My Instagram account was cloned today.

My first thought is who would ever want to impersonate me?  I am hands-down, one of the most boring people you will ever meet.  Second thing I thought was, great.  This is my day now.

The River 97.9 logo
Get our free mobile app
A faceless man holding up his hand and it says, "You have been hacked".
Canva
loading...

Here's what I've learned:

Is There A Difference Between Hacking And Cloning?

Yes and the difference is big.   From LinkedIn:

Hacking:

When your account is hacked, the attacker can:

  • Change your password, locking you out of your own account
  • Post or share inappropriate content on your behalf
  • Send spam or malicious links to your friends
  • Access and steal your personal information

Cloning:

The purpose of a cloned profile is typically to:

  • Send friend requests to your existing friends, who may accept them, believing it's you
  • Send phishing messages or malicious links to your friends, pretending to be you
  • Attempt to gather personal information from your friends or establish trust for future scams
A post showing a fake cloned instagram account and the real instagram account that was cloned
Debbie Clapshaw//Tammie Toren//Canva
loading...

What Do You Do If Your Account Is Cloned?

From Instagram's Help Center:

Report an account that's impersonating you on Instagram

Instagram takes safety seriously. If someone created an Instagram account pretending to be you, you can report it to us.
If you have an Instagram account, you can report it to us from within the Instagram app.

What Can You Do If Your Friend's Account Is Cloned?

Report it to the app that has the cloned account.  Then, tell your friend so they can turn the account in for  impersonating as well.

As for my friends, thank you to those of you who got in touch with me this morning.  For the others, please turn in this bogus account.

12 Shrewd Email Tactics Hackers Use To Rip You Off

Computer hackers are working full-time nowadays --not only to hold major corporations hostage with ransomware -but they're also hard at work trying to gain access to private computers and personal information of unsuspecting victims. Surrendering access to these schemers could have disastrous consequences, but sometimes it can be difficult to tell what's legitimate and what's not. That's why I'm sharing 12 emails I've personally received that appear to be as bogus as a three-dollar bill.

No doubt, you have received very similar emails in your inbox and wondered if they were legit. A good rule of thumb to follow is when you receive an email from an unverified source - do not, under any circumstance click on anything in the email or download any attachments. That is exactly how hackers can gain instant access to your computer and your information.

Gallery Credit: Zane Mathews

10 Most Hacked Computer Passwords

The site Becker's Hospital Review looked at the most hacked passwords and came up with this list.

Gallery Credit: Canva

Genius New Password Hack

Gallery Credit: Clay Moden

More From The River 97.9