Remove Accountability Remove Data collection Remove Media Remove Phishing
article thumbnail

How to Secure Your Business Social Media Accounts

BH Consulting

When we think about social media, we think about the nice side of it: staying in touch with friends and family, getting updates about our interests – but the more active we are on it, the more risk we’re exposed to. Having policies and procedures to secure social media accounts and minimise the potential for incidents can help.

Media 52
article thumbnail

Spam and phishing in 2022

SecureList

Short-lived phishing sites often offered to see the premieres before the eagerly awaited movie or television show was scheduled to hit the screen. At the beginning of that year, we still observed phishing attacks that used the themes of infection and prevention as the bait. Others offered the coveted Green Pass without vaccination.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why You Should Opt Out of Sharing Data With Your Mobile Provider

Krebs on Security

A new breach involving data from nine million AT&T customers is a fresh reminder that your mobile provider likely collects and shares a great deal of information about where you go and what you do with your mobile device — unless and until you affirmatively opt out of this data collection.

Mobile 286
article thumbnail

Phishers migrate to Telegram

Security Affairs

The experts pointed out that crooks engaged in phishing activities have started to rely on the popular instant messaging platform more in recent months. On Telegram is possible to find channels that offer: Free phishing kits that can be used to target users of a large number of global and local brands. User personal data for sale.

article thumbnail

Threat actors scrape 600 million LinkedIn profiles and are selling the data online – again

Security Affairs

For the third time in the past four months, LinkedIn seems to have experienced another massive data scrape conducted by a malicious actor. Once again, an archive of data collected from hundreds of millions of LinkedIn user profiles surfaced on a hacker forum, where it’s currently being sold for an undisclosed sum.

article thumbnail

How to Help Protect Your Digital Footprint

Identity IQ

Your digital footprint is the trail of data you leave behind when you use the internet and digital devices. It describes the sum of your online activities, from social media interactions to website visits and online transactions. Be Mindful of Your Online Accounts Your online accounts are key access points to your digital identity.

article thumbnail

Have you been Zynged? Who’s playing with your data even after you changed your breached credentials?

Hot for Security

If you were a victim of the Zynga data breach, you’ve probably changed the password for your account already. But have you considered resetting the passwords for any online accounts with similar login credentials? These data sets may include IP addresses, operating systems, browser type, game time and web page interactions.