Trend Technology publishes summer social network use Security Guide

Source: Internet
Author: User
Keywords Trend technology social networking security release summer

Today's social networking sites, by virtue of their popularity, openness and interactivity, have become the main channel for individual users to gain daily information and interpersonal interaction, as well as new tools for business marketing. Facebook, the world's largest social networking site, has broken 500 million subscribers, and Sina Weibo users in China have broken 140 million in a very short time. At the same time, social networking has become the preferred target for cyber hacking attacks, and the privacy of the network has been hidden. According to statistics from December 2010, phishing attacks use social networks to spread the number of cyber-crimes that account for 84.5% of all phishing threats, compared with just 8.3% in early 2010.

Trend technology, the world's leading Internet security maker, recently published an analysis of social-network threat trends, pointing out that social-networking sites are more likely to be attacked by social engineering traps and fake well-known social networking sites, and by sending messages with malicious links. In addition, the huge interest driving force has made the main purpose of information security threats into economic gains through the theft of user information, including: By defrauding individual Taobao account to increase the praise of the network business, through the control of private QQ account to the personal users of the social network of friends to send malicious links, and steal more personal account information; Steal online account to get the best equipment that users spend a great deal of time and cost, and get high returns directly by sneaking into the social web pages of their daily visits, and by defrauding users of their online trading accounts.

Summer will be over, the use of social networks will be at its peak, and trend-tech cyber-security experts have summed up several high-risk social networking behaviors that are most likely to provoke malware and cyber attacks, and have given appropriate security hints and recommendations to remind individuals of Internet users to take smarter, safer social networking behavior. At the same time, trend of science and technology also advocates the majority of users early use of effective security software to ensure the security of network behavior, to avoid exposure to hackers and personal identity information leakage may cause loss of personal interests.

Social networks of trend technologies use security tips:

When you use the abbreviated Web address (tiny URL) service-There are many services on the network to expand the abbreviated Web site, as long as you enter the abbreviation URL, you can see the complete URLs, although not necessarily a secure Web site, at least let you see the original source. The safest way to do this is to use network security software that has malicious Web site interception tools.

When browsing other people's personal information or Web pages-social network users should be alert to fake Web pages, e-mail messages, etc. that are the name of a well-known social networking site, and take basic web and email filtering measures.

When you're looking at and searching for hot topics-when you're searching for the hottest celebrity or hot spot in a frequently visited social media, look carefully at any link before clicking on the search results, preferably by just clicking into the mainstream sites you've heard about.

When you disclose personal data on social networking sites, think twice-users should have the basic knowledge that "any information is published online," and avoid sending personal messages or sharing sensitive business information on social networking sites to avoid the loss of significant data when an account is compromised.

In addition, individual users should proactively understand and use the social networking platform's senior security features to protect their network interests: social networking sites, for example, allow users to set what types of information they see and allow users to open the option of using secure links (HTTPS) to achieve multiple layers of protection through encryption.

Interception of real-world threat trends technology consistent

As the first global leader to provide security services using cloud security computing features, trend Technology's unique active cloud safety interdiction technology can provide global business and individual users with continuous assurance of intercepting real-world network threats. Trend-Tech cloud computing security active threat is a unique cloud client structure, intelligent feedback can be used to search for new potential sources of threat and use the ongoing relational approach to the various threat vectors in the cloud database (Web, e-mail, files) for real-time analysis, no matter where the user to the network can be protected, This has enabled trend technology to react more quickly to new threats than other suppliers. Trend Technology's cloud computing Security Network is the industry's most advanced and comprehensive network that intercepts more than 5.5 billion threats per day for customers, based on e-mail, Web pages, and files.

Trend technology specifically for individual users launched the Cillin cloud security software version 2011 is the world's first to use cloud server to update the virus Library of personal network security software, while carrying the enterprise-class active cloud computing security virus Defense technology, users almost no need to update the virus library, almost will not affect the speed of computer operation , so that users formally farewell to the traditional killing soft "virus code Update" era. With outstanding technology and functional advantages, trend technology has achieved a wide range of market recognition: repeatedly withstood the United States West Coast Laboratories, NSS Labs, AV test, Tolly and other global authoritative third-party testing agencies of the rigorous verification, to obtain a consistent highest evaluation. Recently, the International authoritative evaluation agency Dennis Marvell Labs released the latest real environment test report, Trend technology Cillin Cloud security software 2011 version again obtains the complete surpass market similar personal security software PRODUCT the best result. Learn more about trends Technology Cloud security software PRODUCT information, please visit the website: http://www.trendmicro.com.cn/pccillin/.

(Responsible editor: admin)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.