Hiding Malware in Social Media Buttons

Schneier on Security

The syntax for hiding the skimmer’s source code as a social media button perfectly mimics an ‘svg’ element named using social media platform names (e.g., Uncategorized credit cards malware social engineering social media

Media 227

Do Not Post Your COVID-19 Vaccination Card On Social Media

Joseph Steinberg

It seems like every day that I see social media posts in which people share photos of the official COVID-19 vaccine card that they have received after being vaccinated against the novel coronavirus that has inflicted tremendous suffering worldwide over the past year.

Media 260
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Navigating the Rise of Social Media Breaches

Security Boulevard

Social media data breaches are on the rise. Protect your brand against social media scams with Bolster's automated digital risk protection system. The post Navigating the Rise of Social Media Breaches appeared first on Security Boulevard.

Media 67

Social Media: How to Keep Yourself Safe

Security Boulevard

We like to stay connected with friends, family and even workmates via social media. The post Social Media: How to Keep Yourself Safe appeared first on Security Boulevard. Human beings are social animals. It […].

Media 87

Cybersecurity Woes, Lax Patching Put Media Companies At Risk

Security Boulevard

The secure production, distribution and management of media is being threatened by a complex, fragmented third-party ecosystem leaving the media industry exposed to potential cybersecurity threats, a survey by BlueVoyant found. The percentage of media vendors.

Media 87

Hackers Hide Software Skimmer in Social Media Sharing Icons

Security Affairs

Security researchers have uncovered a new technique to inject a software skimmer onto checkout pages, the malware hides in social media buttons. The malicious payload is concealed as social media buttons that mimic social sharing icons such as Facebook, Twitter, and Instagram.

Media 101

Cyber Attack on American Streaming Media Plex

CyberSecurity Insiders

In the statement issued by Plex, the streaming media specified that the activity was discovered by it on August 23rd of this year and soon its IT staff, along with a third-party security firm, investigated.

Media 106

How Cybercriminals Weaponize Social Media

Digital Shadows

There’s no denying that social media has forever changed how we interact with one another. Social media has been more. The post How Cybercriminals Weaponize Social Media first appeared on Digital Shadows. Cybercrime and Dark Web Research fraud Impersonation scams Social Media

Media 98

Top Phishing and Social Media Threats: Key Findings from the Quarterly Threat Trends & Intelligence Report

Security Boulevard

Agari and PhishLabs have put together their Quarterly Threat Trends & Intelligence Report detailing their analysis of phishing and social media attacks this quarter. Data Security Security Bloggers Network IT Security and Data Protection Phishing social media Tactic threat report threats

Media 83

Social Media Account Verification Messages: CyberCriminals’ Latest Phishing Technique Exploits Both Human Emotions And Anti-Fraud Techniques

Joseph Steinberg

Social media users’ delight at receiving notification that their accounts have qualified for Verification (that is, receiving the often-coveted “blue check mark” that appears on the social media profiles of public figures) has become the latest target of criminal exploitation.

Media 207

Justice Thomas Steps in Social Media Immunity Thicket

Security Boulevard

230(c)(1), is generally considered to provide that entities that merely act as conduits for communication (like social media companies) are not considered “publishers” of third-party content, and therefore have no direct liability for what other people say on their site.

Media 91

The Top 8 Social Media Scams You Need to Watch Out For

Security Boulevard

Social media fraud losses comprised 26% of the total fraud losses reported in 2021. Here are some of the most popular social media scams that have fleeced social media users. The post The Top 8 Social Media Scams You Need to Watch Out For appeared first on Security Boulevard.

Media 63

Social media in the workplace: Cybersecurity dos and don’ts for employees

We Live Security

Do you often take to social media to broadcast details about your job, employer or coworkers? The post Social media in the workplace: Cybersecurity dos and don’ts for employees appeared first on WeLiveSecurity. Social Media

Media 114

Is Gmail A Social Media? [Here’s The ANSWER]

SecureBlitz

There has been an unending debate regarding the media status of Gmail. Is Gmail a social media? A lot of internet users ask the question – is it social media or just another messaging platform? Social media has made the world a global village where you can connect.

Media 72

Your Ultimate Social Media Security Checklist [2022 Updated]

Appknox

Social media is both a boon and a bane. billion active social media users worldwide. This is precisely the very reason why cyber criminals love social media as well. Keeping this in mind, we have created an ultimate social media security checklist.

Media 65

5 things to teach your kids about social media

Malwarebytes

With children now back at school, it’s time to think about social media, and their use of it. Now is the time to consider giving your kids some security and privacy tips for all their social media needs. Very few social media giveaways are genuine.

Media 83

Social Media: How to Keep Yourself Safe

Security Through Education

We like to stay connected with friends, family and even workmates via social media. The truth is social media is a buffet of information for a potential malicious hacker. In Hollywood, you may have seen the use of social media to locate a suspect in a police investigation. In heist movies, you may have seen the thieves use social media to find a post by a security guard with his badge in frame. Social media relies heavily on the use of geotagging.

Social Media Regulation: The Line Between Privacy and Protection

Security Boulevard

The debate over how much responsibility social media companies should have when it comes to regulating or policing what users post continues, particularly in the past year or so. The post Social Media Regulation: The Line Between Privacy and Protection appeared first on Security Boulevard.

Media 87

Attacking Soldiers on Social Media

Schneier on Security

A research group at NATO's Strategic Communications Center of Excellence catfished soldiers involved in an European military exercise -- we don't know what country they were from -- to demonstrate the power of the attack technique. Over four weeks, the researchers developed fake pages and closed groups on Facebook that looked like they were associated with the military exercise, as well as profiles impersonating service members both real and imagined.

Media 190

The Social Media We Ought to Have vs the Social Media We Actually Have

Hot for Security

Social media feels like the natural evolution of technology, like something that would have happened no matter what. It’s too late now to re-model social media, so we have to learn to live with what we have and make better choices from here on out. The Social Media we truly have.

Media 77

FBI investing millions in software to monitor social media platforms

Tech Republic Security

The Washington Post has revealed details of a contract with a software company that will allow the FBI to track social media posts. The post FBI investing millions in software to monitor social media platforms appeared first on TechRepublic.

Media 166

Cox Media Group Ransomware Attack Confirmed

Heimadal Security

Cox Media Group (CMG), an American media conglomerate, reported that it was attacked by a ransomware assault in June 2021, which knocked off live TV and radio broadcast feeds. The post Cox Media Group Ransomware Attack Confirmed appeared first on Heimdal Security Blog.

Media 98

State-sponsored cyberespionage campaigns continue targeting journalists and media

Tech Republic Security

The post State-sponsored cyberespionage campaigns continue targeting journalists and media appeared first on TechRepublic. Journalists have information that makes them particularly interesting for state-sponsored cyberespionage threat actors. Learn more about these threats now.

Media 150

How to Detect and Stop Social Media Fraud

Security Boulevard

Social media is the new stage for threat actors to defraud your business & brand. The post How to Detect and Stop Social Media Fraud appeared first on Security Boulevard. Security Bloggers Network brand protection social media protection

Media 83

Social Media Intelligence: Addressing National Security Challenges with SOCMINT

Security Boulevard

Social media intelligence is a relatively new intelligence discipline in the public sector. The post Social Media Intelligence: Addressing National Security Challenges with SOCMINT appeared first on Flashpoint.

Media 52

Cox Media Group took down broadcasts after a ransomware attack

Security Affairs

American media conglomerate Cox Media Group (CMG) was hit by a ransomware attack that took down live TV and radio broadcast streams in June 2021. The post Cox Media Group took down broadcasts after a ransomware attack appeared first on Security Affairs.

Media 94

Social Media Risks Increasing in 2021

Security Boulevard

Businesses, employees and their customers rely on social media interactions more than ever since COVID-19 arrived. However, social media usage should raise certain privacy concerns. Which, The post Social Media Risks Increasing in 2021 appeared first on Security Boulevard.

Media 114

Hackers abuse Plex Media servers for DDoS amplification attacks

Security Affairs

Netscout experts warn of DDoS-for-hire services abusing Plex Media servers to bounce junk traffic and amplify DDoS attacks. Plex Media Server is a personal media library and streaming system that runs on modern Windows, macOS, and Linux operating systems.

Media 102

Manipulative Social Media Practices

Schneier on Security

The Norwegian Consumer Council just published an excellent report on the deceptive practices tech companies use to trick people into giving up their privacy. From the executive summary: Facebook and Google have privacy intrusive defaults, where users who want the privacy friendly option have to go through a significantly longer process. They even obscure some of these settings so that the user cannot know that the more privacy intrusive option was preselected.

Media 135

Social Media Safety Awareness Tips

Security Boulevard

Social media provides a way to stay connected and share with others, but did you know that the cyber criminals will also use social media as another technique to conduct their attacks. The post Social Media Safety Awareness Tips appeared first on Security Boulevard.

Media 81

Social Media Companies Tout “War Rooms” To Combat Election Interference

Adam Levin

The social media companies Facebook and Reddit are publicizing “War Rooms” set up to closely monitor their network content for election tampering. While social media companies are at least appearing to put forward a good faith effort to prevent the same sort of electoral interference that occurred in 2016, some experts have questioned whether or not these approaches are keeping up with the newer strategies and techniques developed by foreign troll farms.

Media 151

$770 Million Lost from Social Media Fraud Surge

Heimadal Security

The post $770 Million Lost from Social Media Fraud Surge appeared first on Heimdal Security Blog. Cybersecurity News fraud FTC social media

Media 101

NortonLifeLock Introduces Social Media Monitoring

Dark Reading

New feature helps protect against social media account takeovers and cyberbullying

Media 54

Asian media company Nikkei suffered a ransomware attack

Security Affairs

The media company Nikkei has disclosed a ransomware attack and revealed that the incident might have impacted customer data. The Japanese-based media company Nikkey is focused on the business and financial industry, it is the world’s largest financial newspaper.

Media 101

How to Prevent and Respond to Social Media Impersonations

Security Boulevard

Social media impersonations have become a very popular tactic to deploy online scams. The post How to Prevent and Respond to Social Media Impersonations appeared first on BlackCloak | Protect Your Digital Life™. Security Bloggers Network Cyber Threats Privacy social media

Media 52

OSINT: Mapping Threat Actor Social Media Accounts

Security Boulevard

A threatening social media post targeting an executive, employee, brand, or any other asset often has merit to it, and investigating the online accounts associated with the threat actor is imperative in the process of assessing risk.

Media 105

Cox Media Group Hit by Cyberattack

Heimadal Security

Cox Media Group’s television and radio stations across the U.S. The post Cox Media Group Hit by Cyberattack appeared first on Heimdal Security Blog. Cybersecurity News Cox Media Group cyberattack cyberattacks ransomware attack security breach

Media 83

Anonymous leaks a million emails from Russian state media

CyberSecurity Insiders

Anonymous, an internationally recognized hacking group, has leaked over 900,000 emails belonging to Russian state media channels. The post Anonymous leaks a million emails from Russian state media appeared first on Cybersecurity Insiders.

Media 105

Best Practices for Social Media Security

Trend Micro

Social media is a double-edged sword, and as we celebrate #SocialMediaDay, let’s remember to use best security practices to keep us safe from malicious actors who abuse the platforms. Cyber Crime Social Media Security Strategies Articles, News, Reports Cyber Threats

Media 79

Social Media: Thwarting The Phishing-Data Goldmine

Threatpost

Cybercriminals can use social media in many ways in order to trick employees. InfoSec Insider Web Security brian foster data goldmine infosec insider mobiliron multifactor authentication Phishing pitfalls remote workers social media Twitter Hack work from home zero-trust security

Media 90

The Social Media We Ought to Have vs the Social Media We Actually Have

Hot for Security

Social media feels like the natural evolution of technology, like something that would have happened no matter what. It’s too late now to re-model social media, so we have to learn to live with what we have and make better choices from here on out. The Social Media we truly have.

Media 52

Lapsus$ ransomware gang hits Impresa, Portugal’s largest media conglomerate

Security Affairs

The Lapsus$ ransomware hit Impresa, the largest media conglomerate in Portugal and the owner of SIC and Expresso. The Lapsus$ ransomware gang has compromised the infrastructure of Impresa, the largest media conglomerate in Portugal.

Media 108

Social Media Monitoring Best Practices

Digital Shadows

This blog is drawn from the Digital Shadows’ Social Media Monitoring Solutions Guide, which provides best practices for security teams. The post Social Media Monitoring Best Practices first appeared on Digital Shadows. Brand Protection Social Media

Media 52