Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Network Security Viruses & Malware Hackers Security Solutions More Topics...
APC Free White Paper
Optimize your network investment &
Enter to win a Samsung Galaxy Note

www.apc.com
Data Security
24/7/365 Network Uptime
Average Rating:
Rate this article:  
Symantec: Be Careful When Using Instagram
Symantec: Be Careful When Using Instagram

By Barry Levine
November 15, 2012 9:52AM

Bookmark and Share
Symantec security analyst Ben Nahorney noted that the Instagram threat could lead to phishing scams, among other possible security issues. His advice to users is to set your account to Private, don't follow unknown Instagram followers, and don't click shortened URLs on Instagram unless you know where they lead.
 


Instagram is a social site for posting and sharing photos. According to the October cyber security report from Symantec, it's also beginning to harbor security threats.

Wherever there are lots of users, there will inevitably be attempts to trick users into revealing confidential information, and Instagram is only the latest to attract the attention of security watchers. In addition to the new Symantec report, there have previously been several reports of security issues with the privacy setting and other aspects of the site.

The Symantec report's author, Cyber Security Threat Analyst Ben Nahorney, found the threat he explored on Instagram took the form of enticing links and followers.

The Suspicious Trail

He said the trail began when he found a notification on his phone about a comment posted to his Instagram account. The comment read: "Hi there, Get a FREE Game in my Profile, OPEN it up, Get 85.90$ :-) xx."

The profile contained a photo of an attractive blonde woman with more than thousands of followers and a link. Nahorney noted that the link was in the profile, and not in the comment, apparently because Instagram might automatically remove a suspicious link in a comment.

Nahorney said he followed the link under controlled conditions. It led to an offer for a premium mobile service that would send videos of cute animals for a small price each month. To sign up, the service required the user's phone number, which he did not supply.

But, after he deleted the comment on Instagram, Nahorney noticed that his follower count on Instagram doubled in a two-hour period -- and they all had photos of attractive women, none had posted any photos, and each one had a Profile bio with a shortened URL. Although each shortened URL was different, they all led to the same place -- an ad for social media jobs, all of which required your name and email address to obtain more information.

Instagram Precautions

Nahorney noted that this new threat could lead to phishing scams, among other possible security issues. His advice to users is to set your account to Private, don't follow unknown followers, and don't click shortened URLs unless you know where they lead.

As an optional precaution, Nahorney suggests not following or accepting followers without photos -- unless you know the person in question.

In other security news, Symantec's October Intelligence Report also noted the rise of a new kind of ransomware, in which a screen is locked and an audio file is repeatedly played: "FBI warning: Your computer is blocked for violation of federal law!"

On the good-news front, the report said the global ratio of spam in e-mail traffic fell by more than 10 percent since September, which the report attributed in part to lower spam activity emanating from Saudi Arabia. Additionally, overall phishing attempts in October decreased about 22 percent.
 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Data Security
1.   How To Beat the Heartbleed Bug
2.   Google Proudly Scans Your Gmail
3.   NSC Backs Disclosing Vulnerabilities
4.   Heartbleed Flaw Affects Hardware
5.   1 in 5 Say They've Had Data Stolen


advertisement
Don't Reset Passwords for Heartbleed?
Added caution needed to ensure security.
Average Rating:
How To Beat the Heartbleed Bug
Big data analytics could be the key.
Average Rating:
Heartbleed Flaw Affects Hardware
Cisco, Juniper equipment vulnerable.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
How To Beat the Heartbleed Bug
Heartbleed headlines continue as IT admins scramble for answers no one has. Early reports of stolen personal data, including 900 social insurance numbers in Canada, are starting to trickle in.
 
After Heartbleed, OpenSSL Calls for More Support
The president of the OpenSSL Foundation says more support is needed from companies and governments that use its software so that it can better spot and fix flawed pieces of code such as Heartbleed.
 
NSC Backs Disclosing Software Vulnerabilities
Disclosing vulnerabilities in commercial and open source software is in the national interest and shouldn't be withheld unless there is a clear need, says the National Security Council.
 

Enterprise Hardware Spotlight
Vaio Fit 11A Battery Danger Forces Recall by Sony
Using a Sony Vaio Fit 11A laptop? It's time to send it back to Sony. In fact, Sony is encouraging people to stop using the laptop after several reports of its Panasonic battery overheating.
 
Continued Drop in Global PC Shipments Slows
Worldwide shipments of PCs fell during the first three months of the year, but the global slump in PC demand may be easing, with a considerable slowdown from last year's drops.
 
Google Glass Finds a Home in Medical Education, Practice
Google Glass may find its first markets in verticals in which hands-free access to data is a boon. Medicine is among the most prominent of those, as seen in a number of Glass experiments under way.
 

Mobile Technology Spotlight
CTIA Caves, Volunteers Kill Switch Plan
After bucking against the concept of a smartphone kill switch, the CTIA just announced the “Smartphone Anti-Theft Voluntary Commitment” to thwart smartphone thefts in the U.S.
 
Is Amazon Launching a 3D Smartphone?
Once known for selling books on an e-commerce platform, Amazon is now a bona fide hardware maker -- and it's reportedly rolling out an innovative smartphone with a 3D screen.
 
Review: S5 Features Useful, Less About Gimmicks
There's a lot to like about Samsung's new Galaxy S5 smartphone -- among them, its relative lack of features. Samsung chose to focus on features people might actually want, not gimmicks.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Hackers | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.