ReadWriteWeb.com reported earlier this year showed that Indonesia is a Twitter user state sixth largest in the world. On the other hand, rapid growth of Twitter in his own homeland threat widens the door for the hacker (hackers) or criminal in any form in cyberspace.
One of the common threat comes from Twitter is the threat of phishing, which attempts to trick users into dangerous sites. Phishing site aims to lure victims to provide the data contained on a Web page, including passwords and email addresses in your contacts list.
Furthermore, the data were misused in an attempt to find the perpetrators profit (phisers). Carding (misuse of credit cards) and spam are a few examples.
Modus operandi, the parties were irresponsible to pretend to be your friend. After getting the password from your account, he sent a personal message (Direct Message) to the follower you are.
Usually, the message already contains a link that when opened will lead users to a phishing site's web pages. This is already happening on a scale large enough at Twitter last month.
"Only in four years, the popularity of Twitter increases rapidly around the world. The increase was made Twitter as an easy target cyber criminals," said Ema Linaker, AVG Global Head of Online Engagement in a statement received VIVAnews, Tuesday, March 23, 2010.
"The nature of Twitter which is very open it easier for criminals to find victims. It is time for the users to take preventive measures and protection from these threats," explained Emma. He then gives ten tips on the safe use of Twitter in their blogs.
1. Limit your conversation Use Twitter to easily often making the user with easy to post and tweet about the location of their activities. Minor comments given in response to the tweet that could eventually be used to determine the schedule and plan activities that users daily. The criminals could use this situation to make the user's next victim.
2. Be careful opening the link Beware of each link that you get. Generally, players use a URL shortening service on Twitter (for example, bit.ly), making it difficult to know whether the site can be trusted or not. If you doubt the link, you should not be opened.
3. Timeline and watch your inbox When you start getting messages suspicious or your friends start to tweet or sending messages smell spam, you should first make sure whether your partner account has been the target of hackers.
4. Think before you tweet Tweet you can read by all people around the world. Even after your tweet was deleted, can still be seen by using the search engine. Think carefully what you want to write, because the impact of your writing will probably further than you thought.
5. Do not hastily believe You do not always know who your follower on Twitter. Do not easily believe in and make friends with people who are not too you know. You will not know if he has bad intentions.
6. Make sure your third-party applications secure There are hundreds of applications that you can use in Twitter. Before you use the application, make sure that applications are safe. Find the applications that a lot of discussion on trusted sites. Remember that these applications often require a password and your username.
7. Use a different password It is better if the password you use in each different social networking accounts. For example, Facebook and Twitter accounts do not use the same password. If you want more secure, create a different e-mail accounts for your social network. Although difficult, this step is powerful enough to make you safe in cyberspace.
8. Note the login settings Check your browser settings to use. Make sure that your information, either username or password, not recorded if you are using a shared computer.
9. Beware of phishing attacks Beware of attempts to obtain your personal information through a Tweet or Direct Message.
10. Get used to always logout Train yourself to get logged out every time you want to get out of Twitter. Even more on your phone. If you have a Twitter application, make sure you always log out after you use it.
No comments:
Post a Comment