Explore tens of thousands of sets crafted by our community.
Social Media Security Threats
12
Flashcards
0/12
Phishing Attacks
Phishing is a scam where attackers disguise as trustworthy entities to obtain sensitive data. Always verify URLs, and don't click on suspicious links. Use two-factor authentication as an additional security layer.
Identity Theft
Identity theft involves stealing personal information to impersonate a victim. Limit sharing personal details online and regularly review privacy settings on social media profiles.
Malware
Malware is malicious software that can harm or exploit systems. Avoid downloading files from untrusted sources and keep software up-to-date to reduce vulnerabilities.
Scareware
Scareware tricks users into downloading unnecessary and harmful software. Be skeptical of alarming pop-ups that suggest immediate action and use reputable antivirus tools.
Social Engineering
Social engineering manipulates individuals into divulging confidential information. Educate yourself about common tactics and be cautious when asked for information.
Fake News
Fake news spreads misinformation that can lead to security risks. Cross-verify information sources and think critically about the content you encounter.
Account Hacking
Account hacking involves unauthorized access to your social media accounts. Use strong, unique passwords and consider a password manager to keep them secure.
Spam and Botnets
Spam can flood your account with unwanted content, and botnets may control your account for malicious activities. Report spam and keep your account details confidential.
Catfishing
Catfishing involves creating fake identities to lure people into deceptive relationships. Always verify an individual's identity before sharing personal information or meeting in person.
Data Harvesting
Data harvesting is the collection of personal data without consent. Be aware of the permissions apps request and minimize the amount of personal data you share.
Profile Cloning
Profile cloning involves creating a nearly identical profile of a real user to deceive others. Frequently search your name on social media to detect clones and report them.
Cyberstalking
Cyberstalking is persistent tracking and harassment online. Keep personal information private, limit location sharing, and use block/report features to combat stalkers.
© Hypatia.Tech. 2024 All rights reserved.