browser, these are saved in different locations on the user’s computer. Though they are encrypted, it wouldn’t be safe to presume they cannot be cracked once their location is known.

 

How can we keep our accounts safe?

 

Keeping your accounts secure shouldn’t be a devil of a job. All that is required is a little caution and awareness. After all, a small human error is all that a hacker might be looking for.

We’ve discussed the various techniques cyber attackers use to intrude into users’ accounts. Apart from that, there are various things that should be kept in mind while using social media. Let’s see how we can avoid them.

 

  • Use strong usernames and passwords that are hard to crack. Additionally, you can use a password manager to help you store them.
  • Avoid logging in through public hotspots. Not all social networking websites have a secure login system.
  • Be careful while clicking on links. It is best to avoid them if they aren’t from a known source. Hackers might often post tempting links to malicious phishing websites.
  • Keep your firewall on and anti-virus up-to-date.
  • Go through your profile settings. If you feel you want to hide some of your information, do not hesitate to do so.
  • Provide the least amount of personal information – If you are an administrator of a Facebook page, it is best to keep that role only to your self. An administrator has full access and control to a business page, including the ability to delete it, even if it wasn’t created by him. While you may have enough trust on someone you are assigning the role to, you never know when his account security is breached. Keeping the role to a moderator or editor is the way to go.
  • Remember to log-out of your accounts after every session.
  • Do not share your photos while you are away from home. Your absence might pose a risk of someone breaking into your house.
  • Disable location settings. You wouldn’t want all your friends and followers to know your exact location.

 

Social media platforms spend millions of dollars to keep their users protected. With so many social media networks out there today, one might be too lazy to take the necessary precautions to keep his accounts safe. However, it must be noted that almost all security breaches happen due to one kind of human error or another.

Be the first to write a comment.

Leave a Reply

Internet Security

Can predictive analytics be made safe for humans?

Massive-scale predictive analytics is a relatively new phenomenon, one that challenges both decades of law as well as consumer thinking about privacy. As a technology, it may well save thousands of lives in applications like predictive medicine, but if it isn’t used carefully, it may prevent thousands from getting loans, for instance, if an underwriting…


Massive-scale predictive analyticsis a relatively new phenomenon, one that challenges both decades of law as well as consumer thinking about privacy.

As a technology, it may well save thousands of lives in applications like predictive medicine, but if it isn’t used carefully, it may prevent thousands from getting loans, for instance, if an underwriting algorithm is biased against certain users.

I chatted with Dennis Hirsch a few weeks ago about the challenges posed by this new data economy. Hirsch is a professor of law at Ohio State and head of its Program on Data and Governance. He’s also affiliated with the university’s Risk Institute.

“Data ethics is the new form of risk mitigation for the algorithmic economy,” he said. In a post-Cambridge Analytica world, every company has to assess what data it has on its customers and mitigate the risk of harm. How to do that, though, is at the cutting edge of the new field of data governance, which investigates the processes and policies through which organizations manage their data.

You’re reading the Extra Crunch Daily. Like this newsletter?Subscribe for free to follow all of our discussions and debates.

“Traditional privacy regulation asks whether you gave someone notice and given them a choice,” he explains. That principle is the bedrock for Europe’s GDPR law, and for the patchwork of laws in the U.S. that protect privacy. It’s based around the simplistic idea that a datum — such as a customer’s address — shouldn’t be shared with, say, a marketer without that user’s knowledge. Privacy is about protecting the address book, so to speak.

The rise of “predictive analytics,” though, has completely demolished such privacy legislation. Predictive analytics is a fuzzy term, but essentially means interpreting raw data and drawing new conclusions through inference. This is the story of the famous Target data crisis, where the retailer recommended pregnancy-related goods to women who had certain patterns of purchases. As Charles Duhigg explained at the time:

Many shoppers purchase soap and cotton balls, but when someone suddenly starts buying lots of scent-free soap and extra-big bags of cotton balls, in addition to hand sanitizers and washcloths, it signals they could be getting close to

Read More

Continue Reading
Internet Security

Atrium, Justin Kan’s legal tech startup, launches a fintech and blockchain division

Atrium, the legal startup co-founded by Justin Kan of Twitch fame, is jumping into the blockchain space today. The company has raised plenty of money — including $65 million from a16z last September — so rather than an ICO or token sale, this is a consultancy business. Atrium uses machine learning to digitize legal documents and develop applications…


Atrium, the legal startup co-founded by Justin Kan of Twitch fame, is jumping into the blockchain space today.

The company has raised plenty of money — including $65 million from a16z last September — so rather than an ICO or token sale, this is a consultancy business. Atrium uses machine learning to digitize legal documents and develop applications for client use, and now it is officially applying that to fintech and blockchain businesses.

The division has been operating quietly for months and the scope of work that it covers includes the legality and regulatory concerns around tokens, but also business-focused areas including token utility, tokenomics and general blockchain tech.

“We have a bunch of clients wanting to do token offerings and looking into the legality,” Kan told TechCrunch in an interview. “A lot of our advisory work is around the token offering and how it operates.”

The commitment is such that the company is even accepting Bitcoin and Bitcoin Cash for payments through crypto processing service BitPay.

While the ICO market has quietened over the past year following huge valuation losses market-wide, up to 90 percent in some cases with many ICO tokens now effectively worthless, there’s a new antic

Read More

Continue Reading
Antivirus

D-Link’s D-Fend AC2600 router uses McAfee to protect your entire network

With the internet now an essential part of most people’s daily lives, the router that’s at the heart of every home’s connectivity has become increasingly important. And while we all reap the benefits of that access, it’s often easy to overlook the aspects that could negatively affect your family and home if left unmonitored and…


With the internet now an essential part of most people’s daily lives, the router that’s at the heart of every home’s connectivity has become increasingly important. And while we all reap the benefits of that access, it’s often easy to overlook the aspects that could negatively affect your family and home if left unmonitored and unprotected. 

With threats like malicious attacks (such as malware, botware, cryptojacking and more) and content or activities that are particularly unsafe for children (not to mention rising problems such as screen and video game addiction), router-makers have started to integrate more sophisticated tools to let households deal with these issues. 

D-Link is the latest to turn its attention towards better home-network protection and has teamed up with the antivirus

Read More

Continue Reading
Internet Security

OpenAI built a text generator so good, it’s considered too dangerous to release

A storm is brewing over a new language model, built by non-profit artificial intelligence research company OpenAI, which it says is so good at generating convincing, well-written text that it’s worried about potential abuse. That’s angered some in the community, who have accused the company of reneging on a promise not to close off its…


A storm is brewing over a new language model, built by non-profit artificial intelligence research company OpenAI,which it says is so good at generating convincing, well-written text that it’s worried about potential abuse.

That’s angered some in the community, who have accused the company of reneging on a promise not to close off its research.

OpenAI said its new natural language model, GPT-2, was trained to predict the next word in a sample of 40 gigabytes of internet text. The end result was the system generating text that “adapts to the style and content of the conditioning text,” allowing the user to “generate realistic and coherent continuations about a topic of their choosing.” The model is a vast improvement on the first version by producing longer text with greater coherence.

But with every good application of the system, such as bots capable of better dialog and better speech recognition, the non-profit found several more, like generating fake news, impersonating people, or automating abusive or spam comments on social media.

To wit: when GPT-2 was tasked with writing a response to the prompt, “Recycling is good for the world, no, you could no

Read More

Continue Reading