Fraudsters and Social Media

Social media sites are great ways to keep connected and network. But a fraudster could be using familiarity with your online identity to gain access to your computer, steal your personal information and get you to click on malicious links that infect your computer.
If you need a primer on how to protect yourself from phishing attacks, click here for more information.
What are the Red Flags?
Dr. Tom Keenan, Professor at the University of Calgary and author of the best-selling book, Technocreep says, “Social media is a treasure trove of information for fraudsters. Remember that friend request from a person you didn't recognize? The odds are good that it's not even a person, but a bot seeking to get access to your information."
What Could a Fraudster Want?
"If it's on a business site networking site, the bad guys may be trying to figure out who within your company has the ability to send a wire transfer, so they can try to trick them into sending money with a faked email from the boss. Or maybe they want to know where you live? A photo of your house, or your car might give out personal information that you really don't want to share."
These are just some of the newer ways fraudsters are collecting your information. They're less known, but just as with the more common phishing, ransomware, malware and spyware attacks, you still need to be wary of them.
Fraudsters are Getting So Much Sneakier
There are even more devious possibilities, like looking for what school your child attends so they can then send a fake phishing email pretending it's from the principal, for example, to gain your trust.
Tom gives this example: “You get an email from someone claiming to be a parent who took some great photos of your child at the XYZ school's soccer match (and the schedule for that is conveniently posted online for a scammer to find). Of course, you instantly open the link and, boom, your computer is infected with malware that sends your confidential information to a criminal somewhere on the other side of the world."
Be Careful With Photos
“Photos are a rich source of information too," notes Tom. “Where you live, what kind of car you drive, and more. For example, if a car dealer you don't recognize calls you up or emails you telling you that your car (and names your make, model and year), is due for an oil change - be suspicious."
We live in a world where we must be cautious about emails and links since the downsides, getting infected with malware or having your computer held for ransom, are both real and getting more and more common.
If you don't recognize the sender, ignore or discard the email. If it's really important, they'll send it again or contact you in some other way.
Top Ways to Protect Yourself:
- Never give anyone info over the phone or via email.
- If you suspect there's an issue, call or contact the person or company in question yourself, and not from a link or phone number listed in the email, but rather the company's official website.
- Pause and slow down when accepting invitations on social media.
- Never click on a link or attachment you're not 100% sure isn't a phishing attack, even if it's coming from what you think is a trusted source or a friend. If you're unsure, contact the sender directly by phone or in a new, separate email.
Related posts



Legal Stuff
This article or video (the “Content”), as applicable, is provided by independent third parties that are not affiliated with Tangerine Bank or any of its affiliates. Tangerine Bank and its affiliates neither endorse or approve nor are liable for any third party Content, or investment or financial loss arising from any use of such Content....
The Content is provided for general information and educational purposes only, is not intended to be relied upon as, or provide, personal financial, tax or investment advice and does not take into account the specific objectives, personal, financial, legal or tax situation, or particular circumstances and needs of any specific person. No information contained in the Content constitutes, or should be construed as, a recommendation, offer or solicitation by Tangerine to buy, hold or sell any security, financial product or instrument discussed therein or to follow any particular investment or financial strategy. In making your financial and investment decisions, you will consult with and rely upon your own advisors and will seek your own professional advice regarding the appropriateness of implementing strategies before taking action. Any information, data, opinions, views, advice, recommendations or other content provided by any third party are solely those of such third party and not of Tangerine Bank or its affiliates, and Tangerine Bank and its affiliates accept no liability in respect thereof and do not guarantee the accuracy or reliability of any information in the third party Content. Any information contained in the Content, including information related to interest rates, market conditions, tax rules, and other investment factors, is subject to change without notice, and neither Tangerine Bank nor its affiliates are responsible for updating this information.
Tangerine Investment Funds are managed by Tangerine Investment Management Inc. and are only available by opening an Investment Fund Account with Tangerine Investment Funds Limited. These firms are wholly owned subsidiaries of Tangerine Bank. Commissions, trailing commissions, management fees and expenses all may be associated with mutual fund investments. Please read the prospectus before investing. Mutual funds are not guaranteed, their values change frequently and past performance may not be repeated.