2023-09-14 22:48:00
The “Nude Scam”, which occurs when criminals extort people with threats to disclose intimate photos, returned to the discussion and, according to the Civil Police of Rio Grande do Sul, led to more than 30 people being arrested, accused of scams carried out in the South Region This type of crime raises an alert: where is it safe to store images?
Fernando Bryan Frizzarin, cybersecurity specialist at BluePex® Cybersecurity, explains that, generally, fraudsters make contact with their targets through social networks and have a profile of victims: middle and upper class men, attracted to fake profiles with photos of young women. According to him, the victim is asked to share intimate photos and begins to be extorted. The expert mentions that there is also another method: leaking personal images stored on devices. With access to the content, the criminal asks for a reward so as not to ‘spread’ it on the network.
For the cybersecurity specialist, it is possible to prevent image leaks. “If the new friend request doesn’t have any mutual friends, or apparently has never been to a place/event where you might have been too, be suspicious. Especially if you realize that the contact doesn’t even have friends on the social network and you are the first or one of the first added”. Another option to prevent the scammer from creating a socioeconomic profile is to keep social media accounts in private mode, where only already accepted connections have access to your data and photos.
To avoid leaking images stored in the cloud, the BluePex® specialist recommends activating an extra barrier and recommends avoiding leaving images directly on the device. “Using well-known cloud storage services is better than unknown or improvised solutions. It is important to use two-factor authentication for any and all cloud services”, he added. It is not recommended to use external devices, such as hard drives and pen drives, to store sensitive or confidential files, as they do not have protection mechanisms.
Fernando remembers that, in the workplace, companies can monitor what employees do on the internet and implement policies on the use of digital tools. “To this end, it is essential to inform employees regarding this policy, a preventive action that discourages misuse of the internet”, he reports.
The weakest link in the cybersecurity chain is people. Solutions that block access to dubious websites and emails, such as those worked by BluePex®, can be implemented to avoid losses that go beyond personal losses to victims and represent a threat to the corporate environment. The Practical Cyber Security Guide, available free of charge, provides tips for good people management and security and can be downloaded via the link: https://marketing.bluepex.com/guia-pratico-de-cyber-seguranca/.
Sobre a BluePex®️ Cybersecurity
BluePex®️ Cybersecurity is a company with more than two decades of experience in manufacturing technology for the cybersecurity market. It is certified with the EED – Strategic Defense Company seal, from the Brazilian Ministry of Defense, and is a pioneer in receiving the VB-100 seal, in Latin America.
1694777288
#Nude #scam #raises #alert #image #storage