Cyber criminals now targeting mobile users social media, What to do?

3 to 4 year years back cyber criminals were having less advantage in hacking a social networking account as it only allowed him to reach to victim’s personal information and nothing other then it. But, today the scenario has totally changed people around the world are using their social networking account as means of trading, as we all know, there is no requirement these days to make a new account on every site one can sign in with their social networking accounts too.

This has opened a clear route way for the hackers to get some cash out from their social networking hacks. According to the latest findings, hacking social networking accounts has become a piece of cake for the hackers, especially, with a number of accounts having weak passwords.

One particular example of this trend, we have already shown to you in one of our previous articles in which we provided to you an insight to how poker users were exploited by the hackers. The noticeable aspect of that hack was its multiplying affect which exploited more than accounts at a time.

Compromising Smartphones might also be another form of hacking which might speed up during upcoming days, especially, with phone banking getting popular each day. According to the Australian department of cyber crime, people aren’t protecting their Smarphones as their computer. There are a number if Smartphones currently operating without any anti-virus. The department thinks Smartphones are on a big risk, especially, after the identification of a new malware which can steal huge masses of data for the phone within no time. The malware is named as “form-grabbing malware”.

To combat all these security threats, the Australian cyber security team has enlist key measures for all of us which we must follow for our precious information to been stolen:

Maintain current anti-virus software that is obtained from a reputable source and is regularly updated.

* Make sure your operating system is updated to ensure any security vulnerabilities are mitigated.

* Use strong passwords to protect personal information.

* Passwords should also be kept secret and changed regularly.

* Limit the amount of personal information placed on the internet.

* Do not provide financial or other personal information to people you do not know and trust.

* Never click on links contained within spam or unexpected emails.

Related Posts