Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

Revealed: The online criminal gangs stealing social media snaps to raid your home

Chief Inspector Scott Tees of Police Scotland talks about mobile phone security
Chief Inspector Scott Tees of Police Scotland talks about mobile phone security

CRIMINAL gangs are stealing social media holiday pictures so that housebreakers can strike when family homes are empty.

A Sunday Post investigation found sensitive personal information – including home addresses, credit card numbers and social media details – flowing freely on the so-called dark web, a secretive area of the Internet where people hide behind false identities to buy and sell goods.

Now a top police officer has warned that details gleaned from Facebook, Instagram and Twitter end up in the hands of burglars, with mobile phones particularly susceptible to cyber hacking.

Senior figures at Police Scotland say cell phones are vulnerable because most people are not as security-conscious about their handheld devices as they are about computers.

This is despite the fact that many mobiles are every bit as powerful as laptops – and contain a mine of information about their owners.

Cyber criminals, most of whom are based overseas, use sophisticated scams, such as cloning public Wi-Fi networks, and rogue “apps” that give people access to free music, to harvest people’s personal details.

They then sell the information on to the highest bidder – or in some cases just “dump” the details online – and it will then become available to offenders.

Other scams involve identity theft, fake bank accounts being opened in victims’ names, and credit card details being stolen.

But one of the simplest ways for crooks to profit is to exploit the increasingly popular trend of publishing holiday pictures online.

People might only intend to share their images with friends and family via social media accounts, but failing to set a secure password leaves their mobile phones vulnerable to attack while they are on vacation.

Even allowing social media sites to reveal your location when you post a message – for example, from a shopping trip to a big city – can let crooks know you are enjoying time away from home.

Official statistics show that, although numbers have fallen in recent years, 48 housebreakings happened every day last year.

The Sunday Post has previously revealed that only one in four domestic break-ins is ever solved.

Chief Inspector Scott Tees, of Police Scotland, said: “If you post on your phone: ‘That’s me at the airport away for two weeks’ holiday,’ you’re telling your friends and family that you are away but you’re also telling a potential criminal that’s your house sitting empty for two weeks.

“People are living their lives online but what they have got to think about is what they are actually posting online.”

Chief Inspector Tees said it was important to remember a simple mantra passed down the ages: if it’s too good to be true, then it probably is. In other words, be suspicious.

People are asked to treat online offenders with the same suspicion they would show if someone stopped them in the street offering them a bag of free CDs.

Neighbourhood Watch manager Brian Connel said: “Social media created a revolution in connecting people.

“Here at Neighbourhood Watch Scotland we recognise its value in sharing issues, solutions and successes.

“However, participating in online social networking sites can leave a trail of personal information that criminals can use against you. It’s a bit like sharing a jigsaw puzzle of your identity.

“An individual post or message might seem innocent and safe but when joined up with other pieces it can paint a rich picture of who you are, where you are and what you are doing.”