Mobile Protection Toolbox
- Mobile Apps
- Wi-Fi f
- Digital Wallet
- Cloud Computing
- Security Software
- Detection Skills
- Glossary &
- Social networking occurs through a variety of platforms, websites and services designed to connect people with shared interests, activities, and backgrounds for the purpose of creating and maintaining relationships.
- Hackers, phishers and spammers use social media, and it is important not to forget this.
- "Free" and regular offers via social networking games and applications, text messages (SMS), fake log-in pages, and posing as contacts in your trusted network are all common techniques hackers and other online criminals use to get your personal information, money and more.
- Be careful what material you post online; it could be used to gain access to your personal information. Some criminals need very little information to conduct criminal activities such as identity theft.
- Never give out your social networking account password or other log-in credentials, and regularly update your mobile device's security settings.
- Always log out of your social network account after each use. Simply closing the application may leave you logged into your account.
- Do not take free offers at face value. Avoid in-game credits that require you to purchase or sign up for another service.
- Familiarize yourself with the privacy settings offered by your social networking site. You should have the option to control who has access to view certain information on your profile.
- Beware of "friend requests", or any other request, from someone you do not know.
- Some social networking sites will send notifications of updates to your account via text message if you provide them with your phone number. Be aware that these are charged as regular text messages and can add up quickly.
- Do not respond to spam or phishing messages sent via Twitter or through social networking accounts. In some scams, criminals are looking for a response in order to verify your address or account.
- Date modified: