Socials are as useful as they are really dangerous. Behind the potential of the main social networks very often hide pitfalls that damage not only our virtual life but also our habits. On Facebookin the last few days, has been turning one new scam which has already affected several accounts and is ready to make further victims. Here’s how it works and why it is so deceptive.
It all starts with a private message In which the user is felt that his account has been temporarily blocked or even in the process of definitive elimination due to reports from other users. Behind what looks like a message developed by an official algorithm, a deception created ad hoc is hidden. The text has all the credentials to look original: with it it even has the blue tick typical of the official destination of the destination. By focusing everything on the sense of urgency, computer criminals promise the user to “save” the account by visiting an external site.
The problem is easy to say: the data and access passwords will be entered on this site in view of the restoration. From here the scam starts. The criminals could spread our credentials, blackmail us to return to possession of the account or even try further scams asking for money from our friends on Facebook or spreading malware in other accounts. But not only. In doing so, scammers have all our photos, our contacts and therefore our virtual life available.
Defending yourself from this computer deception is possible. First of all, at first thing to do is check the sender of the messages. Meta, in fact, never sends private messages related to dangers for the safety of accounts. Equally necessary would not be taken by the agitation of the urgent message sent by the scammers. The last advice, but not least, is to activate the system of two -factor authentication. It is a system as simple as it is effective: this safety method, instead of a single password easily replicable, requires you to put several identification factors in order to access a single service.
To give a more specific example, in fact, the system will ask you to insert a password and, as a second authentication factor, will send the email selected a code to be inserted as a further safety step.