Habitual Facebook users prone to phishing attacks | HT Tech

Habitual Facebook users prone to phishing attacks

If you are perpetually online on Facebook and do respond to anonymous friends' requests without considering how they are connected with those sending the requests, beware of phishing attacks.

By:IANS
| Updated on: Sep 16 2014, 15:41 IST
image caption

If you are perpetually online on Facebook and do respond to anonymous friends' requests without considering how they are connected with those sending the requests, beware of phishing attacks.

According to a new study by an Indian-origin researcher, habitual use of Facebook makes individuals susceptible to social media phishing attacks by criminals.

You may be interested in

MobilesTablets Laptops
28% OFF
Samsung Galaxy S23 Ultra 5G
  • Green
  • 12 GB RAM
  • 256 GB Storage
Google Pixel 8 Pro
  • Obsidian
  • 12 GB RAM
  • 128 GB Storage
Vivo X100 Pro 5G
  • Asteroid Black
  • 16 GB RAM
  • 512 GB Storage
Apple iPhone 15 Plus
  • Black
  • 6 GB RAM
  • 128 GB Storage

'This is because they automatically respond to requests without considering how long they have known them or who else is connected with them,' said Arun Vishwanath, an associate professor in the department of communication at the University of Buffalo in New York.

Also read
Looking for a smartphone? To check mobile finder click here.

Predictors of habitual use of Facebook include frequent interactions with the platform, a large number of friend connections and individuals' inability to regulate their social media consumption.

'Social media phishing is the attack vector of choice among cyber criminals and has been implicated in crimes ranging from home invasion to cyber bullying, illegal impersonation of individuals and organisation and espionage,' Vishwanath added.

These scams attempt to trick people into accepting friend requests and gathering crucial personal and financial information from them.

'Hence, understanding why individuals fall victim to social media phishing scams is important from an organisational security, law enforcement and a national security standpoint,' he noted.

The paper appeared in the Journal of Computer-Mediated Communication.

Catch all the Latest Tech News, Mobile News, Laptop News, Gaming news, Wearables News , How To News, also keep up with us on Whatsapp channel,Twitter, Facebook, Google News, and Instagram. For our latest videos, subscribe to our YouTube channel.

First Published Date: 16 Sep, 13:34 IST
NEXT ARTICLE BEGINS