Use strong passwords, two-factor authentication to avoid frauds
Hyderabad: Social Media has its own set of unique risks, whether it’s phishing attacks, protecting corporate accounts from compromise, fighting fraud or defending against social engineering scams like impersonating accounts.
Social media accounts are susceptible to exploitation, probable attacks that can happen are (a) #HashtagHijacking (b) Cross-Site Scripting (XSS) & Cross-Site Request Forgery (CSRF) (c) Pharming (d)Phishing and ClickJacking (e) Identity Theft and (f) Impersonation.
Whether it’s a quick money or copy product or work from home or an impersonation or a quick job on social media, few red flags, that you should notice are:
* It sounds too good to be true
* Promising guaranteed with very high returns
* Pressure to buy/accept Immediately “Expires Today”
* Affinity Fraud – Advertisements by Paid Social Media Influencers
* You are paying in advance
* Work from home frauds – Homemakers and students (victims) are prompted to pay a processing fee to gain large sums of money and the scammers pretending to be officials from law and enforcement agencies collect the money by the way of social engineering for errors they have made during the work from home tasks
* Advertisement Frauds – Social Media market places are popular destinations for fraudsters where copy products (replica) are displayed and sold. Many never dispatch the products and they don’t provide ‘Cash on Delivery’ Feature.
* Job frauds “Open to Work” – Job Portals are a popular destination for fraudsters, they look for people who have a status of open to work and do the social engineering and dupe the innocent people in the form of collecting registration and backdoor charges. Since there is no fact-checking facility on job portals, it’s recommended to crosscheck before you start a conversation.
* Money Double Frauds – Often we see posts claiming to give Rs.2000 to Rs.30,00 per day, they mimic popular stores like Amazon, Snapdeal, Naptol, and Jabon. Victims end up buying a product that is virtually displayed on a website with a virtual value (No Physical Product). Anyone who buys this product, the referral will get referral margins that get added to the virtual value. Unfortunately, this virtual displayed money can never be withdrawn forever.
* Money Transfers – Sensitive information leakage through social engineering scams (You’re more likely to share information with a profile whom you think is your CEO or CFO, authorizing a payment transfer!)
* Facebook Impersonation – Seeking money from common friends posing an emergency (Many police officers accounts are cloned/impersonated – Most happening Social Engineering Scam Now – Transfer money only upon talking in person or over the phone after due verification)
* Honey Trapping / Cat Fishing – It’s a well-known scam, where a fake social media profile is created in order to seduce a victim into a fictitious online relationship, in order to extract money from the victim by blackmailing.
* Likes and Followers – A scammer creates a fake social media profile, to sell likes, retweets, shares, comments and followers are most popular in India where bots are used.
* Pump & dump schemes – It involves social media advertising of a company’s stock through false and misleading statements to the marketplace made on social media platforms and chat rooms. They do social engineering with readers and make them buy a stock quickly or to sell before the price goes down.
i. Use strong passwords with Capital, Numeric and Special Characters.
ii. Use separate emails and passwords for banking, social and personal accounts
iii. Don’t use social media on public devices or with public Wi-Fi.
iv. Disable access to GPS for your social media platforms.
v. Be wary about clicking shorts links from friends in social media – These links trick you into providing personal information to steal your money or identity, or cause malicious software to automatically infect your social media accounts.
vi. Use two-factor authentication for all Social Profiles.
vii. Keep personal information to a minimum, even on your private social profiles
viii. Log out of the social media account completely to terminate the online session.
ix. Delete the computer’s “temporary Internet files” and Internet history so that no cache is used for phishing or targeted marketing.
x. Buy products only from reputed e-commerce sites and not through social media advertisements – See the URL completely for its legitimacy.
(The author is the founder of End Now Foundation, www.endnowfoundation.org)
Now you can get handpicked stories from Telangana Today on Telegram everyday. Click the link to subscribe.