The popular social networking site Pinterest has received interest from cybercriminals in the form of spam and...
social engineering. What are some best practices for avoiding becoming a victim on Pinterest? Are there any methods to distinguish real offers from attacks?
Ask the expert!
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
Cybercriminals are always going to target the Internet's "next big thing" to proliferate their wares, be it email, Geocities, Facebook, or now Pinterest. How a specific Web app can be abused depends significantly on the security features of a specific application or site, but cybercriminals will always find some way to exploit the hot new application for their illicit gain. That spam and social engineering attackers are targeting Pinterest users shouldn't be a surprise to anyone. McAfee Labs wrote a useful blog post detailing the automated attack kits that are already targeting Pinterest security and some of the protections users should put in place to mitigate any risks involved with using the service. This is a good place to start in order to show users just how easily they may be exploited.
As for methods to defend against Pinterest spamming, the best and most reliable method is simply for users to be wary of these efforts and question whether offers they receive are too good to be true. The same advice applies when defending against other attacks, including spam email, phishing webpages and similar social engineering attacks. Unfortunately, these types of attacks are generally successful while also being difficult to stop technically.
Dig Deeper on Social media security risks and real-time communication security
Related Q&A from Nick Lewis
Malware is increasingly using DNS tunnels to aid in data exfiltration. Expert Nick Lewis explains how the attacks work and how best to defend against...continue reading
Researchers warned about the rise of a new cross-site scripting flaw involving same-origin policy. Expert Nick Lewis explains the vulnerability and ...continue reading
Malware authors are adopting software wrapping to hide malicious code and avoid detection. Expert Nick Lewis explains how to defend against the ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.