Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Social Networking: Facebook, Google+, and Pinterest (and maybe one or two others) Mary Rotman Publicist, OReilly Media.
Developed by Technology Services 1:1 Laptop Initiative
Managing the Security and Privacy Risks of Social Media Don Knox, CPP, CITRMS Global Security and Risk Analysis Manager Caterpillar (309)
The Importance of Social Media. Some facts and statistics: Nearly 1 out of every 5 minutes online is spent on social media Facebook reached 1.11 billion.
Starter for 10 Unit 12: Twitter Transform IT SFT12_Twitter.
Social media threats. Warning! May contain mild peril.
Explain the social impacts of the use of IT.. Social Social networking has made the world Bigger and easier to communicate with others. It allows friends,
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Web 2.0: Concepts and Applications 5 Connecting People.
Web 2.0: Concepts and Applications 5 Connecting People.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
WEB2.0 Social Media & Independent Pharmacy Real World Use & Possibilities.
Social Networking: Facebook, Twitter, and Google+ Mary Rotman Publicist, O’Reilly Media.
 Look at starting dates  Uses  What they have in common  Examples of use.
Anthony Bonomi, Amber Heeg, Elizabeth Newton, Bianca Robinson & Marzi Shabani.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
 Why would you want to be connected? o To make online connections that will improve your efficiency and speed o To provide a near instant platform.
How To Protect Your Privacy and Avoid Identity Theft Online.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Threats to I.T Internet security By Cameron Mundy.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
Protecting Yourself Online (Information Assurance)
C HAPTER Social Networking Using Twitter 7 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
IT security By Tilly Gerlack.
What is social networking? 1.Social networking is the grouping of individuals into specific groups 2.networking is possible in person, for example in.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
Task 1 Research on any 2 of the following: Online shopping Online banking Web broadcasting Social networking sites Discuss the disadvantages and advantages.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Web Attacks— Offense… The Whole Story Yuri & The Cheeseheads Mark Glubisz, Jason Kemble, Yuri Serdyuk, Kandyce Giordano.
Social Media 101 An Overview of Social Media Basics.
1. Go to 2. Complete the requested information.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
How Videos and Social Media Work Together. Social media and videos are two of the most powerful outlets that companies have online for gaining new business.
Getting Started in Social Media OCTS – Andrea Gonzalez Feb. 8, 2013.
FaceBook…. Really?? FaceBook…. Really?? Social networking & Facebook Pam Krambeck, ESU#3
LPM – Unit 1 L 4 Socialising on the internet. How do you keep in contact with your friends and family? List all of the different types of technology.
Using Social Media for Fundraising and Communication with Supporters Lindsay Boyle – Communications & Research Coordinator Claire Chapman – Information.
Technology Social Media Unit 1. What is Social Media? Social media is the interaction among people in which they create, share or exchange information.
The social impacts of IT: Spending more time on the computer, laptop, phone, tab etc. than going outside. Negative effect on health. Negative effect on.
Intro to Growing Your Brand with Facebook and Twitter Tracy Gold Social Media Consultant
E-Safety Parent Talk Helping to keep your children safe online.
Sarah Manuel Final Presentation MCO435-Social Media.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
How to stay safe using the internet & App’s
Social Media Security: Understanding how to keep yourself safe.
An Introduction to Phishing and Viruses
Social Media Attacks.
Online Social Network: Threats &
Information Security.
Lesson 3 Safe Computing.
Discover How Your Business Can Benefit from a Facebook Fanpage
Discover How Your Business Can Benefit from a Facebook Fanpage
Overview Social media applications inform, educate, and entertain people through online (multi-)media A social networking application allows users to create.
Risk of the Internet At Home
Internet Safety – Social Media
Communicating in the IT Industry
Why Social Media? Think of the marketing potential that is inexpensive, anyone can do, and how effective it is.
Presentation transcript:

Social Media Attacks By Laura Jung

How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks or cybercriminal activities Typically happen when user log in to their social networking sites like Facebook or Twitter Users encounter malicious posts while browsing people’s profiles

Continued Posts usually include malicious URLs that can lead to malware download pages or can trigger spamming routines Cyber criminals have started using public interest in social media to send spammed messages from a legitimate social media site

Types of Attacks: Facebook Lifejacking attacks: Cybercriminals are making creative and interesting posts to use as bait such as celebrity news or popular events Once clicked, the user is becoming an accomplice to the attack because the spam is automatically reposted on their wall and their contacts’ wall as well A popular version of this attack causes users to like a post without the users’ consent Sometimes this will lead users to survey sites which the cybercriminal can even profit from

Facebook: Rogue Applications Rogue Applications: On social media sites, users are able to play games that have open platforms where almost anyone can submit applications Cybercriminals use this to set up applications that can be used for spamming or phishing attacks.

Facebook Chat Attacks One of the most common attacks occurs on Facebook chat because cybercriminals can strike up conversation with friends and communicate with their contacts in real time Chat messages can be used to spread malware or promote phishing applications by impersonating you on chat and messaging your contacts the spam or malware to your contacts. Have been able to impersonate security team of social media sites in the past.

Facebook Chat Attacks Viral spam chain: where if you click a link on Facebook it will send out massive spam to your Facebook connections To prevent it make sure you do not open these type of links, which usually have the old Facebook look

Example

Results

Twitter Spammed Tweets: Despite the short character count many cybercriminals have found a way to use this to their advantage by creating short compelling posts with links. ( free vouchers, weight loss programs) Malware downloads: Twitter is also used to spread malicious malware download links similar to Facebook.

KOOBFACE Most popular type is KOOBFACE, which is a multiplatform worm that targets both Facebook and Twitter, which leads users to fake YouTube page where they can download the malware KOOBFACE is dangerous because it is capable of stealing personal information from your social media pages such as , interests, employer.

Prevention Use basic online precautionary measures Users need to watch out for bogus notifications When looking at other people’s pages, user needs to realize not everything on pages is safe. Users should make sure to protect the privacy of their data and to remember that anything posted is publically available. Think and analyze before you click the link Understand the security settings and avoid sharing personal details. If you notice it report it to the site’s security team.