Connect with us

Hi, what are you looking for?

HEADLINES

Kaspersky statement on malicious video tags on social media

Social engineering is a manipulation technique that uses human psychology that cyber attackers use to trick someone or to lure unsuspecting users to expose data, spread malware infection, or give them network or computer access.

Yeo Siang Tiong
General Manager for Southeast Asia at Kaspersky

Yesterday, some social media users reported to have been tagged in malicious videos without their permission and by people they do not know. This is not the first time this has happened. But it appears to be an example of social engineering that cyber attackers use to get victims to respond by clicking on an infected attachment.

Social engineering is a manipulation technique that uses human psychology that cyber attackers use to trick someone or to lure unsuspecting users to expose data, spread malware infection, or give them network or computer access.

Scams based on social engineering are built around how people think and act. Attackers may use emotional manipulation to convince you to take an irrational or risky action that you otherwise wouldn’t. Fear, excitement, curiosity, anger, guilt, and sadness are emotions normally used to convince an unaware, clueless person.

Advertisement. Scroll to continue reading.

On social media, trust is important among users and it is also essential in a social engineering attack. Users are usually tricked by accounts they follow, usually under the names of people they know and trust.

As social engineering is an attack against a human being, not machine, we advise internet users to take basic measures to protect themselves. We recommend the following:

1. It’s cliché but the rule of thumb in internet security is always think before clicking.

2. Set a strong password.

3. On social media, take advantage of the security and privacy features of your favorite platform. You can control who can tag you or who can see your posts. Because Facebook regularly makes changes to their settings, it’s worth your attention and time to check your own saved settings from time to time to update it for maximum privacy.

Advertisement. Scroll to continue reading.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The campaigns show attackers are capitalizing on people’s increasing familiarity with completing multiple authentication steps online – a trend HP calls ‘click tolerance’. 

White Papers

IBM X-Force observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied heavily on...

HEADLINES

Kaspersky participated in 95 independent tests and reviews, with its products being awarded first place 91 times and 92 TOP3 finishes, achieving the highest results among...

HEADLINES

‘Wangiri’ originated in Japan in the early 2000’s. The term describes the modus. ‘Wan’ is a play on the word ‘one’ while ‘giri’ means...

HEADLINES

Smart and its value brand TNT do not send text messages with clickable links. If you receive one—even if it looks like it’s from...

White Papers

n the Philippines, industry players are taking a more proactive approach to building a security framework for digital resilience.

HEADLINES

This marks the company’s first participation in the region’s premier tech event, where it will showcase its groundbreaking cybersecurity solutions to industry leaders, innovators,...

HEADLINES

A report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting...

Advertisement