SlideShare a Scribd company logo
1 of 6
Norton by Symantec Names Top 5
   Scams and Spams to Avoid on
                     Facebook
As social network usage climbs in the Middle East, Norton
helps users to protect themselves against top-ranking
threats

• Dubai, United Arab Emirates, June 14th 2012 - Latest research suggests
  that there are over 28 million Facebook users throughout the Middle
  East, it is checked first thing in the morning and last thing at night -
  whether browsing on your mobile, passing time at home or scanning
  through your news feed in the office. For many people and
  organizations throughout the region it has become the primary medium
  for sharing ideas and interacting with friends as well as being a key
  marketing tool and undoubtedly playing a critical role in social
  movements across the Arab world


• However, with this growing volume of traffic, 'the social network' is
  inevitably becoming a hotbed for malware authors and scammers..
"By taking advantage of the users' trust in their network of relationships,
they are spreading malicious code and sending spam messages that are
harmful to those unknowingly clicking on their friends pages," said Bulent
Teksoz, Chief Security Strategist, Emerging Markets, Symantec
"Furthermore, most of the attacks that we currently see use social
engineering tricks to spread their messages to thousands of users. Besides
reposting spam messages to friends, attacks can lead users to scam
surveys or malicious sites that can potentially cause permanent and
undoable damage."
With this in mind, Norton have compiled an infographic to help users in the
Middle East to learn scams and spams to avoid on Facebook and what they
can do to stop these hackers getting access to their friends, photos and
personal information.
1. "Like-" or "Share-Baiting"
Scammers will ask the user to Like or Share a Facebook Page to gain special
privileges or content not available from Facebook or elsewhere. After liking a
page the user will then be forwarded to a survey that asks the user for personal
information, where the author (or attacker) will then get a commission for every
view


2. "Like" Clickjacking
These malicious pages have hidden "Like" buttons - the user will see an
interesting video with a play button, but instead of the video playing, there's a
"Like" button hidden behind it. Some pages will even ask the user to click
multiple times, generating multiple "Likes" with each click.


3. Malicious Applications
The user will install a Facebook application but it will actually be malicious and
take over the users page, giving the attacker the ability to post on the users wall,
access the users message and chat with the users friends. This is one of the
oldest and most prevalent Facebook scams
4. Copy-Paste Script Attacks
The user will get the promise of an interesting video or website
but will need to copy and paste the information into the address
bar of the browser. Self-executing scam will then post spam on
the user's behalf.


5. Hoaxes
Ever see an interesting story or shocking status update?
Beware, these are generally hoaxes created to be passed
around Facebook. The goal of hoaxes is to either generate
traffic to a spam site or simply to troll other users.
Ever see an interesting story or shocking status update? Beware,
these are generally hoaxes created to be passed around Facebook.
The goal of hoaxes is to either generate traffic to a spam site or
simply to troll other users.
It's not all bad news, Norton by Symantec advises users to protect
themselves by taking a proactive approach to securing their account
and being cautious online. Users can start cleaning up their account
by simply removing g offending posts, removing offending application
and changing passwords. Users can go to
www.facebook.com/hacked to rescue their account if they believe it
has been compromised.
Norton currently provides Norton Safe Web for Facebook, a free tool
which scans current Facebook news feeds to see if they contain links
that are unsafe and provide an easy way for users to protect
themselves without forfeiting their day-to-day social media activities.
Please feel free to contact me should you wish to speak to a security
expert at Norton by Symantec.

More Related Content

What's hot

14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
Media etiquette 2021
Media etiquette 2021Media etiquette 2021
Media etiquette 2021Mark Kor
 
2011 Social Media Malware Trends
2011 Social Media Malware Trends2011 Social Media Malware Trends
2011 Social Media Malware TrendsLumension
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rulesritz482
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security offbeatnominee633
 
Social network and digital security
Social network and digital securitySocial network and digital security
Social network and digital securityMohammadBanjar
 
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...SpareBank 1 Gruppen AS
 
Facebook: The Early Days and Its Effects
Facebook: The Early Days and Its EffectsFacebook: The Early Days and Its Effects
Facebook: The Early Days and Its EffectsrkCity007
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media PrivacyLisa Turner
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetDaniel Owens
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Facebook Password Sniper
Facebook Password SniperFacebook Password Sniper
Facebook Password Sniperhellishyard9256
 

What's hot (20)

14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Security At Home
Security At HomeSecurity At Home
Security At Home
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Media etiquette 2021
Media etiquette 2021Media etiquette 2021
Media etiquette 2021
 
2011 Social Media Malware Trends
2011 Social Media Malware Trends2011 Social Media Malware Trends
2011 Social Media Malware Trends
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
Social network and digital security
Social network and digital securitySocial network and digital security
Social network and digital security
 
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
 
Facebook: The Early Days and Its Effects
Facebook: The Early Days and Its EffectsFacebook: The Early Days and Its Effects
Facebook: The Early Days and Its Effects
 
Facebook Password Sniper
Facebook Password SniperFacebook Password Sniper
Facebook Password Sniper
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Facebook Password Sniper
Facebook Password SniperFacebook Password Sniper
Facebook Password Sniper
 

Viewers also liked

Presentation glasgow
Presentation glasgowPresentation glasgow
Presentation glasgowendy1992
 
It’s all about me!
It’s all about me!It’s all about me!
It’s all about me!jadergater
 
Sheep up presentation
Sheep up presentationSheep up presentation
Sheep up presentationclaraparona
 
It’s all about me!
It’s all about me!It’s all about me!
It’s all about me!jadergater
 
Presentation london
Presentation londonPresentation london
Presentation londonendy1992
 
The Competency of the Parties to Contract
The Competency of the Parties to Contract The Competency of the Parties to Contract
The Competency of the Parties to Contract Tapish Pandey
 
3g mobilna telefonija
3g mobilna telefonija3g mobilna telefonija
3g mobilna telefonijachaslav33
 
A matter of_choice
A matter of_choiceA matter of_choice
A matter of_choicehimaabraham
 
Fi de curs sant medir
Fi de curs sant medirFi de curs sant medir
Fi de curs sant medirMarc Lopez
 
Test 5º basico diferenciado
Test 5º basico diferenciadoTest 5º basico diferenciado
Test 5º basico diferenciadoSoraya Roa Villa
 
Introduction to Micro Services
Introduction to Micro ServicesIntroduction to Micro Services
Introduction to Micro ServicesShashi Shekhar
 
HUL Fundamental & SWOT Analysis
HUL Fundamental & SWOT Analysis HUL Fundamental & SWOT Analysis
HUL Fundamental & SWOT Analysis Tapish Pandey
 
Giao trinh enzyme 7662
Giao trinh enzyme 7662Giao trinh enzyme 7662
Giao trinh enzyme 7662chuvantai Cvt
 
FR-Etude De Nutrition Clinique_Jus de Grenade _ Institut de Recherche_RAMBAM
FR-Etude De Nutrition Clinique_Jus de Grenade _ Institut de Recherche_RAMBAMFR-Etude De Nutrition Clinique_Jus de Grenade _ Institut de Recherche_RAMBAM
FR-Etude De Nutrition Clinique_Jus de Grenade _ Institut de Recherche_RAMBAMSabine FAURE SA Mlle
 

Viewers also liked (19)

Narayana murthy
Narayana murthyNarayana murthy
Narayana murthy
 
Presentation glasgow
Presentation glasgowPresentation glasgow
Presentation glasgow
 
Magrada catalogo furniture
Magrada catalogo furnitureMagrada catalogo furniture
Magrada catalogo furniture
 
It’s all about me!
It’s all about me!It’s all about me!
It’s all about me!
 
Isnapslide
IsnapslideIsnapslide
Isnapslide
 
Sheep up presentation
Sheep up presentationSheep up presentation
Sheep up presentation
 
It’s all about me!
It’s all about me!It’s all about me!
It’s all about me!
 
Presentation london
Presentation londonPresentation london
Presentation london
 
Contenidos 5to
Contenidos 5toContenidos 5to
Contenidos 5to
 
The Competency of the Parties to Contract
The Competency of the Parties to Contract The Competency of the Parties to Contract
The Competency of the Parties to Contract
 
3g mobilna telefonija
3g mobilna telefonija3g mobilna telefonija
3g mobilna telefonija
 
A matter of_choice
A matter of_choiceA matter of_choice
A matter of_choice
 
Fi de curs sant medir
Fi de curs sant medirFi de curs sant medir
Fi de curs sant medir
 
Test 5º basico diferenciado
Test 5º basico diferenciadoTest 5º basico diferenciado
Test 5º basico diferenciado
 
Introduction to Micro Services
Introduction to Micro ServicesIntroduction to Micro Services
Introduction to Micro Services
 
HUL Fundamental & SWOT Analysis
HUL Fundamental & SWOT Analysis HUL Fundamental & SWOT Analysis
HUL Fundamental & SWOT Analysis
 
Capital budgeting
Capital budgetingCapital budgeting
Capital budgeting
 
Giao trinh enzyme 7662
Giao trinh enzyme 7662Giao trinh enzyme 7662
Giao trinh enzyme 7662
 
FR-Etude De Nutrition Clinique_Jus de Grenade _ Institut de Recherche_RAMBAM
FR-Etude De Nutrition Clinique_Jus de Grenade _ Institut de Recherche_RAMBAMFR-Etude De Nutrition Clinique_Jus de Grenade _ Institut de Recherche_RAMBAM
FR-Etude De Nutrition Clinique_Jus de Grenade _ Institut de Recherche_RAMBAM
 

Similar to Top 5 Facebook Scams and Spams to Avoid

How to avoid facebook scams
How to avoid facebook scamsHow to avoid facebook scams
How to avoid facebook scamsMr.OoPpSs Group
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social NetworkingBillBrenner70
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfJeth Cuenco
 
Empowerment
EmpowermentEmpowerment
Empowermentrairuta
 
Jan 2012 Threats Trend Report
Jan 2012 Threats Trend ReportJan 2012 Threats Trend Report
Jan 2012 Threats Trend ReportCyren, Inc
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 

Similar to Top 5 Facebook Scams and Spams to Avoid (20)

How to avoid facebook scams
How to avoid facebook scamsHow to avoid facebook scams
How to avoid facebook scams
 
Security Paper
Security PaperSecurity Paper
Security Paper
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
 
Empowerment
EmpowermentEmpowerment
Empowerment
 
Jan 2012 Threats Trend Report
Jan 2012 Threats Trend ReportJan 2012 Threats Trend Report
Jan 2012 Threats Trend Report
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Top 5 Facebook Scams and Spams to Avoid

  • 1. Norton by Symantec Names Top 5 Scams and Spams to Avoid on Facebook
  • 2. As social network usage climbs in the Middle East, Norton helps users to protect themselves against top-ranking threats • Dubai, United Arab Emirates, June 14th 2012 - Latest research suggests that there are over 28 million Facebook users throughout the Middle East, it is checked first thing in the morning and last thing at night - whether browsing on your mobile, passing time at home or scanning through your news feed in the office. For many people and organizations throughout the region it has become the primary medium for sharing ideas and interacting with friends as well as being a key marketing tool and undoubtedly playing a critical role in social movements across the Arab world • However, with this growing volume of traffic, 'the social network' is inevitably becoming a hotbed for malware authors and scammers..
  • 3. "By taking advantage of the users' trust in their network of relationships, they are spreading malicious code and sending spam messages that are harmful to those unknowingly clicking on their friends pages," said Bulent Teksoz, Chief Security Strategist, Emerging Markets, Symantec "Furthermore, most of the attacks that we currently see use social engineering tricks to spread their messages to thousands of users. Besides reposting spam messages to friends, attacks can lead users to scam surveys or malicious sites that can potentially cause permanent and undoable damage." With this in mind, Norton have compiled an infographic to help users in the Middle East to learn scams and spams to avoid on Facebook and what they can do to stop these hackers getting access to their friends, photos and personal information.
  • 4. 1. "Like-" or "Share-Baiting" Scammers will ask the user to Like or Share a Facebook Page to gain special privileges or content not available from Facebook or elsewhere. After liking a page the user will then be forwarded to a survey that asks the user for personal information, where the author (or attacker) will then get a commission for every view 2. "Like" Clickjacking These malicious pages have hidden "Like" buttons - the user will see an interesting video with a play button, but instead of the video playing, there's a "Like" button hidden behind it. Some pages will even ask the user to click multiple times, generating multiple "Likes" with each click. 3. Malicious Applications The user will install a Facebook application but it will actually be malicious and take over the users page, giving the attacker the ability to post on the users wall, access the users message and chat with the users friends. This is one of the oldest and most prevalent Facebook scams
  • 5. 4. Copy-Paste Script Attacks The user will get the promise of an interesting video or website but will need to copy and paste the information into the address bar of the browser. Self-executing scam will then post spam on the user's behalf. 5. Hoaxes Ever see an interesting story or shocking status update? Beware, these are generally hoaxes created to be passed around Facebook. The goal of hoaxes is to either generate traffic to a spam site or simply to troll other users.
  • 6. Ever see an interesting story or shocking status update? Beware, these are generally hoaxes created to be passed around Facebook. The goal of hoaxes is to either generate traffic to a spam site or simply to troll other users. It's not all bad news, Norton by Symantec advises users to protect themselves by taking a proactive approach to securing their account and being cautious online. Users can start cleaning up their account by simply removing g offending posts, removing offending application and changing passwords. Users can go to www.facebook.com/hacked to rescue their account if they believe it has been compromised. Norton currently provides Norton Safe Web for Facebook, a free tool which scans current Facebook news feeds to see if they contain links that are unsafe and provide an easy way for users to protect themselves without forfeiting their day-to-day social media activities. Please feel free to contact me should you wish to speak to a security expert at Norton by Symantec.