From Phomo to Fast Fashion: How to attack Cyber ​​Crime Generation Z? – Internet

Generation Z has redefined digital landscape. Born and created in a fast -growing technological world, it is a generation with more knowledge of the Internet, so far They leave “online footprints” long before they fully understand their losses.

For example, for generation z, Sharing the moments of online life became part of its natureSocial networks are full of geographical marking, daily updates and personal stories. Excessive sharing accidentally reveals sensitive details, which makes your habits Able.

For cybercrimals, this stable partnership creates a digital footprint that is useful for exploring identity theft or social engineering attacksHighlight Kaspersky researchers.

Oh Poam . This is the launch of a new iPhone from Taylor Swift Eras Tour or Large Sports Program, The Poam It leads users to click on suspicious links that promise to promote initial access to specific events or offers.

Kaspersky | How to attack Cyber ​​Crimeans Generation Z?

Example to the fake Fijing page of the New iPhone 16 Pro Max

Kriditos: Caspersky

“Data-Title =” Kaspersky | How to attack Cyber ​​Crimeans Generation Z? – From Phomo to Fast Fashion: How to attack Cyber ​​Crime Generation Z? – tek sapo “> Kaspersky | How to attack Cyber ​​Crimeans Generation Z?

Kaspersky | How to attack Cyber ​​Crimeans Generation Z? Example to the fake Fijing page of the New iPhone 16 Pro Max Kriditos: Caspersky

Cybercrimals explore this necessity through fishing and clickbite schemes, leading users to harmful websites that steal login credentials and infect equipment with malware. False event tickets, product pre-registration schemes and “exposed” special information are some strategies used to convert users through this fear.

From the beginning of the 2000s to the fascination of the Generation Z, from the Y2K beauty to the child’s games, rRetro escaped from interest on heading Sims 2, like Barbie Fashion Designer and Bratz Rock Angelz. Although these games are triggered by nostalgia, Search for free informal versions leads users to malware websites. Cybercrimals are targeting this interest and adding harmful software to fake gaming files.

Generation Z prefers expression outfits and follows the latest trends, With fast fashion retailers like Sheen to provide access means to change “look”. However, fraudulent shopping sites, fake promotional codes and fishing advertisements take advantage of the popularity of these brands, with reliable imitations to drive customers to share sensitive data.

Kaspersky | How to attack Cyber ​​Crimeans Generation Z?

Fishing Scheme that mimics the fast fashion platform and attract users with a discount up to limited time

Kriditos: Caspersky

“Data-Title =” Kaspersky | How to attack Cyber ​​Crimeans Generation Z? – From Phomo to Fast Fashion: How to attack Cyber ​​Crime Generation Z? – tek sapo “> Kaspersky | How to attack Cyber ​​Crimeans Generation Z?

Kaspersky | How to attack Cyber ​​Crimeans Generation Z? Fishing Scheme that mimics the fast fashion platform and attract users with a discount up to limited time Kriditos: Caspersky

Lead to a phenomenon as a result of the siege of the technical generation ”idisorder ”. It cLeave Here’s the ability of the brain to process information changes as it is highly exposed to technologyAs a result of mental, physical and social disturbances.

Young and more young people resort to digital tools, including teletype platforms and mental health trackers to deal with disappointment and anxiety. However, these platforms store the most sensitive personal information, including emotional conditions, treatment notes and consumer daily. If cybercrimans are attacked, data can be explored for blackmail or fishing.

“The trends grow rapidly, but the underlying cyberers are stable,” said Kaspersky’s privacy expert Anna Larkina.

“Whether it is utilizing the Generation Z’s passion for online shopping, investing the necessity created by Phomo or visiting the rising use of mental health applications, Attackers will be able to turn popular behaviors into fishing opportunities, database and data violations”, Highlights.

Source link

Related Articles

Back to top button