The network is a professional

The network The code also self-propagates, so I’m confident that in 2017 we’ll see more vari and more frequent attacks,” Raggo says.

As Twitter, Instagram, Facebook, LinkIn and other social networks continue to grow in popularity, so do the threats against them – not just botnets, but also phishing scams, social engineering and malware distribution. In 2017, hacker attacks on Facebook, Instagram and LinkIn are also expect.

Of particular concern in the corporate The network

world is LinkIn. networking buy phone number list platform, and ZeroFOX has seen a surge in fake accounts claiming to be recruiters to trick people seeking jobs ranging from business personnel to information security specialists. The operators behind these scams, who frequently update and change their “jobs” and areas of expertise to appear to be recruiters from different sectors, appear to be conducting reconnaissance “to profile job seekers and their companies,” Raggo said.

Twitter, Facebook and Instagram can also be us as platforms for distributing malware that infects vulnerable systems and can turn a PC (corporate or home) into a zombie botnet node. At the same time, the schemes for persuading users to download malicious code or click on a fraudulent link will become increasingly sophisticat.

ZeroFOX has identifi traps for inattentive users of social platforms that can be plac in the most unexpect places. Seemingly simple and harmless tweets and regular Facebook status updates can be us as a springboard for social engineering, and the dissemination of this information in public forums becomes a vector for a covert attack to infect and zombify systems.

For example, someone posting that

there is a leak in the bathroom elon musk seeks to terminate and a repairman is ne this afternoon” could be us to breach afb directory physical security and gain entry to a company’s premises if the attacker pretends to be a repairman. “With all the information that is constantly being post on social mia, an attacker can target an organization, find out who, what, where, when, and how, and use that against the company,” Raggo says.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top