In the context of the celebration for the Internet Day on May 17, ESET analyzes the use that is given to social networks and shares tips to enjoy them safely.
ESET, a leader in proactive threat detection, analyzes the phenomenon of overexposure of users on social networks and tips on how to enjoy them safely.
“We live in an era in which everything is shared, where the boom of sites and platforms for the networking opened a new way to share all kinds of personal information; to the point that the disclosure of a large amount of personal details on the Internet went on to a second place of importance for users.”, says Camilo Gutierrez, chief of laboratory of ESET Latin America.
The digital phenomenon of immediately sharing what is experienced does not represent risk, but the incidence of digital is more related to the type of information shared and to whom it is given access.
It is important to stop and analyze the risks you are exposed to by sharing personal information on social platforms. It is also recommended to configure application permissions to filter who can see the activities. Given that most users often use more than one social network, a criminal may be able to build a fairly detailed profile of an attack target by simply collecting information from their profiles and activities in each of their accounts in Social networks.
Saturated with personal information, social networks became an ideal territory for criminals. Having used these sites as recognition tools, an attacker can send a directed message (spearphishing) in which he tries to persuade a user to visit a fake page, which appears to be legitimate, in order to steal the credentials and Money. Manipulation techniques are also used for the user to open an infected attachment, which acts as a dropper of other malware capable of filtering data or recording everything that is typed into the computer using a keylogger.
ESET Latin America about tips to counteract risks from excessive digital information exchange:
- Review and configure the privacy options available on each of the social networks that are used.
- Whenever possible, it is recommended to limit the access of people who can see what it is doing.
- To analyze the information that it decides to publish, just published something is lost control over what others do with this material. It’s always safest avoid publishing what we would not like to see the public see.
- Think like an attacker: Does the information you share be used against us? If so, we’d better not share it.
- Be careful of suspicious messages, whether they contain links or sound too good to be true. This recommendation applies even for messages sent by acquaintances, as an attacker may have violated the account.
- Check the friendship requests, ideally accepting requests from friends, acquaintances or people with whom you have friends in common in real life.
“We must take into account that the information we expose can not only be used by cybercriminals, today we also analyze the profiles from human resources consultants, or prior to a meeting with a person for the first time. Although we are social beings by nature, from ESET we advise to make a use of social networks responsibly so that everyone can enjoy the Internet safely. “, Camilo Gutierrez, head of laboratory for ESET Latin America, concluded.