Facebook has been dealing with suspicious behavior of applications, since the launch of its platform Facebook to developers in 07. As an open source application development tool, anyone can create an application, including the cybercriminals who just want to steal your information. With cybercrime awareness, Facebook users should pay more attention to what they click on. Most of these applications are designed to make money for their creator, and this money is actually out of you.
Sophos reported that almost 60,000 people clicked on this particular scam promising to see who has viewed your profile. The application automatically saves a comment to the chronology of the users, with the message "OMG OMG OMG ... I can not believe this actually works! Now you really can see who viewed your profile!. Link here"
the application does not allow users to see views of profile, but rather leads - and anyone who clicks the link displayed on their wall - to a phishing scam designed to steal your personal data .
another popular Facebook app Facebook phishing is the color, which can appear as "Pink Facebook" or "Facebook Black" ... the latter being installed on a computer with antivirus, including a scanner link.
Many Facebook phishing scam and applications offer promising things that seem surprising and hard to resist. Be aware of these offers, including the customization profile, people viewing that spend time on your profile, and games that can instead of stealing your information or spam your friends with malware and viruses, and shipments post to your wall without your permission.
most Facebook applications can be used without problem. However, there are some basic signs that you can look to identify phishing scam and applications: automatic tagging, commenting and sharing links, features that you have not already seen in use in the process Application disappearance of showing any results after being installed promised
If the application that you installed has some of these signs, you will want to remove it immediately. Facebook now allows you to completely control which applications can access your profile, click on the small gear in the upper left corner. Then you must click on "Settings," then "applications" of the application page. You can delete anything in the applications you are not familiar with or have not installed.
If the application has indeed installed on your browser, you may be able to uninstall it by going to Tools then extensions or add-ons depending on the browser you use.
studies show that identity theft is once again on the rise and will soon become the most popular scam. Phishing emails and applications are the best way to steal the identity, eg name, phone number, credit card information ... In 2012, 12.6 million Americans were victims of theft identity, a number that is almost as high as the 09 record of 13.9 million. So be aware of what you click.
The best way to protect your personal information against malicious software and spam is to access a VPN service. The VPN encrypts your Internet connection with a level top secret system that protects you against hackers and ears trying to listen or obtain sensitive information about you
Your computer and your mobile device will be hidden behind the many VPN servers :. When . you are connected to the VPN, no one can access your connection bypassing the protected VPN servers
VPN also reduces your online movements by replacing your routing information: your IP address will be replaced by a anonymous IP address. Our secure DNS servers keep secret requests that you make, so that no one can take a look at your browsing history.
0 Komentar