Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
Neustar, Inc.
Protect your website & network
using real-time information & analysis

www.neustar.biz
Data Security
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
Symantec: Be Careful When Using Instagram
Symantec: Be Careful When Using Instagram

By Barry Levine
November 15, 2012 9:52AM

Bookmark and Share
Symantec security analyst Ben Nahorney noted that the Instagram threat could lead to phishing scams, among other possible security issues. His advice to users is to set your account to Private, don't follow unknown Instagram followers, and don't click shortened URLs on Instagram unless you know where they lead.
 


Instagram is a social site for posting and sharing photos. According to the October cyber security report from Symantec, it's also beginning to harbor security threats.

Wherever there are lots of users, there will inevitably be attempts to trick users into revealing confidential information, and Instagram is only the latest to attract the attention of security watchers. In addition to the new Symantec report, there have previously been several reports of security issues with the privacy setting and other aspects of the site.

The Symantec report's author, Cyber Security Threat Analyst Ben Nahorney, found the threat he explored on Instagram took the form of enticing links and followers.

The Suspicious Trail

He said the trail began when he found a notification on his phone about a comment posted to his Instagram account. The comment read: "Hi there, Get a FREE Game in my Profile, OPEN it up, Get 85.90$ :-) xx."

The profile contained a photo of an attractive blonde woman with more than thousands of followers and a link. Nahorney noted that the link was in the profile, and not in the comment, apparently because Instagram might automatically remove a suspicious link in a comment.

Nahorney said he followed the link under controlled conditions. It led to an offer for a premium mobile service that would send videos of cute animals for a small price each month. To sign up, the service required the user's phone number, which he did not supply.

But, after he deleted the comment on Instagram, Nahorney noticed that his follower count on Instagram doubled in a two-hour period -- and they all had photos of attractive women, none had posted any photos, and each one had a Profile bio with a shortened URL. Although each shortened URL was different, they all led to the same place -- an ad for social media jobs, all of which required your name and email address to obtain more information.

Instagram Precautions

Nahorney noted that this new threat could lead to phishing scams, among other possible security issues. His advice to users is to set your account to Private, don't follow unknown followers, and don't click shortened URLs unless you know where they lead.

As an optional precaution, Nahorney suggests not following or accepting followers without photos -- unless you know the person in question.

In other security news, Symantec's October Intelligence Report also noted the rise of a new kind of ransomware, in which a screen is locked and an audio file is repeatedly played: "FBI warning: Your computer is blocked for violation of federal law!"

On the good-news front, the report said the global ratio of spam in e-mail traffic fell by more than 10 percent since September, which the report attributed in part to lower spam activity emanating from Saudi Arabia. Additionally, overall phishing attempts in October decreased about 22 percent.
 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Data Security
1.   Tor Working To Fix Security Exploit
2.   Hackers Breached StubHub Accounts
3.   Juniper DDoS for High-IQ Networks
4.   Google Hacker Team to Hunt Bugs
5.   Cloud Firms Offer Azure Starter Kit


advertisement
Tor Working To Fix Security Exploit
Bug reportedly reveals ID of users
Average Rating:
Gartner Rates IT Security Companies
IBM, HP, McAfee, Splunk ranked well.
Average Rating:
Hackers Target Western Energy Firms
Appears to be state-sponsored group.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 
Dropbox for Business Beefs Up Security
Dropbox is upping its game for business users. The cloud-based storage and sharing company has rolled out new security, search and other features to boost its appeal for businesses.
 

Enterprise Hardware Spotlight
Microsoft Makes Design Central to Its Future
Over the last four years, Microsoft has doubled the number of designers it employs, putting a priority on fashioning devices that work around people's lives -- and that are attractive and cool.
 
Contrary to Report, Lenovo's Staying in Small Windows Tablets
Device maker Lenovo has clarified a report that indicated it is getting out of the small Windows tablet business -- as in the ThinkPad 8 and the 8-inch Miix 2. But the firm said it is not exiting that market.
 
Seagate Unveils Networked Drives for Small Businesses
Seagate is out with five new networked attached storage products aimed at small businesses. The drives are for companies with up to 50 workers, and range in capacity from two to 20 terabytes.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.