The popular social networking site Pinterest has received interest from cybercriminals in the form of spam and...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
social engineering. What are some best practices for avoiding becoming a victim on Pinterest? Are there any methods to distinguish real offers from attacks?
Ask the expert!
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
Cybercriminals are always going to target the Internet's "next big thing" to proliferate their wares, be it email, Geocities, Facebook, or now Pinterest. How a specific Web app can be abused depends significantly on the security features of a specific application or site, but cybercriminals will always find some way to exploit the hot new application for their illicit gain. That spam and social engineering attackers are targeting Pinterest users shouldn't be a surprise to anyone. McAfee Labs wrote a useful blog post detailing the automated attack kits that are already targeting Pinterest security and some of the protections users should put in place to mitigate any risks involved with using the service. This is a good place to start in order to show users just how easily they may be exploited.
As for methods to defend against Pinterest spamming, the best and most reliable method is simply for users to be wary of these efforts and question whether offers they receive are too good to be true. The same advice applies when defending against other attacks, including spam email, phishing webpages and similar social engineering attacks. Unfortunately, these types of attacks are generally successful while also being difficult to stop technically.
Dig Deeper on Social media security risks
Related Q&A from Nick Lewis
Threat actors are using phishing email campaigns to fool users with tech support scams and fake Blue Screens of Death. Learn how these campaigns work...continue reading
The GD library used in the Junos operating system has opened Junos up to attacks. Nick Lewis explains how it happened and what it means for companies...continue reading
Antivirus software is crucial to your device's security. However, less is often more, especially when considering a secondary free antivirus program....continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.