Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Social Media Security Threats

12

Flashcards

0/12

Still learning
StarStarStarStar

Cyberstalking

StarStarStarStar

Cyberstalking is persistent tracking and harassment online. Keep personal information private, limit location sharing, and use block/report features to combat stalkers.

StarStarStarStar

Phishing Attacks

StarStarStarStar

Phishing is a scam where attackers disguise as trustworthy entities to obtain sensitive data. Always verify URLs, and don't click on suspicious links. Use two-factor authentication as an additional security layer.

StarStarStarStar

Spam and Botnets

StarStarStarStar

Spam can flood your account with unwanted content, and botnets may control your account for malicious activities. Report spam and keep your account details confidential.

StarStarStarStar

Identity Theft

StarStarStarStar

Identity theft involves stealing personal information to impersonate a victim. Limit sharing personal details online and regularly review privacy settings on social media profiles.

StarStarStarStar

Data Harvesting

StarStarStarStar

Data harvesting is the collection of personal data without consent. Be aware of the permissions apps request and minimize the amount of personal data you share.

StarStarStarStar

Fake News

StarStarStarStar

Fake news spreads misinformation that can lead to security risks. Cross-verify information sources and think critically about the content you encounter.

StarStarStarStar

Scareware

StarStarStarStar

Scareware tricks users into downloading unnecessary and harmful software. Be skeptical of alarming pop-ups that suggest immediate action and use reputable antivirus tools.

StarStarStarStar

Social Engineering

StarStarStarStar

Social engineering manipulates individuals into divulging confidential information. Educate yourself about common tactics and be cautious when asked for information.

StarStarStarStar

Catfishing

StarStarStarStar

Catfishing involves creating fake identities to lure people into deceptive relationships. Always verify an individual's identity before sharing personal information or meeting in person.

StarStarStarStar

Profile Cloning

StarStarStarStar

Profile cloning involves creating a nearly identical profile of a real user to deceive others. Frequently search your name on social media to detect clones and report them.

StarStarStarStar

Malware

StarStarStarStar

Malware is malicious software that can harm or exploit systems. Avoid downloading files from untrusted sources and keep software up-to-date to reduce vulnerabilities.

StarStarStarStar

Account Hacking

StarStarStarStar

Account hacking involves unauthorized access to your social media accounts. Use strong, unique passwords and consider a password manager to keep them secure.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.