Social Media Scams and What Every User Should Know in 2025
Social media has become intricately woven into our everyday lives. We use it to keep in touch with friends and family, make new connections, and stay updated on current trends and news.
Social media has become intricately woven into our everyday lives. We use it to keep in touch with friends and family, make new connections, and stay updated on current trends and news.
In today’s digital communication landscape, leadership communication via email is central to corporate operations. However, this vital channel has increasingly become a target for cybercriminals aiming to exploit trust and authority within organizations. Executive emails, especially messages that appear to emanate from a CEO or senior management, are frequently imitated in scams designed to deceive employees, partners, or stakeholders.
These fraudulent emails compromise business email etiquette and can severely damage company culture, communication, and corporate correspondence integrity, highlighting the need for robust phishing protection measures. High-profile executives such as Elon Musk, Satya Nadella, Tim Cook, Sundar Pichai, Mary Barra, Jeff Bezos, Sheryl Sandberg, and Warren Buffett are often targets or represented in fake CEO emails, reflecting their global leadership stature.
The FBI has warned Americans about a three-phase cyber scam known as the Phantom Hacker Scam. Threat actors are employing a three-phase hacking strategy to gain unauthorized access to the financial accounts of their victims. The primary targets of the Phantom Hacker scam are mainly elderly individuals nearing retirement age.
In our hyper-connected world, the rapid spread of information has become a double-edged sword. While it has democratized knowledge, it has also created a fertile ground for malicious actors.
As cyber threats evolve, phishing attacks continue to be one of the most pervasive and damaging types of cybercrime targeting businesses worldwide. Phishing detection and phishing prevention have become critical components of any comprehensive cybersecurity strategy in 2025. With the increasing sophistication of spear phishing and email fraud, organizations require advanced, integrated cybersecurity solutions that offer robust email security, social engineering protection, and real-time threat detection.
Phishing attacks and web application threats are hitting more sites every year. With ninety-eight percent of web applications showing weaknesses, attackers have no shortage of targets. Here’s what you need to know and the steps you can take to keep your website and users safe.
Almost every website has open doors if the basics are not covered. Phishing, ransomware, and botnet attacks are all common outcomes of these gaps. Last year, almost fifty-four people every second were hit by a cyber attack. In 2024 alone, there were over 1.5 million attacks that took aim at the domain name system. If your website’s security is not kept current, it stands out to attackers.
Password habits remain a weak defense. Forty-four percent of people still recycle passwords across accounts. This increases risk, as one leak can lead to more accounts being compromised. Many threats also start with phishing emails. Business email scams took in over fifty-five billion dollars in the last ten years. Company accounts can be broken into with a single successful fake message.
Many attacks start by targeting loopholes in hosting platforms or misconfigured accounts. Weak controls and patchy maintenance can open the way for phishing or bot-based threats. For example, some businesses using low-cost shared plans skipped security updates, which later let attackers slip in through outdated plugins.
Choosing well-maintained services helps. Premium WordPress hosting solutions, managed cloud options, and specialized site management firms offering built-in updates, server monitoring, and strong account isolation lower many risks. WordPress hosting, managed cloud options, and specialized site management firms can all make it harder for phishing attacks to succeed as long as security settings are kept current.
Attackers do not take long to act. The fastest known electronic crime breakout took only fifty-one seconds. Most malware detected in 2024 was not even real software but used other sneaky methods to fool users. Phishing attacks get more advanced each year and can be tough to spot without training and proper tools.
Once a website or email account is breached, attackers can quickly spread malware, steal money, or use your site to target others. The odds of getting stolen funds back are very low. Police and other authorities recover around two percent on average.
Cybercrime comes with heavy price tags. The expense worldwide is forecast to pass twelve trillion dollars by 2025. That is about thirty-three billion each day. Small and medium businesses are hit hard. In Canada and Mexico, more than two-thirds of these businesses reported cyber attacks in the past year. Healthcare and retail sites are also common targets, with automated attacks using bots up by sixty percent and every major healthcare site facing these problems.
A phishing attack can be the start of a run of trouble. After a breach, it can take up to 258 days on average to spot and deal with the damage. The largest hack so far hit over three billion user accounts. Most can trace at least some of the problem back to a simple phishing trick or weak password.
Security is not one thing but a set of habits. Here are steps that reduce your risk without adding too much work:
Even if your own systems are strong, vulnerabilities in your supply chain can be exploited. By next year, nearly half of global companies may see supply chain incidents. Review which companies have access to your data or website and ask how they keep things safe. Missteps like a tracker error in a web tool once led to a breach that affected almost five million people in one case alone.
Relying on law enforcement to get back lost money or data is not realistic. Only a tiny share ever returns. Prevention is much less expensive. Security experts suggest reviewing your policies often, checking logs every day, and building a habit of doubting odd emails or login requests.
Ninety percent of breaches come down to user actions. Even advanced tools help only if people use them well. Set clear rules, keep training current, and keep software up to date.
Ninety percent of breaches come down to user actions. Even advanced tools, including phishing protection solutions, help only if people use them well. Set clear rules, keep training current, and keep software up to date.
Most attacks succeed because of one small gap, not a grand scheme. Stay alert, choose strong hosting, and make good security a routine part of running your website.
Brad’s Bottom Line Up Front:
This is the most critical and cost-effective area. Since these attacks manipulate people, your team is your best defense.
phishing@yourcompany.com) where employees can forward anything that looks suspicious. When they do, thank them. Making reporting easy and safe turns every employee into a sensor for your business.You can dramatically improve security by enabling controls that are likely already available to you.
Good security is also about having clear plans.
The digital threat landscape is in a state of perpetual evolution, yet for years, one attack vector has remained stubbornly persistent and effective: phishing. It is the common thread that runs through a vast number of security incidents, often serving as the initial point of entry for more devastating offensives like ransomware deployment, industrial espionage, and large-scale data breaches. The enduring success of phishing lies in its masterful exploitation of human psychology, crafting personalized and convincing narratives that compel victims to take actions against their own interests. However, the classic image of a phishing attack—an email riddled with grammatical errors, sent from a suspicious address, and containing a blatantly dubious link—is becoming dangerously obsolete. A new, more insidious paradigm has emerged, one where threat actors no longer simply fake legitimacy but actively co-opt and weaponize it.
This evolution has been dramatically accelerated by the widespread availability of sophisticated tools and technologies. The rise of generative artificial intelligence, for instance, has supercharged attackers’ capabilities, leading to a staggering 4,151% increase in phishing volume since late 2022. AI enables the creation of flawless, contextually relevant lures that are devoid of the traditional red flags users have been trained to spot. This technological advancement is coupled with a strategic shift in the cybercrime economy itself. The proliferation of Phishing-as-a-Service (PhaaS) platforms and advanced, ready-to-use phishing kits has professionalized the attack lifecycle. This development lowers the barrier to entry, allowing less-skilled actors to deploy highly sophisticated campaigns that were once the exclusive domain of advanced persistent threat (APT) groups. The modern organization is not merely defending against individual hackers but against a mature, illicit service-based economy that provides potent attack capabilities on demand.
Nowhere is this new reality more clearly illustrated than in the global phishing campaign that abused the infrastructure of Nifty.com. Between April and May of 2025, a multi-wave attack targeted hundreds of organizations, particularly in the financial services, technology, and healthcare sectors. This was not a simple domain spoofing operation. The attackers leveraged legitimate accounts on a trusted platform, allowing their malicious emails to sail past standard security defenses that rely on authentication protocols like SPF, DKIM, and DMARC. The Nifty.com campaign serves as a quintessential case study in this evolved threat, demonstrating how the very fabric of digital trust can be turned into a weapon.
This report provides a definitive analysis of this new attack paradigm, using the Nifty.com campaign as a detailed lens. It will first deconstruct the technical anatomy and social engineering tactics that made the campaign so effective. It will then broaden the scope to show how the abuse of legitimate infrastructure is a pervasive trend affecting major cloud and service providers. Finally, it will present a comprehensive, multi-layered corporate defense framework designed to provide genuine resilience against this modern class of trust-based attacks, moving beyond outdated advice to equip organizations for the challenges ahead.
The foundational element that defined the Nifty.com phishing campaign and made it so effective was its clever choice of attack vector. The threat actors did not engage in traditional domain spoofing or typosquatting, techniques that security systems and savvy users are increasingly adept at detecting. Instead, they weaponized trust by operating from within a legitimate, established domain: nifty.com.
The attackers legitimately registered free consumer accounts on nifty.com, a well-known Japanese Internet Service Provider (ISP). By doing so, they gained the ability to send emails that originated from Nifty’s own mail servers (e.g., mta-snd-e0X.mail.nifty.com) and were sent from the ISP’s reputable IP address ranges (e.g., 106.153.226.0/24). This seemingly simple step had profound implications for bypassing security controls. Because the emails were sent from authentic accounts on legitimate infrastructure, they successfully passed all standard email authentication checks: Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting, and Conformance (DMARC). This rendered an entire class of legacy email security gateways ineffective, as these systems are heavily reliant on failed authentication checks as a primary indicator of a malicious or spoofed email. The emails arrived in user inboxes with all the technical markers of a legitimate message, cloaking them in an aura of authenticity that was difficult to penetrate.
A crucial point of clarification is the distinction between the abused service and a similarly named platform. The domain exploited by the attackers was nifty.com, the Japanese ISP. This is a separate and distinct entity from niftypm.com, a project management Software-as-a-Service (SaaS) platform. NiftyPM has undergone extensive security validation, holding certifications such as SOC 2 and ISO 27001, and was not compromised in any way. The attackers’ choice to leverage the ISP demonstrates a sophisticated understanding of brand association. They deliberately chose a “soft target”—a public-facing service offering free accounts—that shared a name with a trusted corporate brand, knowing that the name “Nifty” would lend credibility to their campaign.
This tactic highlights a subtle but critical vulnerability surface: brand reputation “splash damage.” An organization’s brand and the trust it commands are significant assets. This campaign demonstrates that these assets can be targeted indirectly. By compromising or abusing a less-secure, publicly accessible service that shares a brand name or affiliation with a highly secure corporate entity, threat actors can leverage the trust associated with the primary brand to enhance the legitimacy of their attacks.
This creates a new dimension of risk where the security posture of any entity sharing a brand identity can become a potential liability. Investing in strong logo design helps maintain a consistent visual identity, making it easier for customers to recognize official communications and avoid impersonation attempts. It underscores the need for organizations to expand their security considerations beyond their own perimeter to include proactive brand protection and defensive domain registration, transforming these from purely marketing functions into essential components of a holistic security strategy.
The Nifty.com campaign was not a single, isolated event but a meticulously planned and adaptive operation executed over several weeks. Its anatomy reveals a multi-stage process designed for maximum evasion, combining sophisticated technical obfuscation with clever payload delivery to bypass both automated defenses and human scrutiny.
Analysis of the campaign timeline shows a series of distinct but related waves occurring between late April and late May 2025. The attacks began with lures themed around an “Execution Agreement,” followed by subsequent waves using the same theme before introducing a variant centered on a “SAFE agreement.” The repetition, timing, and adaptation of lures strongly suggest the use of an automated phishing kit, allowing the attackers to orchestrate high-volume bursts of activity with minimal manual effort.
The payload delivery method was a key element of the campaign’s evasive design. Instead of embedding a malicious link directly in the email body—a common tactic that many email filters are programmed to detect—the attackers hid their payload within attachments. These attachments were typically .html or .pdf files with innocuous, business-oriented filenames like SAFE_Terms_May2025.pdf. This approach is designed to circumvent simple URL scanners that only parse the text of an email, forcing security systems to inspect the content of the files themselves, a more resource-intensive task.
Once a user opened the attachment, they were sent down a complex, multi-layer redirection chain—an “evasion gauntlet” designed to shake off automated analysis tools. A typical chain began with a click that led to a legitimate-looking marketing tracker, such as one hosted on thryv.com, before redirecting to the true phishing site, which was often hosted on obscure Russian domains (e.g., [...].iqmwpx.ru) and contained heavily obfuscated JavaScript. This layering makes it difficult for a security sandbox to follow the full path to its malicious conclusion, as the initial hop appears benign.
To further fortify their attack against analysis, the threat actors integrated a suite of advanced evasion techniques into the intermediate and final landing pages. These included:
The following table synthesizes the various tactics, techniques, and procedures (TTPs) employed throughout the Nifty.com campaign, providing a structured overview for security professionals.
| Tactic | Technique | Description & Purpose |
|---|---|---|
| Initial Access | Abuse of Trusted Infrastructure | Attackers used legitimate nifty.com ISP accounts to send emails, ensuring they passed SPF/DKIM/DMARC checks and bypassed reputation-based filters. |
| Execution | Malicious Attachment | The payload was delivered via .html or .pdf attachments, avoiding direct malicious links in the email body to evade simple scanners. |
| Defense Evasion | Multi-Layer Redirection | A chain of redirects, starting with a benign tracker, was used to obfuscate the final malicious destination from automated security tools. |
| Defense Evasion | Anti-Analysis Techniques | Implemented browser fingerprinting, VM checking, and time-based deferrals to detect and bypass automated sandboxing environments. |
| Defense Evasion | Obfuscated Files/Information | HTML padding and multipart MIME structures were used within attachments to hide malicious code from content-based filters. |
| Credential Access | Credential Harvesting | The final landing page was a professionally designed, SSL-secured portal intended to steal user credentials and session tokens. |
| Social Engineering | Display Name Spoofing | The “From” field was manipulated to impersonate trusted brands like DocuSign, leveraging their reputation to increase the email’s credibility. |
While the technical sophistication of the Nifty.com campaign was formidable, its success was ultimately contingent on manipulating the human element. The attackers deployed a carefully crafted social engineering strategy designed to exploit professional norms, cognitive biases, and the inherent trust users place in familiar brands and workflows.
The campaign’s lures were not generic but were specifically tailored to a corporate audience, with a focus on organizations in the financial services, technology, and healthcare sectors. The use of filenames like SAFE_Terms_May2025.pdf and Execution_Agreement.html was a deliberate choice. These terms reference common legal and financial documents, creating a powerful sense of professional obligation and context. An employee receiving an email about an “Execution Agreement” is psychologically primed to treat it as a legitimate and important work-related task, lowering their natural skepticism.
To amplify this effect, the attackers employed brand impersonation through a technique known as “display name spoofing”. While the underlying sender email address was a generic one from nifty.com, the display name shown in the user’s inbox was crafted to appear as if it came from a trusted service, such as “Name via DocuSign”. This tactic cleverly leverages the reputation of well-known brands like DocuSign, which are integral to many business workflows. By mimicking the notification format of these services, the attackers made their malicious request seem like a routine part of a standard, secure process, further disarming the target.
A final, crucial component of the social engineering was the quality of the communication itself. The emails were free of the spelling and grammatical errors that are often telltale signs of a phishing attempt. The flawless grammar and professional tone are indicative of the use of high-quality phishing kits or even AI-generation tools, which can produce convincing and contextually appropriate text at scale. By eliminating this common red flag, the attackers removed one of the last lines of defense for a user trained in basic security awareness.
The ultimate goal of this multi-faceted campaign was unambiguous: credential harvesting. The attackers sought to steal not only usernames and passwords but also active session tokens or cookies, specifically targeting Gmail sessions. The theft of session tokens is particularly dangerous as it can allow an attacker to bypass certain forms of multi-factor authentication (MFA) by hijacking an already authenticated session, granting them direct access to the victim’s account and the sensitive data within.
The Nifty.com campaign, while a stark example, is not an anomaly. It is a clear indicator of a dominant and accelerating trend in the cyber threat landscape: the systematic abuse of legitimate internet services (LIS) to conduct malicious operations. Threat actors, ranging from financially motivated cybercriminals to sophisticated state-sponsored groups, are increasingly choosing to operate from within the trusted confines of the global digital infrastructure. This “Living Off the Land” philosophy, which traditionally referred to attackers using pre-installed tools on a compromised endpoint to evade detection, has now expanded to encompass the very infrastructure of their attacks. The motivation is the same: to blend in with the massive volume of legitimate network traffic and bypass security controls that are designed to spot and block overtly malicious or unknown entities.
This trend is pervasive across the digital ecosystem, with threat actors exploiting a wide array of trusted platforms:
storage.googleapis.com) and Microsoft Azure (blob.core.windows.net) to host phishing pages. Because these domains are highly reputable and essential for normal business operations, blocking them is not feasible. An alert for traffic to storage.googleapis.com is far less likely to be investigated than an alert for traffic to a newly registered, unknown domain, providing attackers with a powerful cloak of invisibility.This strategic shift fundamentally breaks security models that are built on a foundation of reputation and blacklisting. When the attack originates from a trusted Microsoft server, is hosted on Google’s infrastructure, and is proxied through Cloudflare, traditional indicators of compromise become meaningless. The challenge for security teams is no longer to differentiate “good” from “bad” domains but to perform deep contextual and behavioral analysis on traffic to and from universally “good” domains—a significantly more complex and resource-intensive task.
To fully grasp the strategic challenge posed by campaigns like the one that abused Nifty.com, it is essential to draw a sharp distinction between traditional phishing methodologies and the new paradigm of infrastructure-abuse attacks. While both share the ultimate goal of deception and theft, their underlying mechanics and the defenses they bypass are fundamentally different.
Traditional phishing operates on a principle of impersonation and deception. Its effectiveness hinges on creating a convincing fake. This involves techniques such as:
paypa1.com instead of paypal.com, or micros0ft-support.com).The primary defenses against these traditional attacks are a combination of user vigilance and technical filters. Users are trained to hover over links, check for misspellings, and scrutinize the sender’s address. Technical controls like DMARC, SPF, and DKIM are designed specifically to detect and block spoofed emails, while URL scanners and domain blacklists identify and flag known-bad or suspicious domains.
In stark contrast, infrastructure-abuse phishing operates on a principle of exploiting inherent trust. Instead of creating a fake, it compromises or misuses a legitimate entity. Key characteristics include:
nifty.com, gmail.com, or a corporate Microsoft 365 tenant.This methodology directly bypasses the very controls designed to stop traditional phishing. Domain reputation analysis is useless when the domain is legitimate. Email authentication provides a false sense of security. User training focused on spotting fake domains becomes irrelevant when the domain is real. Consequently, the defense against infrastructure abuse must be more advanced, focusing on behavioral and contextual analysis rather than simple reputation checks. It requires a security posture that operates under the assumption that any source, no matter how trusted, could potentially be malicious.
The following table provides a comparative analysis to crystallize the fundamental differences between these two phishing paradigms.
| Attribute | Traditional Phishing | Infrastructure-Abuse Phishing |
|---|---|---|
| Primary Vector | Spoofed or lookalike domains (e.g., micros0ft.com) |
Legitimate accounts on trusted platforms (e.g., user@nifty.com, user@gmail.com) |
| Core Principle | Impersonation and Deception | Exploitation of Inherent Trust |
| Email Authentication | Often fails SPF/DKIM/DMARC checks | Passes all SPF/DKIM/DMARC checks |
| Key Bypassed Defense | User vigilance, basic spam filters, DMARC | Email authentication, domain reputation analysis, simple URL blacklists |
| User Psychology Exploited | Deception, urgency, fear, curiosity | Inherent trust in known brands and services, professional obligation, normalized workflows |
| Primary Detection Method | Signature/reputation-based (URL blacklists, domain checks) | Behavioral/contextual analysis (unusual sender-recipient pairs, attachment sandboxing, redirect chain analysis) |
This comparison makes it clear why infrastructure-abuse attacks represent such a significant leap in threat sophistication. They invalidate a foundational assumption of many security programs: that traffic from trusted, reputable sources is safe. For any CISO or security leader, this table should serve as a powerful justification for investing in a new generation of security technologies and training programs capable of addressing this evolved threat.
In the face of attacks that weaponize trust and operate from within legitimate infrastructure, traditional, perimeter-focused security models are no longer sufficient. Defending the modern enterprise requires a resilient, multi-layered framework built on the principle of Zero Trust: “never trust, always verify.” This approach assumes that threats can originate from anywhere, both inside and outside the network, and that no user or system should be trusted by default. Such a framework must integrate advanced technology, fortify the human element, and implement proactive security processes.
The first layer of a modern defense involves re-engineering the technical security stack to detect and neutralize threats that legacy systems were never designed to handle.
Advanced Email Security: Standard email filters that rely on sender reputation and signature matching are easily bypassed by infrastructure-abuse attacks. Organizations must deploy advanced email security solutions with capabilities that go deeper:
.html and .pdf attachments, it is critical that all inbound attachments are automatically opened and analyzed in a secure, isolated sandbox environment. This allows the security system to observe the file’s behavior—such as initiating a network connection or attempting to execute a script—and block it before it ever reaches the user’s inbox.Identity and Access Management (IAM): The Last Line of Defense: Since the ultimate goal of many phishing attacks is credential theft, robust top identity verification tools and IAM controls are the final and most critical line of technical defense.
Defense-in-Depth for Post-Click Protection: A resilient strategy must assume that, despite all preventative measures, a user will eventually click a malicious link or open a dangerous attachment. The following technologies provide critical post-click protection:
Technology is a critical component of defense, but it cannot be the only one. The human element remains a primary target for attackers, and therefore must be a primary focus of defense. However, the nature of security training must evolve to match the sophistication of the threats.
The traditional approach to security awareness training—annual slide decks teaching users to look for typos or hover over links—is fundamentally broken in an era of AI-generated lures and infrastructure-abuse attacks. A more effective strategy moves beyond simple awareness and aims to build genuine human resilience through continuous, adaptive training and the cultivation of a strong security culture. You can even reinforce this cultural shift by pairing employees with experienced peers through Qooper mentoring software, which helps strengthen communication habits and shared responsibility for secure behavior.
A modern training program should be built on a more sophisticated framework, such as the NIST Phish Scale. Instead of relying on the crude metric of “click rates,” which fails to account for the difficulty of the simulation, the NIST model evaluates phishing exercises based on a nuanced set of criteria. This allows organizations to understand why employees fall for certain attacks and to tailor training accordingly. Key factors in this model include:
.zip attachment from HR) or subtle (e.g., a legitimate-looking email with no specific signer details)?By using this more granular model, security leaders can move away from one-size-fits-all training and instead focus resources on addressing the specific vulnerabilities and cognitive biases that make their organization susceptible to attack.
Beyond formal training, the goal is to foster a pervasive culture of healthy skepticism and empowerment. This involves two key practices:
A complete defense strategy cannot be purely passive; it must include proactive measures to anticipate threats and robust reactive processes to manage incidents when they occur.
Incident Response (IR): A well-documented, comprehensive, and regularly rehearsed incident response plan is essential for minimizing the damage of a successful phishing attack. The moments after a compromise are critical, and a clear plan prevents panic and ensures a coordinated response. The plan must outline specific, actionable steps for each phase of an incident, including:
Proactive Threat Intelligence: Organizations should not wait to become a target. A mature security program incorporates proactive threat intelligence to understand the evolving landscape. By monitoring threat actor TTPs, tracking campaigns targeting their industry, and understanding emerging vulnerabilities, security teams can prioritize their defensive efforts and investments, focusing on the most relevant and probable threats rather than trying to defend against everything at once.
Proactive Defense Measures: Finally, organizations can take proactive steps to harden their external attack surface and make it more difficult for attackers to impersonate them:
The global phishing campaign that abused the infrastructure of Nifty.com is more than just another security incident; it is a clear and powerful signal of a fundamental shift in the tactics of cyber adversaries. The weaponization of trust, executed by operating from within legitimate and reputable platforms, effectively neutralizes a generation of security controls built on the assumption that “trusted” sources are “safe” sources. This evolution, powered by the professionalization of the cybercrime economy and the accessibility of advanced tools, demands an equally evolved defensive posture from every organization.
The analysis of this campaign reveals that effective defense is no longer about building a single, impenetrable digital wall. The modern threat landscape requires a holistic, resilient security ecosystem that acknowledges the certainty of attacks and is designed to withstand and recover from them. This ecosystem is built on three core pillars:
Ultimately, the challenge presented by trust-based attacks is not insurmountable. It does, however, require a departure from reactive, fear-based security models. By embracing a strategy of proactive resilience—one that dynamically synthesizes technology, people, and processes—organizations can confidently navigate the complexities of the modern threat landscape and protect their most valuable assets against the next wave of sophisticated attacks.
If you think that a poor customer support system is the biggest nuisance ever, then you need to see this!
The Traffic Distribution System (TDS) has been around for many years now. It enables digital advertisers to manage and direct website traffic with ultimate dexterity. But of late, TDS has been a type of cybersecurity threat. Cyber actors are capable of exploiting the Traffic Distribution System for malicious purposes.
An Australian woman lost a whopping $780,000 and is currently living a homeless life. All these happened just because she was searching for love online! Annette Ford, a Perth-based woman in her late 50s, has lost all her life savings. At present, she is forced to couch-surf with complete strangers in Western Australia. She is struggling hard to secure accommodation in an affordable retirement village in Australia.
Every TikTok user right now is considering themselves as God’s favorite child. The short-form video making app just survived a federal ban and resurrected just like that within a couple of hours. The app is up and running once again in the US, and users are going crazy over this ‘miraculous’ incident. As promised, Trump has put a brief pause on the federal ban.
Donut lovers, this news may be a cause of concern for you all. The US-based donut company Krispy Kreme faced a cybersecurity incident last month. The attack on one of the world’s largest donut companies is a staggering reminder that threat actors are always on the move and are getting sophisticated – one attack at a time.
Android users, do you think apps that you download from the Google Play Store are completely secure and harmless?
[sonaar_audioplayer albums=”243016, 243069, 243091, 243115, 243151, 243173, 243195, 243238, 243291, 243308, 243324, 243335, 243401, 243466, 243537, 243595, 243646, 243710, 243795, 243842″ progress_bar_style=”default” wave_bar_width=”1″ wave_bar_gap=”1″ player_layout=”skin_boxed_tracklist” show_track_market=”true”][/sonaar_audioplayer]
On November 7, Canada finally joined the bandwagon and banned ByteDance, the parent company of TikTok. The company is to wind down its operations in Canada by the end of 2024. The Canadian government cited national security concerns as the major reason behind this significant move. Authorities will be reviewing the last one-year worth of Canadian operations by TikTok.
What comes as a shock is that the TikTok app itself will continue to be accessible to Canadian users. The Canadian government wants to strike the right balance between tackling national security issues and avoiding abrupt disruption of user experience. Innovation, Science and Economic Development (ISED) believes that using a specific app should be completely a matter of ‘personal choice.’
Francois Philippe Champagne, the innovation minister, urges Canadians to embrace safe and healthy cybersecurity practices. He believes that Canadian users must be well-versed with the potential risks related to using certain apps and platforms. They must be aware of how their personal data is being used by these applications. He requests that Canadian citizens refer to cybersecurity guidance offered by the Canadian government.
Governments across multiple nations believe that TikTok is compelled to share user data and other sensitive details with the Chinese government as per the Chinese Intelligence Law. The application got the limelight back in 2020 when the pandemic restricted people within their houses. Hundreds and thousands of users started using the app actively to create short videos. The world is divided into two parts: one that creates the videos and the other half that consumes the videos.
Since 2020, TikTok has been a bone of contention for global governments, which have been facing a huge dilemma– whether to ban the app owing to security concerns or let millions of users use their favorite application for entertainment, creativity, and whatnot.
The biggest concern is that CCP or the Chinese Communist Party may spy and gather data through TikTok. Experts believe that CCP has humongous capabilities to access sensitive data through its applications and different platforms. The Chinese authorities then use the same data to analyze, evaluate, study, and leverage it for their national interests.
Trump took a significant step back in 2020 by signing executive orders, forcing ByteDance to sell out TikTok to an American company. Next, Biden banned the app on all government devices. Now that Trump has once again won the elections, more stringent actions against TikTok and similar apps are highly likely.
On similar notes, the Canadian government also banned TikTok across all government devices and settings in February 2023. Also, under the 1985 Investment Canada Act, the authorities organized a broader and stricter national security review later in 2023.
Canadian officials believe that the personal data that CCP may access through TikTok can be used illegitimately and that the same can be weaponized, which will further give rise to issues like espionage and other similar malicious purposes.
India, too, banned TikTok and similar Chinese apps back on June 29, 2020, as violence peaked between the two countries at their border. The Indian government cited security concerns and violation of Indian user data by TikTok and proceeded to ban the app completely.
A spokesperson from TikTok stated that shutting down ByteDance will result in job loss for hundreds of local employees who work with ByteDance. Also, they mentioned challenging this move in the court. TikTok has been fighting legal battles against multiple countries to fight against the restrictions and bans.
Experts believe that the ban can affect the upcoming elections in Canada. Such a ban would be challenged on the grounds of the Charter of Rights and Freedoms. To back their claim, the government will have to divulge sensitive data or share the tenuous details about national security concerns pertaining to TikTok. Both instances will prove to be quite tricky for the Canadian government.
Some people argue that the partial ban is ineffective, suggesting it should have been a full ban or not implemented at all. They believe that TikTok’s access to Canadian users still allows China to potentially access sensitive data, raising concerns about phishing protection and data security. Additionally, banning ByteDance’s corporate presence in Canada could worsen the issue, as there would be no accountable entity within Canada to address any harmful actions linked to TikTok.
Canada has introduced C-27, the legislation to combat the TikTok concern. It includes three different Acts- The Consumer Privacy Protection Act, The Electronic Documents Act, and The Artificial Intelligence and Data Act.
[sonaar_audioplayer albums=”243016, 243069, 243091, 243115, 243151, 243173, 243195, 243238, 243291, 243308, 243324, 243335, 243401, 243466, 243537, 243595, 243646, 243710″ progress_bar_style=”default” wave_bar_width=”1″ wave_bar_gap=”1″ player_layout=”skin_boxed_tracklist” show_track_market=”true”][/sonaar_audioplayer]
Are you planning to enjoy the airport lounge facility while you wait for your next flight? Pause for a second! You might end up losing your hard-earned money just like this Indian woman did at Bengaluru airport.
Are you all set to enjoy your summer holidays? Can’t wait to go out and finally enjoy your time off along a dreamy beachside? If yes, then you definitely need to see this!
Social Security Numbers are of paramount significance and help establish identity in a more proficient way. However, these Social Security Numbers are being exploited by threat actors to make quick money. The primary targets of this tax phishing and Social Security Numbers scam are self-employed filers and small business owners.
Even though businesses are bracing up for cyberattacks by embracing advanced security measures, threat actors somehow manage to stay ahead of the race by adopting smart, malicious tactics.
Ramadan, the ninth month of the Islamic calendar, is a time frame when the Muslim community practices fasting, works towards spiritual development, and organizes communal gatherings. However, Ramadan brings along an uncanny threat of increased cyber crimes.
Cybercrime instances have been increasing at an exponential rate in the past couple of decades. The expense of cybercrime is expected to go as high as $10.5 trillion by 2025!