SlideShare a Scribd company logo
1 of 2
Download to read offline
How to avoid common social network frauds
Since the last blogs posted about multiple social networks frauds, I‟ve been getting multiple questions
so I‟ve decided to publish the common fraud attack methods and how to recognize and avoid them.
The social networks are very fertile ground for cybercriminals, and sometimes it is difficult to
distinguish between true stories and those who spread viruses or other scams. Here are some common
scams you should avoid on the social networks:
1.

"One fact"

The format of Twitter, which is only a short text message, subjected to attacks when used in
scandalous headlines to lure unwary users that share them without reading or checking if they are
correct.
An example is the hacked Twitter account of celeb news channel „E!‟ earlier this year, a series of false
tweets began with news coming out about Justin Bieber allegedly being gay, who shared 1,200 times
within a few hours. It would be much safer to verify the news with other sources than to click on links
attached to such news.
2.

“News from around the world”

You should start to suspect if a news story appears on the social network only once. Global scale news
using rapidly spreading, with stories and angles distributed by friends and different sources. Hackers
often use scandalous or outrageous headlines to get readers to click on the link to spread viruses and
malware on Twitter and Facebook. If you see such titles, you can check them on other sites or Google
them before clicking the provided links.
3.

“Stories begging you to „Like‟ them”

Have you ever pressed „Like‟ on a post that offers something for free? Or to help someone get a million
Likes so their parents buy them a dog/cat/send them on a trip around the world?
All such request should encourage you to „Like‟ suspicion. Many scams on the social network are
distributed to collect your „Likes‟ then sell them to other companies, which in turn start spreading you
and your friends adverts. If you suspect you have done something like that and now regret it, you can
always remove it using the Activity Log from your profile.
4.

“Amazing stories about diets”

The phenomenon of obesity is so prevalent that it has received the nickname "the epidemic of the 21st
century", which means that many people will look for information about obesity and ways to get rid of
it.
One of the biggest attacks focused on this issue was distributed via Instagram last July using a picture
of tropical fruit. Clicking on the image transferred users to a fake BBC site with the title "tropical fruit

Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com

Page 1
to drop you 8 pounds in 22 days”. Of course, that issue was a scam and clicking on the link caused
Instagram accounts to distribute the spam to other unsuspecting friends and followers.
5.

“News sites you never heard of”

At the height of the hysteria surrounding the royal baby's birth of Prince William and his wife Kate
Middleton, the rate of related Tweets was around 23,500 Tweets per minute. Network criminals could
not ignore the situation and sent their own tweets with links to news sites pose with promises you will
not of course find anywhere else. Needless to say that the links lead to sites that in turn spread viruses
and other malicious software and did not provide any news about the royal birth.
6.

“Gift Cards”

Gift cards can be quite tempting, especially when they are shipped to you from a friend.
Unfortunately, most of them are frauds. "Gift cards" that offer you all kinds of free products are usually
scams and recently observed on photo-sharing social networks like Pinterest, when one of the steps for
getting the “gifts” was that the surfer prompted to share the post with friends. Needless to say that
the “gifts” do not exist at all and eventually you will find yourself revealing personal information, or
worse install a virus on your computer.

About TotalDefense:
Total Defense(@Total_Defense) is a global leader in malware detection and anti-crimeware solutions.
We offer a broad portfolio of leading security products for the consumer market used by over four
million consumers worldwide. Our solutions also include the industry‟s first complete cloud security
platform, providing fully integrated endpoint, web and email security through a single Web-based
management console with a single set of enforceable security policies
Total Defense is a former business of CA Technologies, one of the largest software companies in the
world, and has operations in New York, California, Europe, Israel and Asia.
Visit http://www.totaldefense.com/ for web, cloud & mobile security solutions for home users and
businesses.

Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com

Page 2

More Related Content

Viewers also liked

Aporte a la actividad 3, filosofiaetica
Aporte a la actividad 3, filosofiaeticaAporte a la actividad 3, filosofiaetica
Aporte a la actividad 3, filosofiaeticapsicomariaunad
 
Gráfico diario del ibex 35 para el 28 01 2014
Gráfico diario del ibex 35 para el 28 01 2014Gráfico diario del ibex 35 para el 28 01 2014
Gráfico diario del ibex 35 para el 28 01 2014Experiencia Trading
 
اوراق ملونه
اوراق ملونهاوراق ملونه
اوراق ملونهHuda Ahmad
 
Proyecto informatica penal1
Proyecto informatica penal1Proyecto informatica penal1
Proyecto informatica penal1siemprefm
 
Mikrospendenkampagne: Mit einem Euro ein Stipendium ermöglichen
Mikrospendenkampagne: Mit einem Euro ein Stipendium ermöglichenMikrospendenkampagne: Mit einem Euro ein Stipendium ermöglichen
Mikrospendenkampagne: Mit einem Euro ein Stipendium ermöglichenprophildresden
 
Jose Eduardo Martinez Ruedas
Jose Eduardo Martinez RuedasJose Eduardo Martinez Ruedas
Jose Eduardo Martinez Ruedasjosemartinez-17
 
Informe 494 postulantes relatores del stj
Informe 494 postulantes relatores del stj Informe 494 postulantes relatores del stj
Informe 494 postulantes relatores del stj siemprefm
 
Horario v ciclo
Horario v cicloHorario v ciclo
Horario v cicloLOCUER21
 
Praktikum 1 sri muliyani
Praktikum 1 sri muliyaniPraktikum 1 sri muliyani
Praktikum 1 sri muliyaniSri Muliyani
 

Viewers also liked (10)

Aporte a la actividad 3, filosofiaetica
Aporte a la actividad 3, filosofiaeticaAporte a la actividad 3, filosofiaetica
Aporte a la actividad 3, filosofiaetica
 
Gráfico diario del ibex 35 para el 28 01 2014
Gráfico diario del ibex 35 para el 28 01 2014Gráfico diario del ibex 35 para el 28 01 2014
Gráfico diario del ibex 35 para el 28 01 2014
 
اوراق ملونه
اوراق ملونهاوراق ملونه
اوراق ملونه
 
Proyecto informatica penal1
Proyecto informatica penal1Proyecto informatica penal1
Proyecto informatica penal1
 
Mikrospendenkampagne: Mit einem Euro ein Stipendium ermöglichen
Mikrospendenkampagne: Mit einem Euro ein Stipendium ermöglichenMikrospendenkampagne: Mit einem Euro ein Stipendium ermöglichen
Mikrospendenkampagne: Mit einem Euro ein Stipendium ermöglichen
 
Jose Eduardo Martinez Ruedas
Jose Eduardo Martinez RuedasJose Eduardo Martinez Ruedas
Jose Eduardo Martinez Ruedas
 
Informe 494 postulantes relatores del stj
Informe 494 postulantes relatores del stj Informe 494 postulantes relatores del stj
Informe 494 postulantes relatores del stj
 
Mono Codebits
Mono CodebitsMono Codebits
Mono Codebits
 
Horario v ciclo
Horario v cicloHorario v ciclo
Horario v ciclo
 
Praktikum 1 sri muliyani
Praktikum 1 sri muliyaniPraktikum 1 sri muliyani
Praktikum 1 sri muliyani
 

Recently uploaded

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 

How to avoid common social network frauds – TotalDefense Blog

  • 1. How to avoid common social network frauds Since the last blogs posted about multiple social networks frauds, I‟ve been getting multiple questions so I‟ve decided to publish the common fraud attack methods and how to recognize and avoid them. The social networks are very fertile ground for cybercriminals, and sometimes it is difficult to distinguish between true stories and those who spread viruses or other scams. Here are some common scams you should avoid on the social networks: 1. "One fact" The format of Twitter, which is only a short text message, subjected to attacks when used in scandalous headlines to lure unwary users that share them without reading or checking if they are correct. An example is the hacked Twitter account of celeb news channel „E!‟ earlier this year, a series of false tweets began with news coming out about Justin Bieber allegedly being gay, who shared 1,200 times within a few hours. It would be much safer to verify the news with other sources than to click on links attached to such news. 2. “News from around the world” You should start to suspect if a news story appears on the social network only once. Global scale news using rapidly spreading, with stories and angles distributed by friends and different sources. Hackers often use scandalous or outrageous headlines to get readers to click on the link to spread viruses and malware on Twitter and Facebook. If you see such titles, you can check them on other sites or Google them before clicking the provided links. 3. “Stories begging you to „Like‟ them” Have you ever pressed „Like‟ on a post that offers something for free? Or to help someone get a million Likes so their parents buy them a dog/cat/send them on a trip around the world? All such request should encourage you to „Like‟ suspicion. Many scams on the social network are distributed to collect your „Likes‟ then sell them to other companies, which in turn start spreading you and your friends adverts. If you suspect you have done something like that and now regret it, you can always remove it using the Activity Log from your profile. 4. “Amazing stories about diets” The phenomenon of obesity is so prevalent that it has received the nickname "the epidemic of the 21st century", which means that many people will look for information about obesity and ways to get rid of it. One of the biggest attacks focused on this issue was distributed via Instagram last July using a picture of tropical fruit. Clicking on the image transferred users to a fake BBC site with the title "tropical fruit Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com Page 1
  • 2. to drop you 8 pounds in 22 days”. Of course, that issue was a scam and clicking on the link caused Instagram accounts to distribute the spam to other unsuspecting friends and followers. 5. “News sites you never heard of” At the height of the hysteria surrounding the royal baby's birth of Prince William and his wife Kate Middleton, the rate of related Tweets was around 23,500 Tweets per minute. Network criminals could not ignore the situation and sent their own tweets with links to news sites pose with promises you will not of course find anywhere else. Needless to say that the links lead to sites that in turn spread viruses and other malicious software and did not provide any news about the royal birth. 6. “Gift Cards” Gift cards can be quite tempting, especially when they are shipped to you from a friend. Unfortunately, most of them are frauds. "Gift cards" that offer you all kinds of free products are usually scams and recently observed on photo-sharing social networks like Pinterest, when one of the steps for getting the “gifts” was that the surfer prompted to share the post with friends. Needless to say that the “gifts” do not exist at all and eventually you will find yourself revealing personal information, or worse install a virus on your computer. About TotalDefense: Total Defense(@Total_Defense) is a global leader in malware detection and anti-crimeware solutions. We offer a broad portfolio of leading security products for the consumer market used by over four million consumers worldwide. Our solutions also include the industry‟s first complete cloud security platform, providing fully integrated endpoint, web and email security through a single Web-based management console with a single set of enforceable security policies Total Defense is a former business of CA Technologies, one of the largest software companies in the world, and has operations in New York, California, Europe, Israel and Asia. Visit http://www.totaldefense.com/ for web, cloud & mobile security solutions for home users and businesses. Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com Page 2