iTnews

Fraudsters go all out for social networkers

By Iain Thomson on Sep 18, 2007 7:20AM

Identity thieves are increasingly focusing on social networking sites to gather information on targets, and Symantec's latest threat report has advised users to lie about some of their details.

Guy Bunker, chief scientist at Symantec, told www.vnunet.com that social networking sites are being used in a number of ways to spread malware.

Firstly, because users tend to trust other users, the sites are being used to send people to other sites that have malware installed. Secondly, such sites are being used to harvest information that could be used for identity theft.

"There has always been grooming of children on social networking sites, but people are now moving into the theft and phishing side of things," said Bunker.

"People tend to trust other users on these sites and they have a lot of personal information on them.

"Best practice is to lie about your date of birth because there is no real reason to have it up there and it could be a useful way of misleading the identity thieves."

The US is still leading the world in computer crime, according to the Symantec report, hosting the most underground servers used for trading hacking tools and stolen information.

The country also hosts the most spamming servers, and servers in the country are the target of nearly two thirds of worldwide denial of service attacks.

However, China seems to be forming the backstay of botnets used in attacks. The country hosted more infected PCs than any other, and Beijing accounted for seven per cent of the world's botnet-controlled PCs.

"This is a reflection of the maturity of the Chinese market," said Bunker. " There are a lot of people going online in China but very few are using security software and this is reflected in the figures."
Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:
all for fraudsters go networkers out security social

Partner Content

MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
Partner Content MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
MSI launches innovative new laptops
Partner Content MSI launches innovative new laptops
Improving returns from SD-WAN spending
Sponsored Content Improving returns from SD-WAN spending
NCS expands into Australia in partnership with Optus Enterprise
Sponsored Content NCS expands into Australia in partnership with Optus Enterprise

Sponsored Whitepapers

The risky business of open source
The risky business of open source
Mitigating open source risk in your organisation
Mitigating open source risk in your organisation
How to choose a WAF that's right for you
How to choose a WAF that's right for you
The global telco 5G cloud gaming opportunity
The global telco 5G cloud gaming opportunity
Building a ransomware remediation backup strategy
Building a ransomware remediation backup strategy

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
By Iain Thomson
Sep 18 2007
7:20AM
0 Comments

Related Articles

  • Reserve Bank of NZ governor apologises for 'serious' data breach
  • Google unravels state-of-art Android and Windows exploit chains
  • Mimecast says hackers hijacked its products
  • EU drugs regulator says some data from cyber attack leaked online
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Update Chrome or risk remote takeover, US govt warns

Update Chrome or risk remote takeover, US govt warns

Telstra pilots its first neurodiversity recruitment program

Telstra pilots its first neurodiversity recruitment program

Google unravels state-of-art Android and Windows exploit chains

Google unravels state-of-art Android and Windows exploit chains

Accellion hack behind Reserve Bank of NZ data breach

Accellion hack behind Reserve Bank of NZ data breach

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.