ALL >> Computers >> View Article
Security Experts Warn Users On Twitter Account Suspension Scam

Recently, security researchers at Internet security firm Sophos identified an account suspension scam on Twitter. Internet users receive an e-mail, which appears to arrive from Twitter. The e-mail seeks users to re-verify their Twitter account within two days to avoid suspension. The e-mail also attempts to lure users to click on the e-mail by offering free offers. The e-mail reportedly carries an embedded image, which if clicked redirects Internet users to survey pages. The survey pages seek personally identifiable information from Internet users. Cybercriminals may use the collected information for fraudulent purposes.
Social media sites are growing in popularity as a convenient medium to connect, interact and collaborate. People share loads of personal information including photos on social networking and micro blogging sites such as Facebook and Twitter. People also share professional information on professional networking sites such as Linkedin. As such, these sites become a favorite hunting ground for perpetrators of crime. The ease with which, cybercriminals are able to defraud users has raised concerns regarding ...
... information confidentiality, integrity and availability.
In the latest attack, perpetrators apparently spoofed the e-mail to make it appear as coming from Twitter admin. Usually, legitimate companies do not seek confidential details through e-mail. Internet users must be cautious of e-mails seeking personal and financial information, redirecting to surveys or asking to download anti-virus software. Internet users must directly visit a legitimate site by typing the URL on the address bar. When Internet users are redirected to a site, which resembles a site of a legitimate company, they must check for spelling mistakes, prefixes and suffixes attached to the web address to confirm the authenticity of the website. Users of social media sites must adjust their privacy settings to prevent access of personal information to people other than those users intend to share. IT professionals must keep themselves updated on the evolving security scenario and security mechanisms through attending seminars, workshops and undertaking online university degree programs.
Attackers use diverse ways to attempt and defraud Internet users. Social engineering is one of the techniques used to deceive users. Both insiders as well as external agents may use social engineering techniques to extract confidential information. Attackers are increasingly using spear phishing techniques to extract confidential information from business organizations. Information security is crucial for retaining customer loyalty and continued business activities. Training sessions, mandatory e-learning and online degree may help employees in understanding security fundamentals. Organizations must also keep employees updated on latest security threats, and best practices.
Professionals qualified in masters of security science and security certification programs may help in proper evaluation of the security threats, implementation of new monitoring mechanisms, application of patches and software updates, and improving security practices in an organization. Proactive approach to cyber security may help in reducing security and data breach incidents in an organization.
Adherence to recommended cyber security practices, regular software updates, following security blogs, and alerts issued by vendors, government bodies and computer emergency response teams may help in strengthening the defenses against numerous Internet-based threats.
Add Comment
Computers Articles
1. How A Free Seo Checker Can Help You Understand And Improve Your WebsiteAuthor: Mahesh
2. "empowering Digital Excellence: Lcc Computer Education In Bhubaneswar"
Author: Khushi Gill
3. How Cat6 Ethernet Cables Improve Streaming, Gaming, And Downloads
Author: Jennifer Truong
4. Why Choose The 1452 Bluetooth Scanner In 2025?
Author: prime pos
5. Scraping Chipotle Menu Data From All Us Locations
Author: Food Data Scrape
6. The Rise Of Digital Marketing Agencies: A Deep Dive Into The Digital Marketing Landscape In Bangalore
Author: Cubikeymedia
7. What Are The Different Types Of Computer Cables?
Author: Jennifer Truong
8. How To Check If Your Business Idea Will Really Work?
Author: goodcoders
9. Boost Insights With Carfax Car Listing Data Extraction
Author: travel scrape
10. Cat6 Ethernet Cable: The Key To Faster Internet
Author: Jennifer Truong
11. Google Ads Company In Dubai: Realizing Business Growth With Webtek Digital
Author: webtek Digiytal
12. How To Troubleshoot Common Usb Cable Issues?
Author: Jennifer Truong
13. Why Melbourne’s Computer Shops Are The Best For Custom-built Pcs?
Author: Jack Williams
14. How To Manage Staff Productivity When Working Virtually?
Author: goodcoders
15. The Future Is Now – Top Digital Marketing Updates In 2025
Author: Gautam Khatnani