Born and raised in a constantly technological world, generation Z is the most familiar with the online environment, recognized for its digital fluency and influence in establishing trends. Since the first years of life, the Z members have contributed to the modeling of the digital landscape, leaving traces online long before awareness of the risks of this space.
Cyber threats evolve rapidly
However, while navigating through a hyperconeated world, full of social networks and online shopping, cyber threats evolve as quickly.
Cyber security specialists have highlighted the ways in which cyber offenders transform the online customs of GEN Z into true “appeals” and offer practical tips to turn awareness into digital resilience:
1. Excessive sharing and increasing fingerprint
For gen, to share moments in life in the online environment has become a second nature. Platforms such as Instagram, Tiktok or Snapchat are full of selfies with precise localization, daily posts and personal details. This constant exposure creates a vast digital fingerprint, which the criminals can exploit in social engineering or identity attacks.
Excessive sharing can reveal, involuntarily, sensitive information – from home addresses in the background of photos to daily routines that make predictable users. Even the seemingly harmless content – like a picture with your partner or pet – can provide useful indications for password recovery questions.
Example of phishing page promising a new iPhone 16 Pro Max
2. The fear of missing something (Fomo – Fear of Missing Out)
Fomo represents the anxiety or discomfort that occurs for fear of being excluded or not being aware of the latest trends or connections, especially if they do not follow what others do on social networks. It is a powerful motivational factor for the Z generation, constantly fueled by updates about product launches, concerts or events.
Seeing their colleagues participating in events, acquiring new products or ticking personal successes, young people can experience feelings of inadequacy or exclusion. Whether it is the launch of a new iPhone, Taylor Swift’s Eras or a major sporting event, Fomo can cause users to access unverified links that promise early access or exclusive offers.
Cyber criminals exploit this emergency state created by Fomo through ClickBait type campaigns, attracting users on malicious sites, which steal the authentication or distribute malware. False tickets for events, deceitful pre -orders and “drained” information from internal sources are just a few of the tactics used to manipulate this fear and desire for exclusivity.
3. Nostalgia of Y2K fashion and culture of 2000
For the Z generation, born around 2000 or after that period, the Y2K fashion reflects a combination of nostalgia for a simpler, pre-digital time, and the desire to reinvent those styles in a modern key. Platforms such as Tiktok and Instagram have amplified the return of the Y2K trend, through influences that recreate vintage outfits and promote used clothes. Hashtags such as #Y2KFASHION and #Y2Kaestic have gathered billions of views.
The fascination of the Z generation for the culture of the beginning of the millennium – from the Y2K aesthetics to the childhood games – has brought back retro titles such as The Sims 2, Barbie Fashion Designer or Bratz Rock Angelz. Although these games awaken nostalgia, the search for unofficial online versions often leads to malware infected sites. Cyber offenders exploit this niche interest by inserting malware in counterfeit game files. What seems a simple return to childhood can quickly turn into a compromised device or a personal data security.
A phishing scheme luring users into a trap by creating a sense of urgency with a limited discount
4. Fast fashion
The Z generation loves expressive clothes, prefers to stand out rather than comply and change its constant style – what was fashionable last month can already be “expired”. This pursuit continues after trends is supported by fast fashion retailers, which offers accessible ways to renew their wardrobe quickly. For example, the Chinese giant Shein, extremely popular among Z, adds up to 6,000 new products daily on his website.
For the Z generation, fast fashion is not just a shopping preference – it is a lifestyle. Brands such as Shein, Asos or Fashion Nova offer affordable prices and instant satisfaction, thus becoming basic elements in the wardrobe of this generation. However, this phenomenon comes in the package and with significant risks. Cyber scammers take advantage of the popularity of these brands by creating false shopping sites, cheating promotional codes or phishing advertisements, which perfectly mimic the original brands to make users enter their personal data. The more users are involved in online shopping, the more the risk that they will access fraudulent sites or fall into the net of special created schemes to steal their personal and financial information.
5. Idisorder
Generation Z is increasingly facing a phenomenon called Idisorder – a condition by which the brain ability to process information is changed due to excessive exposure to technology. This obsession for the digital environment can lead to psychological, physical and social disorders, including anxiety and depression. Public research confirms the severity of the situation: one in three young people between the ages of 18 and 24 says it has experienced symptoms associated with these mental health problems.
This is why many of them are oriented towards digital tools for emotional support – such as teleterapy platforms or psychic state monitoring applications. But these applications store extremely sensitive information, such as the emotional states of the users, the notes of the therapy sessions or the daily routine. If these platforms are compromised, the data collected can be exploited by cyber attackers for blackmail or phishing campaigns.
Cyber security specialists’ tips
To stay safe in the digital world, Kaspersky recommends generation Z to do the following:
• Think before posting: Avoid photos that can reveal your address, daily habits or other personal details.
• Do not be fooled by limited offers-always check discounts or links through official sources.
• Carefully analyze the web addresses before entering personal data-many false sites mimic known brands.
• Use safe online payment methods and avoid offers “too good to be true”.
• In the case of applications for mental health, choose services with strict privacy policies and avoids information overexposure.
• Pay attention to file extensions – games or video clips should not come in .Exe or .MSI format.
• Install reliable security solutions for detecting and blocking the dangerous content.
• Ensure your privacy and protect your IP, for safer online browsing and communication.