Social Media presents a new set of challenges for the business and is a growing area of online brand abuse and fraud. Social Media provides a new mechanism for cybercrime affording the opportunity to distribute phishing and malware content.
Social engineering is a key component of Advanced Persistent Threats — APT attacks and often infrastructure breaches start with a social penetration, with the use of spear phishing.
Social Media provides a broad avenue for brand abuse, copyright infringements via unauthorized or fake accounts, groups and profiles.
Some of the potential uses for a fake social media profile are;
gain a trusted audience for the purpose of a phishing attack
harvest person information for other types of social engineering
distribution of targeted malware, malicious mobile Apps, or drive by links
collect a specific and captive audience to spread false or misinformation
social-squatting for the purpose of profit
Unauthorised Social Media accounts, groups can lead to a range of associated threats;
fraud losses from phishing and malware
customer or employee personal identifiable information loss
defamatory information being spread under the business’s brand
dilution of the business’s marketing message from duplicate accounts
C-level staff maybe directly targeted resulting in a range of issues
SOCIAL MEDIA MONITORING
iZOOlogic Social Media Monitoring penetrates deep into the social media spectrum to include:
Global and local social sites
Keyword and image based heuristics
Powerful visibility and control
Threat categorisation
Correlation of multiple data sources
Global Security Incident Response
SOCIAL MEDIA PROTECTION
Management of Social Strategy
Maintain the Social Message
Reduce Reputational Risk
Mitigate Adverse Social exposure
Social Brand Protection
Corporate Compliance
[…] now use social media platforms and spread their activities through clickbait by handcrafting catchy tweets and posts by […]
[…] will decide which community to take action on and then they will create a social media page eg. Facebook and Twitter which imitates the official page/presence of their […]
[…] social engineering component aims to trick the target via a messaging, usually email or instant messaging, into […]
[…] Examples of trademark and copyright infringement are fake websites and phishing sites, unauthorised social media accounts, rogue mobile apps, spoofed domain registrations, leaked private business documents and […]
[…] to keep it a daily habit to secure your social media accounts, refrain saving passwords using your browsers. Practice changing the passwords frequently, let us […]
[…] The creation of fake social media accounts representing the bank. These accounts hosted and distributed phishing URLs which directed […]
[…] Files and programs with sensitive financial information, email conversations, private messages on social media platforms, basically all of them are exposed and can literally be seen by the party on the other […]
[…] is reportedly phishing for information by creating fake female Israeli immigrant accounts used in Social Media to contact mostly male […]
[…] essentially a tracking device that links all of the information about your fitness habits to your social media accounts, and yes, that includes your personal identifiable information, such as your home address, exact […]
[…] set up for this purpose. Fake news is also being spread on trusted channels – such as popular social media platforms. When a message comes from a trusted source, a friend, an ally, surely you are more inclined to […]
[…] are we able to confidently say that the Social media is weaponized? From stalking, petty crimes, going up to wars and even elections. Social Media alone […]