Threats can come in many forms, and this includes online threats. While using the Internet, we are prone to be attacked by many viruses such as identity theft, trojans, malware, phishing and more. Technology has advanced so much that it has made everything easy and accessible to anyone and everyone, including privacy too. Hackers are always looking for good opportunities to attack users. According to an online statistic, from 2010 to 2017, the number of social media users worldwide increased from 0.97 billion to 2.46 billion users. It is also estimated that there would be around 2.77 billion users in 2019. These users are subject to online threats. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay Many people geotag their daily movements on social media platforms like Facebook, Instagram, Twitter and other platforms as well. Adding location to a post is called "geotagging" and this feature is not new to anyone - it has been around for a few years on various platforms, when geotagging is enabled anyone would be able to know the location of users and hackers are in able to find the exact specific location using advanced technologies. Geotagging works the same way as tracking, it puts the user in danger of being followed. It also alerts thieves that users are not in their homes when they provide real-time information about their whereabouts. Additionally, many people don't know that geotagging information is automatically hidden within photos taken with devices like iPhone and Android cameras. According to an article, the geotag is embedded in an image and some data that provides the longitude and latitude of the place where the photo was taken. Even though location data is not visible to the casual viewer, when a photo is posted to social media, users' privacy and security are compromised. To avoid this and keep users safe, users should allow.” This way, hackers would find it difficult to identify the exact location of the user, this helps to keep them more secure. Phishing is the attempt to obtain sensitive information such as usernames, passwords and credit card details for wrong intentions. It's as if hackers and online thieves are fishing for other people's personal information. Usually, users of social media platforms post their personal information such as full names, birthdays, education and almost everything about them that can be used to attack them by social engineers. Most users are attacked via email, falling into the phishing trap. Phishing works in two ways. First, they create links to fake websites to steal login and personal information. These websites are created so similar to real websites that it seems too convincing to users to be fooled. Please note: this is just an example. Get a custom paper now from our expert writers. Get a Custom Essay There are some types of emails that users need to take note of, which are malicious, fake, and spam emails. Malicious emails contain malicious attachments and user cues that contain undetected malware and redirect users to sites that host malware. This threat can be easily identified when a warning screen appears on a website's screen, a pop-up appears, you are redirected to another page or when the page goes blank and even when the email is sent from a sender unknown. In case a user clicked.
tags