Author

Topic: Securing Social Media Vulnerabilities (Read 117 times)

hero member
Activity: 938
Merit: 605
Leading Crypto Sports Betting & Casino Platform
January 06, 2023, 03:52:39 PM
#5
Securing Social Media Vulnerabilities



2. Don't visit any unsolicited link, downloads or websites.

3. Verify every web address to be accurately typed before launch and observe the security signs

5. don't sell any of your old devices used in handling your wallets to any body and dont repair them if damaged but instead destroy them and get another one if possible, they may spy your details during maintenance and attack.

Speaking of unsolicited links or websites, it important that anyone who's already into cryptocurrency business to bear it in mind that you are a target and as such you need to tread with carefulness while online mostly on any social media networks. The online space is very unsafe and ignorance is not an excuse in anyway.

A few persons are not observant while wanting to use any site address, as with just a little dot hackers can use it to divert you from the original intended address you wanted to key into. So it's pertinent everyone pay attention for these kinds of things.
Lastly, if I want to sell my gadget or device I might have been using my wallets and crypto transactions with am very sure flashing the device to a totally new one wouldn't keep any trace on it if am wrong about this someone should clear the air for me
legendary
Activity: 2478
Merit: 1360
Don't let others control your BTC -> self custody
January 06, 2023, 01:41:39 PM
#4
5. don't sell any of your old devices used in handling your wallets to any body and dont repair them if damaged but instead destroy them and get another one if possible, they may spy your details during maintenance and attack.

That's hard when you have a phone worth a few hundred USD used. You can destroy your old USB drives, even your hard drives, but not many people are going to do that with their phones.
It's really becoming a security risk of our times where everybody owns a phone and there are millions of used phones changing hands. The safest way is to use a phone as long as it's possible by giving it to your children once you're done with it and when the children are done it's going to be unusable anyway Grin
legendary
Activity: 2730
Merit: 7065
January 06, 2023, 12:58:39 PM
#3
1. Don't leave your email and phone number open to public access
It's even better if you don't leave your desktop or mobile devices unattended at all no matter what you are currently working on and what is accessible. If you are working in an office with other people, in a public space, or even at home, lock your screen if you have to leave for a toilet break or to get a bit to eat. Don't look at it as if you are hiding something. Those working remotely who have kids or pets know what can happen if they walk in and start playing around on your computer. It isn't pleasant, and can cause all sorts of problems. So, protect yourself.

3. Verify every web address to be accurately typed before launch and observe the security signs
Use ad blockers and don't blindly trust Google with its results. Doublecheck it with a different browser and search engine like DuckDuckGo. 

5. don't sell any of your old devices used in handling your wallets to any body and dont repair them if damaged but instead destroy them and get another one if possible, they may spy your details during maintenance and attack.
This isn't bad advice, it's just something not many will listen to. It's a normal thing to sell your old phone or laptop when you buy a new one. I guess that 6 or 7/10 people do that unless you have run into very security and privacy-conscious individuals. Formatting the drive or selling the computer without the disk are decent options.
legendary
Activity: 2408
Merit: 4282
eXch.cx - Automatic crypto Swap Exchange.
January 06, 2023, 12:10:51 PM
#2
4. Don't backup your password or private keys on google drive, icloud or any online storage.

Well said, since we're on a cryptocurency forum this advice is also applicable to your crypto wallet. Anything stored online can be easily hacked since those offering such service will most likely rely on a centralized server to store those information. It's a common mistake by most beginners to think this platforms are safe to use but they usually end up regretting ever trusting them with such sensitive information.

You should not also store or send any sensitive information on social media platforms or emails like drafts etc. The moment hackers get access to your accounts those information are vulnerable and that's exactly why even the forum warned against sending sensitive information through the forum private message option which says "Note: PM privacy is not guaranteed. Encrypt sensitive messages."
sr. member
Activity: 672
Merit: 416
stead.builders
January 06, 2023, 06:15:44 AM
#1
Securing Social Media Vulnerabilities

Security alert in this new year, the more hackers are developing new tactics to attack us also is expected of us to be at alert and guarded upon every of the means they are trying to use, we need to be more security conscious with all our social media accounts, there's a need to be very mindful of our emails used and the phone number used as well in the registration process for those handles because hacker are now on the go for using the user's privacy information from their social media accounts to spy, monitor, track and phish on them, this call for the attention on the recent attack believed to be coming from twitter users targeted on over two millions users data leak and were related on a hacking platform after the security bridge for vulnerability attacks.

Quote
Hackers stole the email addresses of more than 200 million Twitter users and posted them on an online hacking forum, a security researcher has said.

The breach “will unfortunately lead to a lot of hacking, targeted phishing and doxxing,” https://www.aljazeera.com/amp/economy/2023/1/5/twitter-hacked-200-million-email-addresses-leaked-researcher

I have experienced different encounters whereby people got series of social media attacks through imposters, the take hostility of the victim's account to perpetrate their own crevices and begin to behave weirdly on the platform to devalue the victim's reputation and makes demands from their contacts, they also go through the extent of posting irrelevant things on their behalf, and the ugliest is once they have this full access to their emails and mobile number, they reset all their accounts and gain access to their wallets through the process of password reset.

Additional Tips to be Security Conscious

1. Don't leave your email and phone number open to public access

2. Don't visit any unsolicited link, downloads or websites.

3. Verify every web address to be accurately typed before launch and observe the security signs

4. Don't backup your password or private keys on google drive, icloud or any online storage

5. don't sell any of your old devices used in handling your wallets to any body and dont repair them if damaged but instead destroy them and get another one if possible, they may spy your details during maintenance and attack.
Jump to: