Social media influence and cybercrime: When oversharing becomes dangerous | #cybercrime | #infosec


In this age of social media, sharing updates about events in our lives is natural. Everything ends up online, including engagement, anniversaries, landmark events, bank notifications, certificates, travel schedules, holidays, birthday celebrations, etc. What is supposed to be private is now open to the public. However, this oversharing culture is gradually becoming a global concern, and Nigeria is not exempt from privacy concerns, but also to financial stability, reputation, security, employers, and even personal safety. In the wrong hands, what seems like innocent sharing may subtly become a weapon that can be used against us.

These days, it’s normal to see people on social media posting about their new employment, sharing details that ought to remain confidential. It’s a proud moment; however, amid their enthusiasm, many people lose sight of how much they are sharing with others. Malicious actors are always watching, gathering as much information as is available about you. Using the information from your post history, they are able to create a fake profile that will be used to scam many unsuspecting contacts. The information gathered could also be used for social engineering scams.

Many people share a lot of private information for the purpose of going viral, gaining followers, views, and potentially earning revenue from these social media platforms. Others simply share information on social media to celebrate and be celebrated by friends and family. However, many Nigerians overlook the fact that cybercriminals are also scrolling in their quest for influence. They’re keeping an eye on you, gathering information, creating profiles, and waiting for you to divulge just enough.
Sometimes, it is not even about what you post, but what people tag you in. A friend compliments you on the newly acquired property and tags your location. An old schoolmate publishes an old photo that includes your entire name and secondary school. Strangers are slowly piecing together a picture of your life. And once the information is out there, it cannot be taken back. It’s one thing to restrict your profile; it’s another to control what people share and comment about you.
Posts and images aren’t the only things that get overshared. It can occasionally be found in our comments. We enter our phone numbers and account names in response to giveaways in the hopes of being chosen. We complain about poor banking experiences on WhatsApp status, X formerly known as Twitter, and several social media platforms.
Scammers now have everything they need thanks to these social media platforms. They can create convincing fraudulent emails by using information gathered from your posts or posts that you were tagged in. Social engineering scams can be aimed at your contacts; they can emulate your tone and language. Some even make duplicate accounts using your profile pictures, sometimes to deceive people and other times to hurt your reputation or deceive many unsuspecting friends, associates, and families. We need to change our perspective on social media. It is more than simply a place to interact; it is also where your digital footprint is visible. Nothing is hidden once it is posted on social media platforms; it is your footprint, and it will trace back to you.

This does not imply that you should withdraw from the internet. However, we all need to be more intentional. Before you post, ask yourself, “Do I need to share this?” Am I giving up information that might be used against me or someone I know? Can someone use this image or caption to impersonate me? Before you upload any document or share images of your achievements, ensure that important information has been blurred out. Social media is an incredibly powerful tool that can promote careers, share stories, and expand enterprises. However, as with any tool, its effectiveness is determined by how it is used. If we continue to overshare blindly, we risk opening doors that we may never be able to close.


 

.Adesola, Security+Cybersecurity Analyst

Email: [email protected]



Source link

——————————————————–


Click Here For The Original Source.

.........................

National Cyber Security

FREE
VIEW