You are viewing 'Social Media Security'
ImageGate allows Ransomware Infection
With so many users accessing Facebook within corporate networks, it is imperative that your security team be up to date on current threats involving social media. A well-known piece of malware, Locky Ransomware, is spreading via Facebook Messenger by pretending to be a harmless image file. Since many companies allow employees to access Facebook, this presents a potentially massive hole in security programs.
The initial reports on this piece of ransomware show a commonality among the type of infection vector and approach used by the attackers. First, the user receives an instant message containing only an image file, or what appears to be an image file. It is usually titled generically with a .svg extension. A .svg (Scalable Vector Graphics) is an XML-based vector image, which is formatted for two dimensional graphics and support for animation and interactivity. These image files can be created and edited with any text... read more >
How social media makes you an easy target
Facebook, Instagram, Twitter, Pinterest, flickr, Tumblr, LinkedIn, etc. (the list could go on and on) are all well-known social networking sites. They have all become popular communications media for the vast majority of people. Take a minute to think about what some of these sites might say or what information they might have about you.
Now think about that information and if someone with malicious intent might be able to use it against you. Below is a quick... read more >
Social Media Scrooges
I recently had the pleasure of providing security guidance for a news story presented by the local Fox® affiliate. Since the reporter took a few liberties with what I actually said, I thought I would give you, the reader, these tips directly. So, here we go!
Some of what I’m about to say may seem like common sense but to the excited traveler anxiously awaiting a getaway weekend for the upcoming holidays, maybe not. There seems to be a common theme lately of people posting images of their boarding pass on social media sites, unaware of the dangers this actually poses. If we take a moment and examine the various boarding documents of the major airlines, we see a common occurrence of information, all of which when used together can pose pretty serious risk to the unaware holiday traveler.
Delta Airlines® Boarding... read more >
Tips to keep your family safe and secure online
I can say without a doubt that Halloween is my favorite holiday. I love the feeling of fall, the pumpkin carving, the apple cider, the delicious candy, the crazy costumes and the ability to really scare someone for one night a year.
I used to love being scared, and scaring those in return. Although, that all changed this year. My two kids, who are 7 and 8, are now getting to the age where they are starting to use computers, apps, and the dreaded Internet. My son is exceptionally advanced when it comes to technology as well, which doesn’t help. This is the scariest thing I have experienced in quite some time — knowing what it is like in cyberspace and all the... read more >
NCSAM Week 4: Your Evolving Digital Life
Week 4 of National Cyber Security Awareness Month (NCSAM) discusses “Your Evolving Digital Life.” With the Internet becoming more and more integrated in our daily lives, we are opening ourselves up to new threats and challenges. To illustrate my point, let’s discuss a Facebook example while applying the Operations security (OPSEC) process.
OPSEC is a term that originated with the U.S. military. OPSEC is a process that determines if information obtained by adversaries could be interpreted to be useful to them, and using the appropriate measures to eliminate or minimize the exploitation of that information. Simply stated, OPSEC is the protection of information so that it cannot be used against you by your enemies. As our digital lives evolve, we need to be sure to practice good OPSEC.
If we look at the OPSEC process, you can see how it can be applied to how we handle our digital lives. The OPSEC process... read more >