PCMag Security Watch

How to lock down your social media.

Views expressed in this cybersecurity-intelligence update are those of the reporters and correspondents.

Accessed on 12 October 2021, 2016 UTC.

Content supplied by “PC Magazine.com.”

Source:

https://mail.google.com/mail/u/0/#inbox/FMfcgzGlkPTsVsgqCVQRFlpKXLzXSwxD

Please click link or scroll down to read your selections.

Trouble viewing this email? View in a browser
 
 
PCMag SecurityWatch
 
Stop Oversharing on Social Media
When I was a teenager, I loved social media. Armed with a Myspace page, a Friendster account, and an AIM friends list a mile long, I posted vague, navel-gazing song lyrics from the likes of Modest Mouse and Interpol at all hours of the day and night. Did I overshare? Absolutely. In those heady days of assumed internet anonymity, I never considered who read my (very dull) suburban teenage thoughts until a teacher referenced one of my posts during class.

I was mortified. Aside from being concerned as to why my teacher looked up his students on Myspace in his spare time, I saw this event as a privacy invasion. It was a weird feeling to realize that people I didn’t know or trust presumed to know me from reading my silly posts of sad song lyrics. As a result, I locked down or deleted all of my accounts and ultimately stopped posting.

In the current social media landscape, it’s even easier to overshare. More people than ever can find out intimate details about your life by analyzing the information you choose to share online. Unfortunately, choosing to communicate often and publicly has security implications for you and your family. Your public posts are easy targets for advertisers, spammers, cyber-stalkers, and every other undesirable person online.

As PCMag Lead Security Analyst Neil J. Rubenking writes, it’s essential to remain vigilant regarding your privacy on social networks. Start by enabling privacy settings that limit your exposure. Facebook, for example, has the Privacy Checkup and Off-Facebook Activity tools that can help you manage who can see and interact with your posts. You can also prevent Facebook’s apps and games from sharing your data. Twitter offers similar privacy tools and lets you enable multifactor authentication for your account.
 
One way to remove social media from your life is to simply delete your accounts. That way, you can prevent oversharing, as well as a worse fate: an account takeover by a hacker. If you use the same password across multiple social sites, the damage could be severe. If you choose to keep your social media accounts active, use a unique, hard-to-guess password for each one and keep track of your credentials with a password manager.

Stay safe,
    
Kim Key
PCMag Security Analyst

 
Save $50 on IPVanish VPN
 
TECH DEAL OF THE DAY
 
If you buy something from our links, we may get a commission from the sale. Learn more here.
 
 
 
Try 1Password Families FREE for 14 days

 
 
GET DEAL

 
TODAY’S TOP NEWS
 
Google Says It Protected 14,000 Users From Russian Phishing Attempts

Microsoft: Digital Attacks Are Getting Worse, Russia Bears Much of the Blame

Malware Scammers Exploit These Games the Most

Apple Patches New Zero-Day iOS Vulnerability Possibly Under Exploitation

Iranian Hackers Found ‘Password Spraying’ Office 365 Accounts

   
How Has Cybercrime Affected Your State?
The cybercrime business is lucrative. Fraud and identity theft resulted in losses of over $3 billion in 2020 alone. Cybercriminals targeted people in some states more often than others, however.

The state smack-dab in the middle of the country saw the largest increase in online crime reports: Kansas had 1,423 more cyber identity theft reports per 100,000 people than in 2010. Cities in Illinois also saw a dramatic rise in this particular kind of cybercrime.

PCMag Editor Jason Cohen breaks down the numbers of cyber fraud and cyber identity theft claims for each state. In addition, a report from Beyond Identity mentions that cybercriminals target people in metro areas in the southern parts of the US. Little Rock, Miami-Fort Lauderdale, and Tuscaloosa lead the list of areas that suffer from digital fraud.

Even if the area you live in isn’t on the list, you should still actively protect yourself online. For example, install antivirus on your devices, use a password manager, enable multifactor authentication on all of your online accounts, and refrain from opening malicious links in spam emails or on social media sites.


We Choose the Best Spyware Protection Software

Avoid Breaking the Bank With the Best Cheap VPNs

Can One Antivirus Suite Do it All? We Review McAfee Total Protection

Find the Best Ransomware Protection for Your Devices

Need More Speed? We Test the Fastest VPNs

 
   
TOP TECH DEALS
Want more deals like these delivered to your inbox?
GET OUR BEST DEALS TODAY
 
 
 
All 5 Colors In stock Apple AirPods Max High-Fidelity Active Noise Cancellation Wireless Headphones

 
$549.00 $449.00  
GET DEAL

 
Free $5 Amazon Credit When You Watch Any Amazon Prime Video

 
 
GET DEAL

 
HP DeskJet 2742e All-in-One Wireless Color Inkjet Printer

 
 $59.00  
GET DEAL

 
500GB Crucial P2 M.2 PCIe NVMe Internal SSD (Up to 2400MB/s transfer speeds)

 
$59.99 $44.99  
GET DEAL

 
Champion Power Equipment 4250W Dual Fuel Open Frame & Dual-Fuel Inverter Generator

 
$799.00 $567.60  
GET DEAL

   
                                       
All product and deal information such as discount, price and availability are believed to be accurate as of the time of publication. Please verify these details with the merchant site and check the merchant’s terms and conditions before you buy. Publisher is not responsible for errors or omissions.
SHARE & FOLLOW US
      

For the latest cybersecurity news and information, please check the blog sidebar, links, and twitter posts.  Thanks for joining us today.

Russ Roberts

https://cyber-security-intelligence.org

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s