Category: Mobile Security

Social media marketing practices may be increasing identity theft risks

This type of advertising and promoting is growing in popularity, but it does come with drawbacks.

Businesses have been working hard to get the very most out of social media marketing in the hopes of being able to connect with customers and prospective clients without having to spend a large part of their overall advertising budget.

However, while this channel has opened up a world of opportunities, it is also coming with risks.

Among the risks that are now being associated with the use of social media marketing are data breaches and identity theft. For this reason, it is very important that businesses of all sizes pay attention to the way in which they are using the various networks such as Facebook, Twitter, Google+, LinkedIn, and others, and recognize what they could be inadvertently sharing if the wrong person were to make his or her way in.

Many of the largest social media marketing sites have already experienced events involving data breaches.

social media marketing -identity theft riskAmong the online and mobile security risks that are being associated with the use of social media for advertising and promoting purposes is the dreaded data breach. However, intellectual property theft is also becoming problematic and many companies overlook this particular threat. It is a good idea for businesses who are using this channel within their marketing strategy to identify the types of risks that they face so that proper preparations can be made.

In a recent story published by Merchants Information Solutions vice president, Mark Pribish, there were five risks that were underscored as being the most important to businesses using social media. These could be deliberate or entirely unintentional and included: making misleading or false claims, infringing on copyrights or trademarks, using intellectual property without permission, posting confidential information or trade secrets, or sharing customer or employee information in a way that could provide a cyber criminal the data they need for a data breach.

While most would agree that the threat of online and mobile security events is not enough to justify stopping the use of social media marketing, the consensus is that proper preparations can make all the difference in keeping data secure and avoiding legal struggles.

iCloud cyber attack in China allegedly caused by government

Apple’s iCloud storage service was attacked in China by hackers attempting to steal sensitive information.

According to a Chinese web monitoring group, Beijing government hackers were behind the cyber attack and the hackers were trying to steal the credentials of Apple users.

The hackers used an MITM attack.

The hackers employed the “man-in-the-middle” (MITM) attack, which enabled them to interpose their own website between Apple’s iCloud server and users. They intercepted data, which could potentially have given them access to private user information, such as passwords, photos, iMessages, contacts, etc.

When asked about allegations that the Beijing government was attempting to spy on Apple customers, an Apple representative declined comment. However, the representative did note that the company’s technical support page had been updated and provided users with advice on how to protect themselves against cyber attacks. A statement on the page said: “We’re aware of intermittent organized network attacks using insecure certificates to obtain user information, and we take this very seriously.”

The electronics giant instructs its users to watch for warnings when visiting www.icloud.com and to never enter their iCloud password in the event they receive a warning regarding invalid digital certificates. Furthermore, the company explains methods that users can employ to make certain they are connected to Apple’s genuine site when using different web browsers.

Hua Chunying, a Chinese Foreign Ministry spokesperson was asked about the incident and said that Beijing was opposed to hacking.

The cyber attack occurred only weeks after Apple announced where it would be storing iCloud data for Chinese users.

Cyber AttackGreatfire.org, a website that conducts research on Chinese internet censorship, suspected government involvement in the cyber attack. Greatfire noted that it was similar to previous attacks on Microsoft Corp’s Hotmail, Yahoo Inc., and Google Inc. According to Greatfire, the attack took place several weeks after Apple said that it would use China Telecom servers to store iCloud data for Chinese users. In addition, it also occurred during the same time the iPhone 6 began selling in China.

Greatfire also said that it was highly probable that the attack was staged with the knowledge of internet providers, such as China Telecom, since it seems to have initiated from “deep within the Chinese domestic internet backbone”. However, a spokesperson from China Telecom said that “The accusation is untrue and unfounded.”

Reuters contacted two independent security experts and both said that Greatfire’s report about the cyber attacks looked credible. Chief research officer at F-Secure, Mikko Hypponen, said that “All the evidence I’ve seen would support that this is a real attack.”