Of course, what at first glance may seem like an innocent social practice, as well as distraction, also provides malicious users with a great way to collect personal information that we do not like most often falling into the wrong hands. . Fortunately, we can always take precautionary measures to take care of our online data and prevent cybercriminals They steal our identity on the Internet, so we will review the most common methods that they use and how to combat them.
For starters, we will say that these malicious users sometimes do not need much effort to steal the identity of someone because we are the users who provide it without knowing it. In fact many times we share data on the internet that should not be public like birth dates, mailing addresses or telephone numbers, data with which these fraudsters are made to pretend to be us. That's why you have to be more careful about sharing some the contents as house photos or the environment, in addition to configuring our accounts so that they are visible only by our accepted contacts and therefore by our friends.
But we can also be victims of information theft through the apps and malicious services, some social platforms allowing us to install third-party applications or to offer us specific external services asking us to connect via the identity information of the latter. social networks. In general, they provide us with additional features that the social network does not offer, but those that are malicious use these permissions we give to collect personal information and obtain them so that they can be used by the developer of the malware.
Therefore, it is always recommended that when using these additional services, carefully review the permissions you need and, at the moment you see something suspicious, go back. Something similar happens in social networks with phishing attacksmethods responsible for deceiving people by asking them to click on some widely distributed and shared links on these social platforms. In this way, attackers often try and get people to share these links to help spread the word. attack phishing.
It's something that becomes a lot more serious and dangerous when you're publications they are made from fake accounts of famous characters that seem official, which makes phishing a very effective tactic for users. identity theftbecause these malicious links can cause the arrival of malicious programs on our computers, which are responsible for the collection of sensitive data concerning them. Many also come in the form of legitimate businesses that ask for confidential information, links that we should always be watching, and that have a bit of a head about some "juicy" information that we're trying to force to click on. -this. connections bad
Another measure that we need to take into account when we browse these areas online is to look after those we trust. Internetalthough they are the friends. Because cybercriminals understand that users no longer click on phishing links from unknown accounts, they take a new approach by first attacking certain accounts on social networks and then sending malicious contacts to their contacts. that the victim He falls thinking that it comes from his friend. Therefore, if we find a somewhat strange or suspicious behavior on these platforms of a contact that we have added, the best we can do is to be wary and not to click on the icon corresponding. connections send us
One of the types of content we share most often in these platforms, Those are the imagesHowever, they can also be a great way to track our position, for example reveal where we live, or make it known publicly that we are on vacation in the foreigner with the whole family, so our house is empty. It is therefore advisable to pay attention to what we label and where, especially when information It refers to private sites that could reveal our address.
Another major problem that these services pose to us is that sometimes the information we download is indelible, that is to say that some data is uploaded on social networks, even if we eliminate or even close the data. accountIn a way, they could always be somewhere, they never disappear completely.
In fact, some websites show us these sites as they were in the past. So they collect the information that we erased permanently, or at least we thought it was, and the attackers use that information. pages to find the private information that interests them, again, we have to be very careful about everything we sharesince you delete it from Internet later, it will not be a simple task.