" />
X
RISMedia Premium Content
Exclusive Must-Read Stories for
Daily News Subscribers
Sign up for free to continue reading.
Search
Exact matches only
Search in title
Search in content
Search in comments
Search in excerpt
Filter by Custom Post Type
Content from
{ "homeurl": "https://ace.rismedia.com/", "resultstype": "vertical", "resultsposition": "hover", "itemscount": 4, "imagewidth": 70, "imageheight": 70, "resultitemheight": "auto", "showauthor": 0, "showdate": 1, "showdescription": 1, "charcount": 3, "noresultstext": "No results!", "didyoumeantext": "Did you mean:", "defaultImage": "https://ace.rismedia.com/wp-content/plugins/ajax-search-pro/img/default.jpg", "highlight": 0, "highlightwholewords": 1, "openToBlank": 1, "scrollToResults": 0, "resultareaclickable": 1, "autocomplete": { "enabled": 1, "googleOnly": 1, "lang": "en", "mobile": 1 }, "triggerontype": 1, "triggeronclick": 1, "triggeronreturn": 1, "triggerOnFacetChange": 1, "trigger": { "delay": 300, "autocomplete_delay": 310 }, "overridewpdefault": 0, "override_method": "post", "redirectonclick": 0, "redirectClickTo": "results_page", "redirect_on_enter": 0, "redirectEnterTo": "results_page", "redirect_url": "?s={phrase}", "settingsimagepos": "left", "settingsVisible": 0, "hresulthidedesc": "0", "prescontainerheight": "400px", "pshowsubtitle": "0", "pshowdesc": "1", "closeOnDocClick": 1, "iifNoImage": "description", "iiRows": 2, "iiGutter": 5, "iitemsWidth": 200, "iitemsHeight": 200, "iishowOverlay": 1, "iiblurOverlay": 1, "iihideContent": 1, "loaderLocation": "auto", "analytics": 0, "analyticsString": "", "show_more": { "url": "?s={phrase}", "action": "ajax" }, "mobile": { "trigger_on_type": 1, "trigger_on_click": 1, "hide_keyboard": 0 }, "compact": { "enabled": 1, "width": "300px", "closeOnMagnifier": 1, "closeOnDocument": 0, "position": "fixed", "overlay": 0 }, "animations": { "pc": { "settings": { "anim" : "fadedrop", "dur" : 300 }, "results" : { "anim" : "fadedrop", "dur" : 300 }, "items" : "fadeInDown" }, "mob": { "settings": { "anim" : "fadedrop", "dur" : 300 }, "results" : { "anim" : "fadedrop", "dur" : 300 }, "items" : "voidanim" } }, "autop": { "state": "disabled", "phrase": "", "count": 100 } }
Share This Post Now!

(TNS)—Whether you got a new job, new digs or just want to post a cool selfie, chances are you’ve shared what you’ve been up to on social media. Communication channels like Facebook, Twitter and Instagram make sharing information fast and easy.

Sharing what you’re doing might sound innocent, but your friends and followers aren’t the only ones paying attention. Social media hackers are also taking interest in your updates to see what they can exploit. Something as simple as sharing your phone number with a friend on Facebook could be used by social media hackers.

“Once information is posted to a social networking site, it is no longer private,” says Efrat Cohen, a private investigator and an identity theft risk management specialist with Global Intelligence Consultants. “The more information you post, the more vulnerable you may become. Even when using high security settings, friends or websites may inadvertently leak your information.”

To help you play it safe, here’s a list of things you should never share on social media:

Your Phone Number
You wouldn’t broadcast your phone number to complete strangers, so why would you share it on social media? Although you might think you’re just innocently sharing with friends, social media hackers want your number, too.

According to Jeff Bernstein, managing director of T&M Protection Resources in New York, social media hackers want phone numbers because they are unique identifiers that typically last a long time. “Obtaining a target’s phone number provides an attacker with a platform to obtain additional information about the user targeted and to launch further attacks against the user and also others from within their trusted social networks.”

For example, hackers can type your phone number into a Facebook search to find your profile page if you have it listed, Bernstein says. This could lead to theft, fraud and misrepresentation. Hackers might also bypass security and use your phone number as a caller ID to send text messages that ask recipients to unknowingly click on a malware link, according to MarketWatch. So, always keep your phone number private instead of broadcasting it on social media.

Your Home Address
To avoid burglars showing up at your home would be one reason not to share your home address on social media. However, social media hackers aren’t looking to just rob your home — they’re out to get everything you’re worth.

“Addresses may be leveraged by attackers to create more convincing and effective phishing schemes that can ultimately lead to identity theft, credit card fraud and other misuses that usually deal a costly blow to the end user compromised,” Bernstein says.

Additionally, home addresses are often used by financial institutions to verify your identity. And as Cohen cautioned, reverse lookup services can supply anyone with your home address with a phone number, and vice versa.

Your New Credit Card
Even though it should be a no-brainer, some people become overly excited about receiving a new credit card and end up sharing a picture of it on their social media accounts. Doing this is simply handing social media hackers exactly what they want. Sharing your credit card info gives hackers easy access to your financial accounts — since your account number and name are right on the card — and this could easily turn your life upside down.

“Your new credit card is a high-value target for attackers whose agendas may be as simple as buying goods and services or as sophisticated as selling your card along with others in bulk in online markets, carding forums and card malls,” Bernstein says. To avoid being hacked, silently celebrate your new shiny plastic. There’s no need to share it with the world.

Hashtags
Hashtags make it easy to follow a conversation on social media sites like Twitter. But be careful what you hashtag: Social media hackers are watching your every move.

Sharing too much information about yourself or your whereabouts can be quite simple with hashtags, particularly with society now having the tendency to hashtag their whole lives. But hashtags can be useful tools for hackers as they provide another avenue for attackers to obtain information about you, Bernstein says.

You also have to pay attention to user hashtags. Bernstein says a hacker might create a fake user profile to generate interest and followers through the use of social media postings that project popular hashtags. “Once the user follows or connects with the attacker they are now within arms-length of a dubious URL, watering hole, attachment and many other types of malicious payloads,” he says. In other words, don’t overshare and be cautious of who you engage with on social media.

Check Ins
Although it’s fun and easy, checking in to your favorite places on Foursquare, Facebook or Twitter isn’t very smart. In fact, it would be wise not to check in, as social media hackers will know where you are — or where you aren’t.

“This notifies hackers that you will be using your credit card in different locations, making it easier to post transactions that would otherwise be unusual,” says Morgan O’Mara, content coordinator at Record Nations, a document management and security company. “It also leaves you more vulnerable for when you do online banking and are using unsecure(d) Internet connections, alerting hackers to look for this.” This information can give social media hackers information to where you will likely be again, as well.

How to Avoid Social Media Hackers
“Over 80 percent of all of successful data thefts that occurred last year began with a social engineering exploit of some kind,” Bernstein says. To avoid social media hackers, there are simple steps you can take. Start by hardening your public presence on social media and by stripping any private information from your accounts. This should include your birthday, social security number, banking information and some other listed items, Bernstein says.

“Hackers are becoming more and more sophisticated and are now seeking to develop trusted relationships with their prey which allows them to collect more and more information about their target prior to actually compromising them,” he says.

© 2016 GOBankingRates.com, a ConsumerTrack web property.
Distributed by Tribune Content Agency, LLC.

10.20.2.102