123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Security Experts Warn Users On Twitter Account Suspension Scam

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Recently, security researchers at Internet security firm Sophos identified an account suspension scam on Twitter. Internet users receive an e-mail, which appears to arrive from Twitter. The e-mail seeks users to re-verify their Twitter account within two days to avoid suspension. The e-mail also attempts to lure users to click on the e-mail by offering free offers. The e-mail reportedly carries an embedded image, which if clicked redirects Internet users to survey pages. The survey pages seek personally identifiable information from Internet users. Cybercriminals may use the collected information for fraudulent purposes.

Social media sites are growing in popularity as a convenient medium to connect, interact and collaborate. People share loads of personal information including photos on social networking and micro blogging sites such as Facebook and Twitter. People also share professional information on professional networking sites such as Linkedin. As such, these sites become a favorite hunting ground for perpetrators of crime. The ease with which, cybercriminals are able to defraud users has raised concerns regarding ...
... information confidentiality, integrity and availability.

In the latest attack, perpetrators apparently spoofed the e-mail to make it appear as coming from Twitter admin. Usually, legitimate companies do not seek confidential details through e-mail. Internet users must be cautious of e-mails seeking personal and financial information, redirecting to surveys or asking to download anti-virus software. Internet users must directly visit a legitimate site by typing the URL on the address bar. When Internet users are redirected to a site, which resembles a site of a legitimate company, they must check for spelling mistakes, prefixes and suffixes attached to the web address to confirm the authenticity of the website. Users of social media sites must adjust their privacy settings to prevent access of personal information to people other than those users intend to share. IT professionals must keep themselves updated on the evolving security scenario and security mechanisms through attending seminars, workshops and undertaking online university degree programs.

Attackers use diverse ways to attempt and defraud Internet users. Social engineering is one of the techniques used to deceive users. Both insiders as well as external agents may use social engineering techniques to extract confidential information. Attackers are increasingly using spear phishing techniques to extract confidential information from business organizations. Information security is crucial for retaining customer loyalty and continued business activities. Training sessions, mandatory e-learning and online degree may help employees in understanding security fundamentals. Organizations must also keep employees updated on latest security threats, and best practices.

Professionals qualified in masters of security science and security certification programs may help in proper evaluation of the security threats, implementation of new monitoring mechanisms, application of patches and software updates, and improving security practices in an organization. Proactive approach to cyber security may help in reducing security and data breach incidents in an organization.

Adherence to recommended cyber security practices, regular software updates, following security blogs, and alerts issued by vendors, government bodies and computer emergency response teams may help in strengthening the defenses against numerous Internet-based threats.

Total Views: 270Word Count: 508See All articles From Author

Add Comment

Computers Articles

1. Access Review Fatigue Is Not A People Problem. It Is A Design Problem
Author: Tushar Pansare

2. Which Is The Best Data Recovery Service Provider In Delhi?
Author: Stellar Data Recovery India

3. Microsoft Access 2024 Vs. Microsoft Excel 2024: Which Tool Should You Use?
Author: davudobuya55

4. When Identity Governance Becomes An Audit Ritual
Author: Mansoor Alam

5. Power Virtual Agents To Microsoft Copilot studio
Author: brainbell10

6. Dream11 Clone App Guide For The Upcoming Ipl Season
Author: Jorden James

7. Computer Network Tutorial: Step-by-step Guide To Networking Fundamentals
Author: Tech Point

8. Ai Video Creation Services In Chandigarh | Growchip Ai Technologies
Author: AI Video Creation Services

9. Why Online Privacy Matters More Than Ever In 2026
Author: Faraz

10. Spark Matrix™: Data Integration Tools
Author: Umangp

11. D365 Consultant Business Success
Author: brainbell10

12. Medical High-end Touch Monitor From Fortec Integrated
Author: FORTEC Integrated GmbH

13. Why Rugtek Ls3002 Is Best For Retail Barcode Scanning
Author: prime pos

14. Spark Matrix™: Conversational Commerce
Author: Umangp

15. Multi-path Cellular Aggregation | Cellular Sd-wan India | Smoad
Author: SMOD

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: