Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Network Security Viruses & Malware Hackers Security Solutions More Topics...
Eliminate costly downtime!
Find out how with Free White Paper
& enter to win a Samsung Galaxy Note

www.apc.com
Network Security
24/7/365 Network Uptime
Average Rating:
Rate this article:  
Symantec: Be Careful When Using Instagram
Symantec: Be Careful When Using Instagram

By Barry Levine
November 15, 2012 9:52AM

Bookmark and Share
Symantec security analyst Ben Nahorney noted that the Instagram threat could lead to phishing scams, among other possible security issues. His advice to users is to set your account to Private, don't follow unknown Instagram followers, and don't click shortened URLs on Instagram unless you know where they lead.
 


Instagram is a social site for posting and sharing photos. According to the October cyber security report from Symantec, it's also beginning to harbor security threats.

Wherever there are lots of users, there will inevitably be attempts to trick users into revealing confidential information, and Instagram is only the latest to attract the attention of security watchers. In addition to the new Symantec report, there have previously been several reports of security issues with the privacy setting and other aspects of the site.

The Symantec report's author, Cyber Security Threat Analyst Ben Nahorney, found the threat he explored on Instagram took the form of enticing links and followers.

The Suspicious Trail

He said the trail began when he found a notification on his phone about a comment posted to his Instagram account. The comment read: "Hi there, Get a FREE Game in my Profile, OPEN it up, Get 85.90$ :-) xx."

The profile contained a photo of an attractive blonde woman with more than thousands of followers and a link. Nahorney noted that the link was in the profile, and not in the comment, apparently because Instagram might automatically remove a suspicious link in a comment.

Nahorney said he followed the link under controlled conditions. It led to an offer for a premium mobile service that would send videos of cute animals for a small price each month. To sign up, the service required the user's phone number, which he did not supply.

But, after he deleted the comment on Instagram, Nahorney noticed that his follower count on Instagram doubled in a two-hour period -- and they all had photos of attractive women, none had posted any photos, and each one had a Profile bio with a shortened URL. Although each shortened URL was different, they all led to the same place -- an ad for social media jobs, all of which required your name and email address to obtain more information.

Instagram Precautions

Nahorney noted that this new threat could lead to phishing scams, among other possible security issues. His advice to users is to set your account to Private, don't follow unknown followers, and don't click shortened URLs unless you know where they lead.

As an optional precaution, Nahorney suggests not following or accepting followers without photos -- unless you know the person in question.

In other security news, Symantec's October Intelligence Report also noted the rise of a new kind of ransomware, in which a screen is locked and an audio file is repeatedly played: "FBI warning: Your computer is blocked for violation of federal law!"

On the good-news front, the report said the global ratio of spam in e-mail traffic fell by more than 10 percent since September, which the report attributed in part to lower spam activity emanating from Saudi Arabia. Additionally, overall phishing attempts in October decreased about 22 percent.
 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Network Security
1.   Lessons from Verizon's Threat Report
2.   Verizon Report Exposes Cyberthreats
3.   How Are Web Sites Post-Heartbleed?
4.   White House Updating Privacy Policy
5.   Target Hackers May Be Tough To Find


advertisement
How Are Web Sites Post-Heartbleed?
Questions on open source, security.
Average Rating:
Heartbleed Exploit Could Cost Millions
But it could have been prevented.
Average Rating:
Michaels: Nearly 3M Cards Breached
But the hack has been contained.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Where Do Web Sites Stand, Post-Heartbleed?
A security firm says the vast majority of Web sites have patched themselves to protect against the Heartbleed bug, but now there are questions raised on the reliability of open-source programs.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Hackers | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.