Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 9 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Help – There’s an Imposter

by The Gurus
March 18, 2016
in Scam Of The Week
Share on FacebookShare on Twitter

Help – There’s an Imposter

By Dulcie McLerie, account director at Eskenzi PR
Recently I discovered that one of my professional email aliases had been used to create a Twitter account – and I had absolutely no idea!
I didn’t receive an email from Twitter notifying me that an account had been created, it wasn’t showing up in my feed, I wasn’t receiving alerts and if I hadn’t tried to create an account using this email address I would probably never have known. It’s all been sorted now, and I have to thank the Twitter team for being responsive and helping me reclaim the account – which had been created in Vietnam of all places, but it did raise a number of questions for me.
Firstly – how was it done? And to be honest this one I’m still a little stumped by. When you create a Twitter profile, you need to use an email address, and to complete the process you have to verify it – but this hadn’t happened. To be on the safe side I have changed the password associated with this email account. So how did they get round that? Answers on a postcard please.
Secondly – why! And again, I don’t really have any answers. There had been no activity on the account – no weird tweets or statuses (I’ve checked.) From what I can tell the account hadn’t been used to make fraudulent purchases. It was linked to a mobile phone – which I’ve now revoked, but other than that it just existed. Weird huh!
Lastly – what other social sites have fake profiles that use one or another of my email addresses and how will I find them? 
So why should this cause me sleepless nights?
On this occasion there was no harm done – or at least none that I can tell. Bar a bit of inconvenience, and a few hours lost productivity reclaiming the account, it would appear that no lasting damage has been caused. But that doesn’t mean I’m happy and can relax. Primarily, as I still don’t fully understand how the scammers did it, I can’t be sure it won’t happen again – or isn’t still happening as over the years I’ve ‘owned’ a number email addresses.
Looking beyond just me personally, it makes me question how many other email addresses have fake profiles associated with them. Organisations could have their employees email addresses spoofed in a similar fashion that are then tweeting, posting statuses or messaging others pretending to be said company. There could be malicious links littering twitter feeds duping unsuspecting individuals into clicking. What about if the profile is trolling someone? What’s to stop these fake accounts uploading pictures, making damaging statements, or any other unpleasantness?
I don’t really have any answers, in fact I just have lots of questions. However, as a communications professional, I do think it’s a risk organisations can’t ignore – if nothing else to reduce the risk of brand damage. While Twitter did identify what it deemed as ‘automated behaviour’ on my fake twitter account, and suspended the profile, I’d imagine there are many others that don’t raise any flags and get stopped.
I’ll leave that thought with you.
 

FacebookTweetLinkedIn
ShareTweet
Previous Post

IT Guys vs the World – The Trust is Broken on BYOD

Next Post

MITRE's bug pilot program fix 'indefinitely' shelved amid criticism

Recent News

Ransomware

Clop Ransomware Gang Extorts Household Names including BBC, British Airways and Boots

June 9, 2023
code

Developers Kept Away From Coding, Estimated £10.4bn a Year Wasted

June 8, 2023
large open office, bright.

Employees Feel 10 Times Calmer in an Environmentally Friendly Office Space

June 7, 2023
Blue Logo OUTPOST24

Outpost24 Acquires EASM Provider Sweepatic

June 7, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information