  {"id":181,"date":"2025-04-25T09:30:05","date_gmt":"2025-04-25T13:30:05","guid":{"rendered":"https:\/\/www.montclair.edu\/phish-files\/?p=181"},"modified":"2025-04-22T12:34:07","modified_gmt":"2025-04-22T16:34:07","slug":"on-the-rise-social-media-and-phishing-scams","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/phish-files\/2025\/04\/25\/on-the-rise-social-media-and-phishing-scams\/","title":{"rendered":"On the Rise: Social Media and Phishing Scams"},"content":{"rendered":"<p data-pm-slice=\"1 3 []\">Social media platforms have become a new battleground for phishing scams, with cybercriminals exploiting these networks to steal personal information and compromise accounts. As social media usage continues to grow, so does the risk of falling victim to these sophisticated schemes.<\/p>\n<h2>How Phishing Works on Social Media<\/h2>\n<p>Phishing on social media involves scammers impersonating trusted entities or individuals to deceive users.<\/p>\n<h3>Common tactics<\/h3>\n<ul data-spread=\"false\">\n<li><strong>Fake Profiles<\/strong>: Scammers create fake accounts that look like real users or brands, tricking people into sharing sensitive information<\/li>\n<li><strong>Malicious Links<\/strong>: Fraudulent messages or posts contain links that lead to fake login pages or malware downloads<\/li>\n<li><strong>Direct Messages (DMs)<\/strong>: Cybercriminals send personal messages claiming urgent issues, such as account verification or prize winnings, to lure victims into providing information<\/li>\n<\/ul>\n<h3>Common Social Media Phishing Tactics<\/h3>\n<ol start=\"1\" data-spread=\"false\">\n<li><strong>Impersonation of Friends or Influencers<\/strong>: Scammers pose as a trusted friend or public figure, asking for financial help or login credentials<\/li>\n<li><strong>Fake Brand Promotions<\/strong>: Posts or messages promise giveaways or discounts, requiring users to click a link and provide information<\/li>\n<li><strong>Account Recovery Scams<\/strong>: Fraudsters claim your account has been hacked and offer assistance, but instead steal your login credentials<\/li>\n<li><strong>Phishing Ads<\/strong>: Malicious advertisements redirect users to fake websites designed to collect personal data<\/li>\n<\/ol>\n<h3>Real-World Examples<\/h3>\n<ul data-spread=\"false\">\n<li><strong>Instagram Fake Giveaways<\/strong>: Users receive messages claiming they\u2019ve won a contest, but are asked to click a link and enter their login details<\/li>\n<li><strong>LinkedIn Job Offers<\/strong>: Scammers send fake job invitations asking for personal information or payments for \u201capplication fees\u201d<\/li>\n<li><strong>Facebook Impersonations<\/strong>: Fraudsters mimic friends and request urgent financial help or sensitive data<\/li>\n<\/ul>\n<h2>Protecting Yourself on Social Media<\/h2>\n<p>To avoid phishing scams on social media, follow these tips:<\/p>\n<ol start=\"1\" data-spread=\"false\">\n<li><strong>Verify Accounts<\/strong>: Check for the verified badge on brand or influencer profiles before interacting<\/li>\n<li><strong>Be Skeptical of Links<\/strong>: Avoid clicking on links in messages or posts without verifying their authenticity<\/li>\n<li><strong>Enable Two-Factor Authentication (2FA)<\/strong>: Adds a second layer of security to your accounts<\/li>\n<li><strong>Monitor Privacy Settings<\/strong>: Limit what personal information is visible to others on your profiles<\/li>\n<li><strong>Report Suspicious Activity<\/strong>: Most platforms allow users to report phishing attempts and fake profiles<\/li>\n<\/ol>\n<h3>What to Do if You Fall Victim<\/h3>\n<p>If you suspect your social media account has been compromised:<\/p>\n<ul data-spread=\"false\">\n<li>Change your password immediately<\/li>\n<li>Enable 2FA for extra protection<\/li>\n<li>Notify the platform to secure your account<\/li>\n<li>Warn your connections to avoid potential scams from your account<\/li>\n<li>Monitor your accounts for unusual activity<\/li>\n<\/ul>\n<h2><strong>Want to Know More?<\/strong><\/h2>\n<p><span style=\"font-weight: 400\">Inspired eLearning | <a href=\"https:\/\/inspiredelearning.com\/blog\/social-media-phishing-primer\/\">Social Media Phishing: A Primer<\/a><\/span><\/p>\n<p><span style=\"font-weight: 400\">Pluggedin | <a href=\"https:\/\/www.pluggedin.com\/blog\/on-the-radar-social-media-phishing-gender-gap-with-teens-and-tiktok-amber-alerts\/\">On the Radar: Social Media Phishing, Gender Gap with Teens and TikTok AMBER Alerts<\/a><\/span><\/p>\n<p><span style=\"font-weight: 400\">Trend Micro | <a href=\"https:\/\/www.trendmicro.com\/en_us\/what-is\/phishing\/social-media-phishing.html\">What Is Social Media Phishing?<\/a><\/span><\/p>\n<p><span style=\"font-weight: 400\">LinkedIn | <a href=\"https:\/\/www.linkedin.com\/pulse\/careful-against-most-common-social-media-phishing-scams-keepnetlabs-8ylbe\">Be Careful Against Most Common Social Media Phishing Scams<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social media platforms have become a new battleground for phishing scams, with cybercriminals exploiting these networks to steal personal information and compromise accounts. As social media usage continues to grow, so does the risk of falling victim to these sophisticated schemes. How Phishing Works on Social Media Phishing on social media involves scammers impersonating trusted [&hellip;]<\/p>\n","protected":false},"author":349,"featured_media":222,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-181","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/users\/349"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/comments?post=181"}],"version-history":[{"count":5,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/181\/revisions"}],"predecessor-version":[{"id":524,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/181\/revisions\/524"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media\/222"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media?parent=181"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/categories?post=181"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/tags?post=181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}