Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
Build Apps 5x Faster
For Half the Cost
Enterprise Cloud Computing

On Force.com
Cybercrime
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
Symantec: Be Careful When Using Instagram
Symantec: Be Careful When Using Instagram

By Barry Levine
November 15, 2012 9:52AM

Bookmark and Share
Symantec security analyst Ben Nahorney noted that the Instagram threat could lead to phishing scams, among other possible security issues. His advice to users is to set your account to Private, don't follow unknown Instagram followers, and don't click shortened URLs on Instagram unless you know where they lead.
 


Instagram is a social site for posting and sharing photos. According to the October cyber security report from Symantec, it's also beginning to harbor security threats.

Wherever there are lots of users, there will inevitably be attempts to trick users into revealing confidential information, and Instagram is only the latest to attract the attention of security watchers. In addition to the new Symantec report, there have previously been several reports of security issues with the privacy setting and other aspects of the site.

The Symantec report's author, Cyber Security Threat Analyst Ben Nahorney, found the threat he explored on Instagram took the form of enticing links and followers.

The Suspicious Trail

He said the trail began when he found a notification on his phone about a comment posted to his Instagram account. The comment read: "Hi there, Get a FREE Game in my Profile, OPEN it up, Get 85.90$ :-) xx."

The profile contained a photo of an attractive blonde woman with more than thousands of followers and a link. Nahorney noted that the link was in the profile, and not in the comment, apparently because Instagram might automatically remove a suspicious link in a comment.

Nahorney said he followed the link under controlled conditions. It led to an offer for a premium mobile service that would send videos of cute animals for a small price each month. To sign up, the service required the user's phone number, which he did not supply.

But, after he deleted the comment on Instagram, Nahorney noticed that his follower count on Instagram doubled in a two-hour period -- and they all had photos of attractive women, none had posted any photos, and each one had a Profile bio with a shortened URL. Although each shortened URL was different, they all led to the same place -- an ad for social media jobs, all of which required your name and email address to obtain more information.

Instagram Precautions

Nahorney noted that this new threat could lead to phishing scams, among other possible security issues. His advice to users is to set your account to Private, don't follow unknown followers, and don't click shortened URLs unless you know where they lead.

As an optional precaution, Nahorney suggests not following or accepting followers without photos -- unless you know the person in question.

In other security news, Symantec's October Intelligence Report also noted the rise of a new kind of ransomware, in which a screen is locked and an audio file is repeatedly played: "FBI warning: Your computer is blocked for violation of federal law!"

On the good-news front, the report said the global ratio of spam in e-mail traffic fell by more than 10 percent since September, which the report attributed in part to lower spam activity emanating from Saudi Arabia. Additionally, overall phishing attempts in October decreased about 22 percent.
 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Cybercrime
1.   Can Google Stop Zero Day Flaws?
2.   Russian Hackers Attack CNET
3.   FBI Cyber-Expert's Humble Start
4.   Chinese Man Charged with Hacking
5.   Russian Hacker's Charges Revealed


advertisement
Can Google Stop Zero Day Flaws?
Security top priority for search giant.
Average Rating:
Russian Hackers Attack CNET
Getting to the bottom of exploit is key.
Average Rating:
Kansas Won't Release Test Data
After cyberattacks and other problems.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
New Web Tracking Technologies Defeat Privacy Protections
Recently developed Web tracking tools are able to circumvent even the best privacy defenses, according to a new study by researchers at Princeton and the University of Leuven in Belgium.
 
Juniper DDoS Solution Aims at High-IQ Networks
In the face of more complex attacks, Juniper Networks is boosting its DDoS Secure solution to help companies mitigate the threats with more effective security intelligence throughout the network fabric.
 
Large-Volume DDoS Attacks Hit Record in 2014
The number of distributed denial-of-service (DDoS) attacks set a record in the first half of 2014, according to a report by Arbor Networks. The number of attacks over 20 GB/sec doubled.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.