Social Media Attacks.

Slides:



Advertisements
Similar presentations
Internet Safety and Being a Cyber-Savvy Parent A Workshop with Partnership with Children and Origins High School.
Advertisements

How to protect yourself, your computer, and others on the internet
Social Networking: Facebook, Google+, and Pinterest (and maybe one or two others) Mary Rotman Publicist, OReilly Media.
Developed by Technology Services 1:1 Laptop Initiative
Managing the Security and Privacy Risks of Social Media Don Knox, CPP, CITRMS Global Security and Risk Analysis Manager Caterpillar (309)
Starter for 10 Unit 12: Twitter Transform IT SFT12_Twitter.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Social media threats. Warning! May contain mild peril.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Web 2.0: Concepts and Applications 5 Connecting People.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
Social Networking: Facebook, Twitter, and Google+ Mary Rotman Publicist, O’Reilly Media.
Anthony Bonomi, Amber Heeg, Elizabeth Newton, Bianca Robinson & Marzi Shabani.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
How To Protect Your Privacy and Avoid Identity Theft Online.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Threats to I.T Internet security By Cameron Mundy.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
Protecting Yourself Online (Information Assurance)
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
IT security By Tilly Gerlack.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
Task 1 Research on any 2 of the following: Online shopping Online banking Web broadcasting Social networking sites Discuss the disadvantages and advantages.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Web Attacks— Offense… The Whole Story Yuri & The Cheeseheads Mark Glubisz, Jason Kemble, Yuri Serdyuk, Kandyce Giordano.
Social Media 101 An Overview of Social Media Basics.
1. Go to 2. Complete the requested information.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
How Videos and Social Media Work Together. Social media and videos are two of the most powerful outlets that companies have online for gaining new business.
Getting Started in Social Media OCTS – Andrea Gonzalez Feb. 8, 2013.
Technology Social Media Unit 1. What is Social Media? Social media is the interaction among people in which they create, share or exchange information.
The social impacts of IT: Spending more time on the computer, laptop, phone, tab etc. than going outside. Negative effect on health. Negative effect on.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
How Chapters Can use Social Media Mark Storace Sacramento Chapter Jan 2011.
Are your children safe online?. Welcome You are first-generation Internet parents Our children are the first generation to be born and raised with the.
Safety.
Media, Social Networking & Our Children
How to stay safe using the internet & App’s
How to stay safe using the internet and app’s?
Social Media Security: Understanding how to keep yourself safe.
An Introduction to Phishing and Viruses
Online Social Network: Threats &
5. Social Networks 78.
How to use the internet safely and How to protect my personal data?
Information Security.
How to use the internet safely and How to protect my personal data?
Lesson 3 Safe Computing.
Discussion – what kind of bullying is taking place in the images
Discover How Your Business Can Benefit from a Facebook Fanpage
Discover How Your Business Can Benefit from a Facebook Fanpage
Table of Contents Tips for Success Send s
Topic 5: Online Communities Press F5 to view!
In the Classroom.
Overview Social media applications inform, educate, and entertain people through online (multi-)media A social networking application allows users to create.
Risk of the Internet At Home
Social Media Safety Freshman Seminar.
ICT Communications Lesson 3: Internet Life and Privacy
E-safety Awareness for Parents and Carers
Internet Safety – Social Media
Communicating in the IT Industry
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Why Social Media? Think of the marketing potential that is inexpensive, anyone can do, and how effective it is.
Presentation transcript:

Social Media Attacks

How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks or cybercriminal activities Typically happen when user log in to their social networking sites like Facebook or Twitter Users encounter malicious posts while browsing people’s profiles

Continued Posts usually include malicious URLs that can lead to malware download pages or can trigger spamming routines Cyber criminals have started using public interest in social media to send spammed messages from a legitimate social media site

Types of Attacks: Facebook Lifejacking attacks: Cybercriminals are making creative and interesting posts to use as bait such as celebrity news or popular events Once clicked, the user is becoming an accomplice to the attack because the spam is automatically reposted on their wall and their contacts’ wall as well A popular version of this attack causes users to like a post without the users’ consent Sometimes this will lead users to survey sites which the cybercriminal can even profit from

Facebook: Rogue Applications Rogue Applications: On social media sites, users are able to play games that have open platforms where almost anyone can submit applications Cybercriminals use this to set up applications that can be used for spamming or phishing attacks.

Facebook Chat Attacks One of the most common attacks occurs on Facebook chat because cybercriminals can strike up conversation with friends and communicate with their contacts in real time Chat messages can be used to spread malware or promote phishing applications by impersonating you on chat and messaging your contacts the spam or malware to your contacts. Have been able to impersonate security team of social media sites in the past.

Facebook Chat Attacks Viral spam chain: where if you click a link on Facebook it will send out massive spam to your Facebook connections To prevent it make sure you do not open these type of links, which usually have the old Facebook look

Example

Results

Twitter Spammed Tweets: Despite the short character count many cybercriminals have found a way to use this to their advantage by creating short compelling posts with links. ( free vouchers, weight loss programs) Malware downloads: Twitter is also used to spread malicious malware download links similar to Facebook.

KOOBFACE Most popular type is KOOBFACE, which is a multiplatform worm that targets both Facebook and Twitter, which leads users to fake YouTube page where they download the malware KOOBFACE is dangerous because it is capable of stealing personal information from your social media pages such as email, interests, employer.

Prevention Use basic online precautionary measures Users need to watch out for bogus notifications When looking at other people’s pages, user needs to realize not everything on pages is safe. Users should make sure to protect the privacy of their data and to remember that anything posted is publically available. Think and analyze before you click the link Understand the security settings and avoid sharing personal details. If you notice it report it to the site’s security team.