Skip to main content

Posts

Featured

How Cybercriminals Weaponize Social Media

In the era of social media, cybercriminals and state actors use these networks to monitor various social events such as protests, elections, and natural disasters.  These bad actors commonly employ crowdsourcing techniques to obtain critical intelligence into ongoing cyber attacks. It is one of their primary real-time monitoring dashboards to gauge the effectiveness of their attacks such as data breaches, account hijacking, cyber propaganda and a host of other attacks.
These attacks are well coordinated and overwhelming that bear the hallmarks state actors are behind most of the malicious activities.  For example, attacks against the social media networks that have a large user base such as LinkedIn, Facebook, Twitter, and Instagram are common. 

Researchers have described social media as a modern-day electronic lynch mob. For instance, any insignificant local story suddenly becomes viral where millions of people distort the facts drumming it up with the virtues or evils of partisan poli…

Latest Posts

Protecting Employee Data is an Organization’s Legal Obligation or Is It?

Preparing for the Worst with an Incidence Response Plan

2019 Will Be The Year Of Intelligent Cybercrime Threats

Enhancing Cybersecurity Authentication in Government

What Motivates Young Cybercriminals?

Security Best Practices in the Age of Open Source Code

Will TLS 1.3 Ruin Security Production Tools?

How Cybercriminals Attack the Internet of Things

Should a Company Retaliate Against Cyberattacks?

How Corporate Governance Upholds Information Security