Category : General, security

In today's interconnected world, social media platforms have become an integral part of our daily lives. They offer us the opportunity to connect with friends, share our experiences, and engage in meaningful conversations. However, with the excitement and convenience comes the threat of ‘Social Engineering’. 

Social Engineering refers to the manipulation of individuals to gain unauthorized access to personal information, commit fraud, or facilitate other malicious activities. Malicious actors have increasingly turned to social media as a lucrative front for executing their deceptive tactics.  

Phishing Attacks - Phishing attacks via social media often involve messages or posts that appear genuine, enticing users to click on malicious links or disclose sensitive information. Be cautious of unsolicited messages, especially those requesting financial or personal details. Verify the authenticity of the sender before sharing any sensitive information. 

Impersonation and Identity Theft - Social media profiles are easy targets for impersonation. Cybercriminals create fake accounts using stolen personal information and attempt to build trust with unsuspecting individuals. These imposters can then exploit relationships to gather more personal information or engage in fraudulent activities. Be vigilant when accepting friend requests or engaging in conversations with unfamiliar profiles and verify the authenticity of the person before sharing personal details. 

Revealing Personal Information - Often, social media users unknowingly expose a significant amount of personal information, which can be used against them in social engineering attacks. Of particular note: avoid viral questionnaires! Studies reveal that many are asking your password reset questions! 

Malicious Links and Downloads - Cybercriminals leverage social media to distribute malware and malicious links. These links often lead to infected websites or downloads that compromise your computer's security. Exercise caution when clicking on links, especially those shared by unfamiliar users or embedded within suspicious messages. Install reputable antivirus software and regularly update it to safeguard against potential threats. 

Oversharing and Social Engineering Attacks - Be mindful of oversharing on social media. Posting about your daily routine, travel plans, or personal achievements may inadvertently provide cybercriminals with information they can exploit. Exercise discretion and consider the potential consequences before sharing personal details that could be used against you in social engineering attacks. 

How do I protect myself? 

Strengthen Your Privacy Settings - Regularly review and adjust your privacy settings on social media platforms to control who can access your personal information and posts. Limit the visibility of your profile to people you know and trust. 

Exercise Skepticism - Maintain a healthy skepticism when interacting with unknown profiles or receiving unsolicited messages. Be cautious of requests for personal information, financial assistance, or requests to click on suspicious links. Verify the identity of the person through alternative means (don’t be afraid to call someone at a trusted number!) before sharing any sensitive information. 

 

WU ITS Information Security

For more information about cybersecurity topics, be sure to visit www.washburn.edu/cybersecurity  


Archives

2023 2022

Available Blogs

 security
 cascade
 D2L
 resourcespace