Criminals feed off the personal information that people share on digital platforms to carry out their fraudulent maneuvers.
Social networks have changed the way people interact, share their lives and connect. However, they have also brought with them a series of risks associated with online security, where cybercriminals exploit users’ personal information to carry out scams, fraud and other criminal acts.
One of the most recommended practices to protect your privacy in these digital spaces is to avoid using your real name. Criminals feed on the personal information that people share on digital platforms to carry out their fraudulent maneuvers.
Accessing private data is one of the main objectives of these individuals, who use it to impersonate identities or manipulate bank accounts, among other things. A person’s real name is a crucial piece of information which, combined with other personal details, can be used to carry out phishing scams, identity theft and financial fraud.
According to an article from McGill University in Montreal, more and more cybercriminals are continuously monitoring social networks in search of potential victims. If a user shares information such as dates and locations, they would be jeopardizing the safety of their home and their loved ones, as they would not only be attracting thieves, but also making their task easier.
But how does this fraud work?
If a criminal manages to obtain a user’s full name, they could begin the process of “reconstructing” their digital life. This could involve searching for other online profiles, locating friends or family and, with a little social engineering, obtaining even more valuable information. In this way, fraudsters manage to gain the trust of their victims and then steal money or confidential information from them.
In addition, the use of real names on social networks increases the risk of falling for direct scams, such as those that pretend to be from legitimate banks, institutions or companies. Scammers can create fake profiles that appear to be from a legitimate service and, using the person’s full name, send direct messages to try to obtain additional information.
The fact that a criminal has access to the victim’s full name increases the credibility of their message, making the victim more likely to fall for the scam. An example of this is phishing, where a cybercriminal poses as a trusted entity and requests data such as passwords or bank card numbers.
If the person’s name is on a public profile, criminals have an easier way to personalize these attacks, making them even more convincing. In fact, a recent study showed that phishing attacks have a much higher success rate when the victim’s real name is used in emails or text messages.
To protect themselves, users should create a name that is not related to their real identity. Using a pseudonym or a combination of words that do not reveal personal details can be an effective measure to safeguard their privacy. In addition, social networks offer privacy settings that allow you to control who can see your information. It is important to take advantage of these options to restrict access to your posts to friends or trusted individuals only.