Connect with us

Hi, what are you looking for?

HEADLINES

Kaspersky statement on malicious video tags on social media

Social engineering is a manipulation technique that uses human psychology that cyber attackers use to trick someone or to lure unsuspecting users to expose data, spread malware infection, or give them network or computer access.

Yeo Siang Tiong
General Manager for Southeast Asia at Kaspersky

Yesterday, some social media users reported to have been tagged in malicious videos without their permission and by people they do not know. This is not the first time this has happened. But it appears to be an example of social engineering that cyber attackers use to get victims to respond by clicking on an infected attachment.

Social engineering is a manipulation technique that uses human psychology that cyber attackers use to trick someone or to lure unsuspecting users to expose data, spread malware infection, or give them network or computer access.

Scams based on social engineering are built around how people think and act. Attackers may use emotional manipulation to convince you to take an irrational or risky action that you otherwise wouldn’t. Fear, excitement, curiosity, anger, guilt, and sadness are emotions normally used to convince an unaware, clueless person.

Advertisement. Scroll to continue reading.

On social media, trust is important among users and it is also essential in a social engineering attack. Users are usually tricked by accounts they follow, usually under the names of people they know and trust.

As social engineering is an attack against a human being, not machine, we advise internet users to take basic measures to protect themselves. We recommend the following:

1. It’s cliché but the rule of thumb in internet security is always think before clicking.

2. Set a strong password.

3. On social media, take advantage of the security and privacy features of your favorite platform. You can control who can tag you or who can see your posts. Because Facebook regularly makes changes to their settings, it’s worth your attention and time to check your own saved settings from time to time to update it for maximum privacy.

Advertisement. Scroll to continue reading.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

This recognition underscores Kaspersky's commitment to providing robust security solutions tailored for industrial environments.

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

HEADLINES

During a recent webinar on Building Resilience Against Online Scams, hosted by fiber broadband and technology provider Converge ICT Solutions Inc., its Chief Executive...

HEADLINES

In 2024, Kaspersky restructured its Partner Program into four key partner types, recognizing the diverse profiles within its network – from traditional resellers and...

White Papers

The study tested 2,000 UK and US consumers, exposing them to a series of real and deepfake content. The results are alarming: only 0.1%...

Advertisement