y Relationship Status, Telephone Number, Email Address and...

1
Phishing and Social Media Millions of people log in to their social media profiles every day. Troy is just one social media user of many. He logs on to share his photos and to check up on his friends. 1,317,000,000 ! In fact, over 1.3 billion users like Troy log onto their favorite social networking sites monthly. On his profile, you can find: Name, Date of Birth, Location, Workplace, Interests, Hobbies, Skills, Relationship Status, Telephone Number, Email Address and Favorite Food Troy About In spear phishing, social engineering is the use of known social behaviors and patterns to make targets more likely to take a suggested course of action, e.g. clicking on a link. So·cial en·gi·neer·ing S All of this information can be used against Troy by social engineers. ...or they can imitate Troy to trick his contacts. They can send crafted spear phishing emails to Troy’s inbox... percent of social media users who have made in-app purchases using payment cards 26 percent increase in reported social-media related crime in a four year span 780 Social media usage by the numbers percent of consumers whose purchasing decisions are influenced by social media posts 71 percent of adult Facebook users who do not know how to use its privacy controls 66 Luckily, there are ways to keep your information safe. ? Jane Smith Hey! Thanks for adding me as a contact! 4/8 ? Jane Smith Hey! I noticed you like Acme Sneakers. Check out this site—they have awesome prices! 4/13 Acme Sneakers for Cheap http://acmesneakers.premiumisp.net/store/a47ac0/index.html Chek out these awwsome deals on Acme Sneakers! Half price! Buy them while they last! Be cautious when you receive suspicious messages from your contacts—old or new. Camera C A M E R A L E N S AF 1 8 - 5 5 m m 1 : 1. 9 C A M E R A , I N C. Remember that information can be stolen from your photos as well as from text. Don’t submit a status update you wouldn’t want on the front page of the newspaper. You can also increase your privacy settings so only your friends can see your profile. Log in with Social SMP Log in with Social SMP Lastly, be careful what web sites you link your profiles to. Did you know? One major social network has more fake profiles than the population of Egypt. Social activities account for 91 percent of all mobile Internet activity. In January 2010, social media lures were used in 8.3% of all phishing attacks; by December of that year, they were used in 84.5% of attacks—a 918% increase. For more information about spear phishing, and how you can stay safe from it, visit at www.phishme.com. Copyright © 2014, PhishMe, Inc. All rights reserved. The PhishMe name and logo are trademarks of PhishMe, Inc. in the United States and other countries. Sources 1. http://www.iacpsocialmedia.org/Resources/FunFacts.aspx 2. http://www.searchenginejournal.com/25-insane-social-media-facts/79645/ 3. http://www.channelpro.co.uk/opinion/7658/taming-social-media-exhibitionist 4. http://www.socialmediatoday.com/content/30-statistics-how-social-media-influence-purchasing-decisions-infographic 5. http://www.darkreading.com/vulnerabilities-and-threats/microsoft-cybercrime-falling-into-two-distinct-camps/d/d-id/1097731? 6. http://www.theguardian.com/media/2012/dec/27/social-media-crime-facebook-twitter 7. http://www.internetsafety101.org/Socialmediastats.htm 8. http://www.bankrate.com/finance/banking/use-social-media-payments.aspx

Transcript of y Relationship Status, Telephone Number, Email Address and...

Page 1: y Relationship Status, Telephone Number, Email Address and ...blogs.ubc.ca/etec565a66b/files/2015/09/Phishing_in_Social_Media.pdf1: 1. C A M E R A, I N. Remember that information can

Phishing and Social Media

Millions of people log in to their social media profiles every day.

Troy is just one social media user ofmany. He logs on to share his photos and

to check up on his friends.

1,317,000,000!In fact, over 1.3 billion users like Troy log onto their favorite social networking sites monthly.

On his profile, you can find:Name, Date of Birth, Location, Workplace, Interests, Hobbies, Skills,Relationship Status, Telephone Number, Email Address and Favorite FoodTroy

About

In spear phishing, social engineering is the use ofknown social behaviors and patterns to make targets more likely

to take a suggested course of action, e.g. clicking on a link.

So·cial en·gi·neer·ingS

Allof this information can be used against Troy by social engineers.

...or they can imitate Troy to trick his contacts.

They can send crafted spearphishing emails to Troy’s inbox...

percent of social media users who have madein-app purchases using payment cards26 percent increase in reported social-media

related crime in a four year span 780

Social media usage by the numberspercent of consumers whose purchasing

decisions are influenced by social media posts 71percent of adult Facebook users who do not know how to use its privacy controls66

Luckily, there are ways to keep your information safe.

?Jane SmithHey! Thanks for adding me as a contact!

4/8

?Jane SmithHey! I noticed you like Acme Sneakers. Checkout this site—they have awesome prices!

4/13

Acme Sneakers for Cheaphttp://acmesneakers.premiumisp.net/store/a47ac0/index.html

Chek out these awwsome deals on Acme Sneakers! Half price! Buy them while they last!

Be cautious when you receive suspicious messages from your contacts—old or new.

Camera

C

AMERA LENS AF 18 - 55mm 1 : 1.9

CAMERA , INC.

Remember that information can be stolenfrom your photos as well as from text.

Don’t submit a status update you wouldn’twant on the front page of the newspaper.

You can also increase your privacy settings so only your friends can see your profile.

Log in with Social SMPLog in with Social SMP Lastly, be careful what web sites you link your profiles to.

Did you know?

One major social network has more fake profiles than the population of Egypt.1

Social activities account for 91 percent of all mobile Internet activity.2

In January 2010, social media lures were used in 8.3% of all phishing attacks; by December of that year, they were used in 84.5% of attacks—a 918% increase.

Did you know?

One major social network has more fake profiles than the population of Egypt.

Social activities account for 91 percent of all mobile Internet activity.

In January 2010, social media lures were used in 8.3% of all phishing attacks; by December of that year, they were used in 84.5% of attacks—a 918% increase.

For more information about spear phishing, and how you can stay safe from it, visit

at www.phishme.com.

Copyright © 2014, PhishMe, Inc. All rights reserved.The PhishMe name and logo are trademarks of PhishMe, Inc. in the United States and other countries.

Sources1. http://www.iacpsocialmedia.org/Resources/FunFacts.aspx2. http://www.searchenginejournal.com/25-insane-social-media-facts/79645/3. http://www.channelpro.co.uk/opinion/7658/taming-social-media-exhibitionist4. http://www.socialmediatoday.com/content/30-statistics-how-social-media-influence-purchasing-decisions-infographic5. http://www.darkreading.com/vulnerabilities-and-threats/microsoft-cybercrime-falling-into-two-distinct-camps/d/d-id/1097731?6. http://www.theguardian.com/media/2012/dec/27/social-media-crime-facebook-twitter7. http://www.internetsafety101.org/Socialmediastats.htm8. http://www.bankrate.com/finance/banking/use-social-media-payments.aspx