Stratum Security's Morehouse says criminals are becoming increasingly crafty on social networks: They first identify a target, then do the research -- what is this person like, whom do they follow, what do they like to do?
What's more, social network attacks are sometimes combined with email and website spoofing, Morehouse says. You might develop a friendship on LinkedIn and then get an email from that person that looks like it was sent via LinkedIn but is actually a fake. When you click the link to reply to the message, you're taken to a fake LinkedIn site; logging in there reveals your LinkedIn username and password to the spoofer.
Why Cloud-based Solutions like SaaS Makes Sense
Discover why more and more organisations are choosing SaaS solutions.
Essential Guide to Cybersecurity in Singapore
Download the most popular cybersecurity articles from CIO Asia to help you on your cybersecurity journey.
Enterprise Cloud Adoption: Key Trends and Considerations
Learn how enterprises will leverage cloud and digital transformation over the next 12 months, along with best practices to accelerate cloud adoption and growth.