The popular social networking site Pinterest has received interest from cybercriminals in the form of spam and...
social engineering. What are some best practices for avoiding becoming a victim on Pinterest? Are there any methods to distinguish real offers from attacks?
Ask the expert!
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
Cybercriminals are always going to target the Internet's "next big thing" to proliferate their wares, be it email, Geocities, Facebook, or now Pinterest. How a specific Web app can be abused depends significantly on the security features of a specific application or site, but cybercriminals will always find some way to exploit the hot new application for their illicit gain. That spam and social engineering attackers are targeting Pinterest users shouldn't be a surprise to anyone. McAfee Labs wrote a useful blog post detailing the automated attack kits that are already targeting Pinterest security and some of the protections users should put in place to mitigate any risks involved with using the service. This is a good place to start in order to show users just how easily they may be exploited.
As for methods to defend against Pinterest spamming, the best and most reliable method is simply for users to be wary of these efforts and question whether offers they receive are too good to be true. The same advice applies when defending against other attacks, including spam email, phishing webpages and similar social engineering attacks. Unfortunately, these types of attacks are generally successful while also being difficult to stop technically.
Dig Deeper on Social media security risks and real-time communication security
Related Q&A from Nick Lewis
The new Trochilus RAT can avoid detection in cyberespionage attacks. Expert Nick Lewis explains how it works, and if enterprises need to adapt their ...continue reading
The Asacub Trojan has new banking malware features. Expert Nick Lewis explains how it made this transition and what enterprises should be watching ...continue reading
BlackEnergy malware may have been part of the attacks on Ukrainian utility and media companies. Expert Nick Lewis explains how this malware works and...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.