Are spambots taking over Twitter?
Adam Levin tells us how to protect yourself on Twitter
- Duration 5:58
- Date Feb 28, 2013
Adam Levin tells us how to protect yourself on Twitter
Also in this playlist...
This transcript is automatically generated
Am bots are taking over the Twitter feed and a if you haven't noticed lately especially seeing more -- more -- -- -- is co-founder.
And chairman of identity theft 911.
And -- credit dot com at a -- -- -- an at bat.
-- -- -- Underscore Levin is his Twitter and we'll -- that -- -- year old Adam thanks for joining us thank you for inviting me.
You know this is -- -- has really become I at least amongst my friends and those of us here in the opposite talked about a recently about this hitting your Twitter feed.
For those who maybe don't.
Follow Twitter or maybe they're not paying as close of attention explained it was in layman's terms what we're talking about.
Well we're talking about is that.
That that this system is basically taken over and there are messages that are sent to you they're basically sent to all sorts of folks.
And you're not necessarily sure where they're really coming from.
And do when you the people can pay for some -- -- -- only can they be hacked.
It's essentially hackers and they're trying to get -- to click on to something that might be able to to hurt your security.
But they also can be just a.
What advertisements correct are absolutely you know that it we are becoming increasingly the target of all sorts of people.
And that the targeting is carried out through whether it's FaceBook or Twitter or.
Spam that comes to you -- your email.
And the problem is that that a lot of this stuff is is becoming much more professionally done.
And as a result sometimes it's really very difficult to determine where it's really coming from -- really coming from why it's really come to you coming to you.
And what they're looking for from you and the danger is you know you click on something you may -- to an -- may not be a real ahead.
You may click on something else it'll take you someplace else and all of a sudden you're finding yourself in an alternate universe.
You must put together a list of how you can protect yourself -- -- -- is maybe obvious from the same time it's always good to.
Have been reiterated if you will.
Most of it -- right now in fact NTELOS you know what are some ways people can very simply protect themselves.
As they as they've rousing there their Twitter feed.
Well you know again as I always tell people first of all if it's if it's something that you can't -- very very unfamiliar with stay away from -- don't click on.
Be very careful about what you reveal on line.
Just like it's very important for you to be careful do what you reveal the somebody calls you on the phone that you don't necessarily who -- know who they are.
They're masquerading as if they -- the security department of financial institution.
But in fact they're not and they're using it as a as a means of gathering information about -- ultimately make you a victim of identity theft.
And you also have to be fairly careful about tweets that come from people who you think you know.
It's just all about it if -- communicating with the -- You have to figure out what they're looking for doesn't make sense they're looking forward and does their message makes sense in the context of your relationship what.
Right you know -- as I'm looking right now at Twitter is we're talking MP -- seeing what our viewers are saying at the same time on my computer.
People history at your Smartphones miss the other issue to me so many people now.
-- my father included Gaza Smartphone he's on and on Twitter thankfully but a lot of my wife and friends are.
You don't really realize some time -- -- -- -- your Smartphone that actually the.
Access there is just the dangers of the -- on your computer in some cases it's far more dangerous because there's different kinds of information that you carry on your Smartphone oftentimes the kinds of things you want your Smartphone.
To remind you to remember.
That opens you up to -- through greater problems and the other thing is you know people look at a Smartphone and they say I was a communication device.
But if you really think about it it's way more than a communication device it's now a data storage device.
And therefore it must be treated with the same respect and the information must be protected.
With the same level of vigilance that you ward on a computer.
How would you know on your cell phone Smartphone obviously yours or your computer that you have clicked on something on Twitter that because there are so many feet -- -- really it has become just -- It's a -- service very simple purposes.
On and there are a lot of links on their way to be newspaper articles or whatever you clicking on maps pictures are so many different things that could come along music now of course.
How do you know if you put on something inappropriate how do you know because there's a meanness did potentially -- is effective security on your phone or your computer.
Well first of all there are certain kinds of security software that actually when you click on the wrong thing it starts literally screaming at you.
It's the equivalent of flashing lights and bells and everything else and it says you know virus detected.
It quarantines it right away and that's that's that's very important.
But it really brings us to the bigger issue and that is.
You almost have to embrace the concept of the inevitability of it victimization.
Is that we're living in a society now.
We're between mistakes that people make.
Too much information that people share the breaches that are occurring in business and government.
Is is creating a situation where you will at some point in your life be a victim.
Of an identity theft or multiple.
Identity theft experiences.
And that's why as best you can limit your risk of exposure.
Adopt -- monitoring culture.
And also have a damage control program in place and oftentimes it's free.
And it it it relates to your relationship with an institution that that you do business or.
An organization or association of which you are remember where they might have these services available to protect you.
And it may be free as a perk of your membership for the -- with the organization.
Right Adam -- in New York.
Co-founder and chairman of identity theft 911 and also credit dot com Adam thanks again for your time appreciate the the information nanny advisable course -- we'll keep you on.
And bring you back when we have more of these issues because as you mentioned they're coming up every day in the coming up from every angle seems like.
Thanks for joining -- thank you --