Antivirus, Internet Security, Social Media

How safe are social media platforms?

Just how safe are social media platforms? Social networking companies are known to spend millions of dollars to keep their…

Just how safe are social media platforms? Social networking companies are known to spend millions of dollars to keep their users protected from hackers on the internet.

With over 2 billion people having at least one account on either Facebook, Instagram, Youtube or Whatsapp, it goes without saying that social media is one of the cyber criminals’ favorite playgrounds they are always looking to exploit. After all, where else would one find such a large database of active internet users?

In fact, it would be shocking to know that over 80 percent of all internet crimes involve some kind of a social media platform. Criminals might use this information as identity theft to carry out various other crimes on the internet.

But, shouldn’t social media companies make sure that the user information they possess is well protected? Ultimately, that’s where their money is…

They definitely do! Most social media websites and apps that are used today are either owned by Facebook or Google. And as far as any serious intrusion of their servers resulting in substantial data theft is concerned, that actually never happened. Rather, most security compromises happen due to intelligent social engineering by hackers. According to a figure released by Facebook, that number was as high as 500,000 accounts in a single day.

So, what is social engineering? And, how do hackers get access to users’ accounts?

To gain access to a user’s account, all that is required is their username and password. The concept is straightforward. Hackers may employ one of their many deceptive techniques that have been carefully planned to manipulate individuals into providing personal information voluntarily. All they need is a platform to carry it out and that being – social media! Let’s discuss a few of these methods one at a time:

 

Phishing

 

For many, this term might not be new and some might have already been a victim of it. Phishing is a technique to obtain confidential information like usernames, passwords, bank, and credit card details through fraudulent disguised emails or WebPages asking users for their usernames and passwords.

Before the advent of social media, cyber culprits used emails to facilitate such operations. Today, social media websites have made this process a lot easier as once a user’s account is compromised, hackers proceed further by exploiting others in his friend’s network. Since users tend to use the same username and password across multiple platforms for simplicity, a breach of one account might have consequences on others as well.

 

Keyloggers

 

Keyloggers are software that, once installed on the system, monitor every move of a user. This includes typing usernames, passwords, and other sensitive information. The easiest way for hackers to entice users to install such software is by providing a link to a disguised software that claims to have a different purpose.

 

Wi-Fi networks

 

While you should be pretty safe if you are just using your private Wi-Fi connection, things might get a little unpleasant when it comes to public networks. Of course, it depends on the type of network itself and the devices connected to it. Cyber criminals have certainly been able to sniff data from users who are connected to weakly secured networks.

 

Physical access and Theft

 

One doesn’t really need to be a cyber mastermind to gain access to ones social media accounts. All that is required is gaining access to a user’s device. In fact, letting your device be in the wrong hands even for a few minutes is enough to have your valuable data stolen.

Most of us rely on our browsers and different website to remember our usernames and passwords. After all, why should we type in our information when our devices can remember them for us. However, these must be stored somewhere, right? Depending on the browser, these are saved in different locations on the user’s computer. Though they are encrypted, it wouldn’t be safe to presume they cannot be cracked once their location is known.

 

How can we keep our accounts safe?

 

Keeping your accounts secure shouldn’t be a devil of a job. All that is required is a little caution and awareness. After all, a small human error is all that a hacker might be looking for.

We’ve discussed the various techniques cyber attackers use to intrude into users’ accounts. Apart from that, there are various things that should be kept in mind while using social media. Let’s see how we can avoid them.

 

  • Use strong usernames and passwords that are hard to crack. Additionally, you can use a password manager to help you store them.
  • Avoid logging in through public hotspots. Not all social networking websites have a secure login system.
  • Be careful while clicking on links. It is best to avoid them if they aren’t from a known source. Hackers might often post tempting links to malicious phishing websites.
  • Keep your firewall on and anti-virus up-to-date.
  • Go through your profile settings. If you feel you want to hide some of your information, do not hesitate to do so.
  • Provide the least amount of personal information – If you are an administrator of a Facebook page, it is best to keep that role only to your self. An administrator has full access and control to a business page, including the ability to delete it, even if it wasn’t created by him. While you may have enough trust on someone you are assigning the role to, you never know when his account security is breached. Keeping the role to a moderator or editor is the way to go.
  • Remember to log-out of your accounts after every session.
  • Do not share your photos while you are away from home. Your absence might pose a risk of someone breaking into your house.
  • Disable location settings. You wouldn’t want all your friends and followers to know your exact location.

 

Social media platforms spend millions of dollars to keep their users protected. With so many social media networks out there today, one might be too lazy to take the necessary precautions to keep his accounts safe. However, it must be noted that almost all security breaches happen due to one kind of human error or another.

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Antivirus

Moonlock review: We put MacPaw’s new antivirus suite to work

Macworld At a glanceExpert’s Rating Pros Excellent viral and malware protection and detection Good purchase options Access to learning tools and YouTube links Cons Security Advisor module lacks functionality Menus don’t offer enough clarity sScan scheduler only allowing for 15-minute increments VPN auto-connects to the closest server Our Verdict Moonlock isn’t perfect…

Macworld

At a glanceExpert’s Rating

Pros

Excellent viral and malware protection and detection

Good purchase options

Access to learning tools and YouTube links

Cons

Security Advisor module lacks functionality

Menus don’t offer enough clarity

sScan scheduler only allowing for 15-minute increments

VPN auto-connects to the closest server

Our Verdict
Moonlock isn’t perfect…
Read More

Continue Reading
Antivirus

Avast Free Antivirus for Mac review: Basic protection, for free

Macworld At a glanceExpert’s Rating Pros Easy installation and setup Solid customization options such as whitelists, exceptions, and scheduled scans Handy network tools like Traffic Monitor and Network Inspector Cons Steady stream of ads, upgrade prompts, and assorted locked features The Web Guard module failed to catch obvious scam links The Scam Guard failed to

Macworld

At a glanceExpert’s Rating

Pros

Easy installation and setup

Solid customization options such as whitelists, exceptions, and scheduled scans

Handy network tools like Traffic Monitor and Network Inspector

Cons

Steady stream of ads, upgrade prompts, and assorted locked features

The Web Guard module failed to catch obvious scam links

The Scam Guard failed to detect scam…
Read More

Continue Reading
Antivirus

OpenAI’s shiny new Atlas browser might have some serious security shortcomings – and it’s not the only one under threat from dangerous spoof attacks

Fake AI sidebars can perfectly imitate real ones to steal secrets, experts warn Malicious extensions need only minimal permissions to cause maximum chaos AI browsers risk turning helpful automation into channels for silent data theft New “agentic” browsers which offer an AI-powered sidebar promise convenience but may widen the window for deceptive attacks, experts have


  • Fake AI sidebars can perfectly imitate real ones to steal secrets, experts warn
  • Malicious extensions need only minimal permissions to cause maximum chaos
  • AI browsers risk turning helpful automation into channels for silent data theft

New “agentic” browsers which offer an AI-powered sidebar promise convenience but may widen the window for deceptive attacks, experts have warned.

Researchers from browser security firm SquareX found a benign-looking extension can overlay a counterfeit sidebar onto the browsing surface, intercept inputs, and return malicious instructions that appear legitimate.

This technique undermines the implicit trust users place in in-browser assistants and makes detection difficult because the overlay mimics standard interaction flows.

You may like

  • ChatGPT Atlas OpenAI’s new Atlas browser may have some extremely concerning security issues, experts warn – here’s what we know
  • Representational image of a hacker Millions of users have fallen victim to malicious browser extensions because of a critical flaw, but things are changing — here’s what you need to know
  • Two hands typing on a laptop keyboard with a warning exclamation mark above it The surveillance browser trap: AI companies are copying Big Tech’s worst privacy mistakes

How the spoofing works in practice

The attack uses extension features to inject JavaScript into web pages, rendering a fake sidebar that sits above the genuine interface and captures user actions.

Reported scenarios include directing users to phishing sites and capturing OAuth tokens through fake file-sharing prompts. It also recommends commands that install remote access backdoors on victims’ devices.

The consequences escalate quickly when these instructions involve account credentials or automated workflows.

Many extensions request broad permissions, such as host access and storage, that are commonly granted to productivity tools, which reduces the value of permission analysis as a detection method.

Conventional antivirus suites and browser permission models were not designed to recognize a deceptive overlay that never modifies the browser code itself.

As more vendors integrate sidebars across major browser families, the collective attack surface expands and becomes harder to secure.

Users should treat in-browser AI assistants as experimental features and avoid handling sensitive data or authorizing account linkages through them, because doing so can greatly raise the risk of compromise.

You may like

  • ChatGPT Atlas OpenAI’s new Atlas browser may have some extremely concerning security issues, experts warn – here’s what we know
  • Representational image of a hacker Millions of users have fallen victim to malicious browser extensions because of a critical flaw, but things are changing — here’s what you need to know
  • Two hands typing on a laptop keyboard with a warning exclamation mark above it The surveillance browser trap: AI companies are copying Big Tech’s worst privacy mistakes

Security teams should tighten extension governance, implement stronger endpoint controls, and monitor for abnormal OAuth activity to reduce risk.

The threat also links directly to identity theft when fraudulent interfaces harvest credentials and session tokens with convincing accuracy.

Agentic browsers introduce new convenience while also creating new vectors for social engineering and technical abuse.

Therefore, vendors need to build interface integrity checks, improve extension vetting, and provide clearer guidance about acceptable use.

Until those measures are widely established and audited, users and organizations should remain skeptical about trusting sidebar agents with any tasks involving sensitive accounts.

Security teams and vendors must prioritize practical mitigations, including mandatory code audits for sidebar components and transparent update logs that users and administrators can review regularly.

Via BleepingComputer


Best antivirus software header
The best antivirus for all budgets

Our top picks, based on real-world testing and comparisons

➡️ Read our full guide to the best antivirus
1. Best overall:
Bitdefender Total Security
2. Best for families:
Norton 360 with LifeLock
3. Best for mob

Read More

Continue Reading
Antivirus

Your AI Agent Is Now a Target for Email Phishing

Email security has always been a cat-and-mouse game. Viruses are invented, and antivirus software is invented to catalog known viruses and detect their presence in email attachments and URLs. As viruses morphed into more sophisticated forms of malware, cybersecurity tools adapted to be able to scan for and detect these new threats…

Email security has always been a cat-and-mouse game. Viruses are invented, and antivirus software is invented to catalog known viruses and detect their presence in email attachments and URLs. As viruses morphed into more sophisticated forms of malware, cybersecurity tools adapted to be able to scan for and detect these new threats…
Read More

Continue Reading