The popular social networking site Pinterest has received interest from cybercriminals in the form of spam and social engineering. What are some best practices for avoiding becoming a victim on Pinterest? Are there any methods to distinguish real offers from attacks?
Ask the expert!
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
Cybercriminals are always going to target the Internet's "next big thing" to proliferate their wares, be it email, Geocities, Facebook, or now Pinterest. How a specific Web app can be abused depends significantly on the security features of a specific application or site, but cybercriminals will always find some way to exploit the hot new application for their illicit gain. That spam and social engineering attackers are targeting Pinterest users shouldn't be a surprise to anyone. McAfee Labs wrote a useful blog post detailing the automated attack kits that are already targeting Pinterest security and some of the protections users should put in place to mitigate any risks involved with using the service. This is a good place to start in order to show users just how easily they may be exploited.
As for methods to defend against Pinterest spamming, the best and most reliable method is simply for users to be wary of these efforts and question whether offers they receive are too good to be true. The same advice applies when defending against other attacks, including spam email, phishing webpages and similar social engineering attacks. Unfortunately, these types of attacks are generally successful while also being difficult to stop technically.
Dig deeper on Social media security risks and real-time communication security
Related Q&A from Nick Lewis, Enterprise Threats
A new variant of Java-based malware can execute regardless of the operating system used. Nick Lewis explains how to limit the threat.continue reading
A variant of malware on Android devices removes and reinstalls itself when a device powers on or off. Learn how to completely eradicate the threat.continue reading
Expert Nick Lewis explains how to avoid a detrimental VPN bypass flaw that allows malicious apps to infiltrate Android devices.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.