Navigation and service

Social Media: The Risks at a Glance

What do I need to consider before creating a profile?

Social media is based on the exchange of information, photos of friends and holiday videos. However, this massive amount of data also brings with it risks for users. So before you register with a network, you should know what you are getting into:

Disclosure of private information

  • Users can enter e-mail addresses, telephone numbers, hobbies and preferences into social networks. This data can be misused by companies in order to bombard the users with targeted advertising.
  • The default privacy settings selected when an account is opened are often insufficient. This means that all of the data is automatically visible for all users of the social network. Extracts from profiles can sometimes even be found via search engines and can therefore be accessed by any internet user in the world.
  • Videos, text-based messages and in particular images can be published by third parties to large parts of the internet or misused for other purposes, even after this data has supposedly been deleted from the social network.

Phishing

Fraudsters use forged websites to try and get hold of the log-in data for social networks. For example, users might click on a link in an email that takes them to a website that is deceptively similar to the social network's site. If they try to log in, the fraudsters can phish for usernames and passwords and then gain complete access to the account, where they can see and amend data, send messages and chat. Using what is known as two-factor authentication protects your account even if you are deceived by criminals in this manner.

Identity theft

Online criminals are increasingly attempting to hack into existing user accounts in order to use their identity for fraudulent purposes. After taking over an account, these hackers often pretend that they are in an emergency situation and ask the friends in that person's network for financial assistance. They use the information that they can read in the user's profile in order to gain the trust of their existing contacts.

Distribution of malware

  • Cyber criminals often send messages that contain a link to manipulated websites. These websites are then used to spread malware. One well-known example of this is the "Koobface" worm that was distributed through Facebook and MySpace, amongst other sites. Invitations to view a video were sent from previously infected accounts to other users. If the recipient clicked on the link, however, they were taken to a counterfeit Facebook or YouTube site that then requested that they download Flash Player. Hidden within the download was the worm, which would then be able to spread itself further and further.
  • Some social networks offer additional applications that users can add to their profiles. Examples of these include mini-games that users can play with their networks. The problem is that these applications are provided by third parties that do not necessarily have the same security standards as the social networks. This means that, whether intentionally or not, they can be used to spread malware.

Bullying

  • Social networks have added a new public dimension to bullying. For example, people may be consciously ostracised from friend groups, or their digital timelines be bombarded with insults. This can be particularly difficult for young people.
  • Individuals known as "cyber stalkers" can create "fake" profiles through which they pretend to be other real or fictional people. This enables them to harass other people via social networks in completely anonymity.