{"id":10743,"date":"2016-01-07T09:00:00","date_gmt":"2016-01-07T14:00:00","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=10743"},"modified":"2020-12-14T19:47:22","modified_gmt":"2020-12-14T17:47:22","slug":"vk-privacy","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/vk-privacy\/10743\/","title":{"rendered":"Setting up your VK.com privacy settings"},"content":{"rendered":"<p><em> As part of our series looking at privacy, we will take a look at VKontakte (aka VK.com) a Russian social network to showcase how they look at privacy in comparison to Google and Facebook.<\/em><\/p>\n<p>Social networks are a desirable piece of cake for fraudsters and weirdos of all kinds and vk.com is no exception. Criminals come up with many creative ways to steal user\u2019s login credentials: from common hacks and <a href=\"https:\/\/www.kaspersky.co.za\/blog\/phishing-ten-tips\/10550\/\" target=\"_blank\" rel=\"noopener noreferrer\">phishing<\/a> to such exotic methods as setting on <a href=\"https:\/\/www.kaspersky.co.za\/blog\/smart-wifi-vkontakte-credentials\/8279\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wi-Fi hotspots<\/a> which collect your social network login data in exchange for \u2018free\u2019 Internet.<\/p>\n<p>Of course, one can try to restore a compromised account, block spam and ignore suspicious requests from friends who seem to have been hacked. However, sometimes <a href=\"https:\/\/www.kaspersky.co.za\/blog\/skype-fraud-story\/8043\/\" target=\"_blank\" rel=\"noopener noreferrer\">it\u2019s not as easy as it seems<\/a>.<\/p>\n<p>The best way to secure yourself from cybercriminals is to set up the privacy of your account. It\u2019s not that hard, because the VK interface is very user-friendly. Besides, with this post we are going to clear out what you should pay attention to.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Fraudsters hacked <a href=\"https:\/\/twitter.com\/hashtag\/Skype?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Skype<\/a> and tricked victim\u2019s friends to send them about $5000: <a href=\"https:\/\/t.co\/lv9nlyGvVg\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/lv9nlyGvVg<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/580457900579123200?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 24, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>1. Let\u2019s start with your <strong>list of friends<\/strong>. If you have a lot of them \u2014 more than a hundred \u2014 you\u2019d better subdivide them into several categories. This would help you and your friends set up what kind of content can be seen by every particular person. It\u2019s a good idea to make a separate list for all artists, fitness coaches, Internet shops and other commercial accounts. SMM managers of these types of pages don\u2019t need to browse through the <a href=\"https:\/\/www.kaspersky.co.za\/blog\/vtech-toys-hacked\/10697\/\" target=\"_blank\" rel=\"noopener noreferrer\">photos of your children<\/a>, do they?<\/p>\n<p>2. Open the <strong>My settings \u2013&gt; Privacy tab<\/strong>. Here you can choose, which content will be hidden from the public view (basically, you can hide anything, from posts and photos to groups and notes). Pay attention to the <strong>Certain lists of friends<\/strong> setting, which is available in the drop-down window. Now you see, why we\u2019ve asked you to make a separate category for all commercial accounts!<\/p>\n<p>The thing is that the owners of these pages are usually the first to send spam and invite users to join different groups. They promote goods via you friend list and thereby bother your real friends! It\u2019s much better to restrict access to your friends list for all people in your commercial list.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">A SMS <a href=\"https:\/\/twitter.com\/hashtag\/Trojan?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Trojan<\/a> Bypasses <a href=\"https:\/\/twitter.com\/hashtag\/CAPTCHA?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#CAPTCHA<\/a> and Steals Money: <a href=\"https:\/\/t.co\/9fjQ0PwZuw\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/9fjQ0PwZuw<\/a> <a href=\"http:\/\/t.co\/r5jKqQUc3y\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/r5jKqQUc3y<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/578254848203837440?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 18, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>3. When you upload photos to VK, you can tag where the shot has been taken. Using these tags the social network makes a <strong>map of your travels<\/strong>. We recommend you to restrict access to said map. Otherwise it can be used, for example, by burglars who track when people are away from home. They often monitor social networks and geolocation tags to choose the best time to break into a house.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2015\/12\/06023537\/privacy.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-10748\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2015\/12\/06023537\/privacy.jpg\" alt=\"Setting up your VK.com privacy settings\" width=\"790\" height=\"655\"><\/a><\/p>\n<p>4. With the help of a special link, which can be found below the Privacy tab, you can check <strong>how other people see your profile<\/strong>. If you follow this link, another option will be available: to check <strong>how a particular person sees your page<\/strong>. For this you\u2019ll need to enter a friend\u2019s name or a link to a user\u2019s profile. Have a look \u2013 it\u2019s very interesting.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2015\/12\/06023539\/profile_appearance.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-10747\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2015\/12\/06023539\/profile_appearance.jpg\" alt=\"Setting up your VK.com privacy settings\" width=\"625\" height=\"162\"><\/a><\/p>\n<p>5. Your profile photo is always public. The only way to hide it from a certain user is to ban them completely. You can do it in the blocklist tab.<\/p>\n<p>https:\/\/twitter.com\/security_inci\/status\/586560120668160000<\/p>\n<p>6. When you decline someone\u2019s friend request, this person becomes your follower \u2013 he\/she is still able to see all of your public updates. The same is true for former friends. So if you want to break a link with somebody fully and completely, don\u2019t just unfriend them but also add them to the blocklist.<\/p>\n<p>7. Look through the settings given in the \u201c<strong>Security<\/strong>\u201d tab. Be sure to turn on two-step authentication. This measure will highly improve security of your profile.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2015\/12\/06023528\/security-2.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2015\/12\/06023528\/security-2.jpg\" alt=\"Setting up your VK.com privacy settings\" width=\"793\" height=\"422\" class=\"aligncenter size-full wp-image-10771\"><\/a><\/p>\n<p>8. VK tracks time, locations and devices from which your profile has been recently accessed. If you\u2019ve used the social network in an Internet cafe, from your friend\u2019s PC or if you\u2019ve lost a phone with an active VK app, you should use the \u201c<strong>Terminate all sessions<\/strong>\u201d button. This measure will not let strangers to look through your messages or steal your account completely.<\/p>\n<p>9. VKontakte users can turn <strong>secure connection protocol<\/strong> on, though in an unusual manner. You can find this setting in the Security tab, but it will be hidden until you open the site using secure connection. For that you need to add \u201chttps:\/\/\u201d prefix in the beginning of the VK address and press Enter. Alternatively, you can follow this link: <a href=\"https:\/\/vk.com\/settings?act=security\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/vk.com\/settings?act=security<\/a><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2015\/12\/06023527\/https-security-2-en.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2015\/12\/06023527\/https-security-2-en.jpg\" alt=\"Setting up your VK.com privacy settings\" width=\"958\" height=\"544\" class=\"aligncenter size-full wp-image-10772\"><\/a><\/p>\n<p>After that you\u2019ll see the Encryption settings. Now you can check the \u201cAlways use a secure connection (HTTPS)\u201d option and save changes.<\/p>\n<p>We highly recommend you turn this setting on, especially if you often use free Wi-Fi in cafes, hotels and on the streets.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Setting up VK.com privacy settings. #security #privacy #VK<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FaM1U&amp;text=Setting+up+VK.com+privacy+settings.+%23security+%23privacy+%23VK\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Be vigilant and don\u2019t forget about privacy settings. Remember: by setting up security of your account you protect both yourself and the whole contact list of yours as well.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let\u2019s find out how to enhance privacy and security of your VK account<\/p>\n","protected":false},"author":522,"featured_media":10744,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,9],"tags":[1852,363,43,97,98,1333,689],"class_list":{"0":"post-10743","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-tips","9":"tag-advice","10":"tag-personal-data","11":"tag-privacy","12":"tag-security-2","13":"tag-social-networks","14":"tag-vk-com","15":"tag-vkontakte"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/vk-privacy\/10743\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/vk-privacy\/6505\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/vk-privacy\/6580\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/vk-privacy\/6511\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/vk-privacy\/7471\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/vk-privacy\/7259\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/vk-privacy\/10743\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/vk-privacy\/6699\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/vk-privacy\/10743\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/advice\/","name":"#advice"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/10743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=10743"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/10743\/revisions"}],"predecessor-version":[{"id":28377,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/10743\/revisions\/28377"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/10744"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=10743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=10743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=10743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}