SlideShare a Scribd company logo
1 of 2
Download to read offline
How to avoid common social network frauds
Since the last blogs posted about multiple social networks frauds, I‟ve been getting multiple questions
so I‟ve decided to publish the common fraud attack methods and how to recognize and avoid them.
The social networks are very fertile ground for cybercriminals, and sometimes it is difficult to
distinguish between true stories and those who spread viruses or other scams. Here are some common
scams you should avoid on the social networks:
1.

"One fact"

The format of Twitter, which is only a short text message, subjected to attacks when used in
scandalous headlines to lure unwary users that share them without reading or checking if they are
correct.
An example is the hacked Twitter account of celeb news channel „E!‟ earlier this year, a series of false
tweets began with news coming out about Justin Bieber allegedly being gay, who shared 1,200 times
within a few hours. It would be much safer to verify the news with other sources than to click on links
attached to such news.
2.

“News from around the world”

You should start to suspect if a news story appears on the social network only once. Global scale news
using rapidly spreading, with stories and angles distributed by friends and different sources. Hackers
often use scandalous or outrageous headlines to get readers to click on the link to spread viruses and
malware on Twitter and Facebook. If you see such titles, you can check them on other sites or Google
them before clicking the provided links.
3.

“Stories begging you to „Like‟ them”

Have you ever pressed „Like‟ on a post that offers something for free? Or to help someone get a million
Likes so their parents buy them a dog/cat/send them on a trip around the world?
All such request should encourage you to „Like‟ suspicion. Many scams on the social network are
distributed to collect your „Likes‟ then sell them to other companies, which in turn start spreading you
and your friends adverts. If you suspect you have done something like that and now regret it, you can
always remove it using the Activity Log from your profile.
4.

“Amazing stories about diets”

The phenomenon of obesity is so prevalent that it has received the nickname "the epidemic of the 21st
century", which means that many people will look for information about obesity and ways to get rid of
it.
One of the biggest attacks focused on this issue was distributed via Instagram last July using a picture
of tropical fruit. Clicking on the image transferred users to a fake BBC site with the title "tropical fruit

Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com

Page 1
to drop you 8 pounds in 22 days”. Of course, that issue was a scam and clicking on the link caused
Instagram accounts to distribute the spam to other unsuspecting friends and followers.
5.

“News sites you never heard of”

At the height of the hysteria surrounding the royal baby's birth of Prince William and his wife Kate
Middleton, the rate of related Tweets was around 23,500 Tweets per minute. Network criminals could
not ignore the situation and sent their own tweets with links to news sites pose with promises you will
not of course find anywhere else. Needless to say that the links lead to sites that in turn spread viruses
and other malicious software and did not provide any news about the royal birth.
6.

“Gift Cards”

Gift cards can be quite tempting, especially when they are shipped to you from a friend.
Unfortunately, most of them are frauds. "Gift cards" that offer you all kinds of free products are usually
scams and recently observed on photo-sharing social networks like Pinterest, when one of the steps for
getting the “gifts” was that the surfer prompted to share the post with friends. Needless to say that
the “gifts” do not exist at all and eventually you will find yourself revealing personal information, or
worse install a virus on your computer.

About TotalDefense:
Total Defense(@Total_Defense) is a global leader in malware detection and anti-crimeware solutions.
We offer a broad portfolio of leading security products for the consumer market used by over four
million consumers worldwide. Our solutions also include the industry‟s first complete cloud security
platform, providing fully integrated endpoint, web and email security through a single Web-based
management console with a single set of enforceable security policies
Total Defense is a former business of CA Technologies, one of the largest software companies in the
world, and has operations in New York, California, Europe, Israel and Asia.
Visit http://www.totaldefense.com/ for web, cloud & mobile security solutions for home users and
businesses.

Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com

Page 2

More Related Content

Viewers also liked

Aporte a la actividad 3, filosofiaetica
Aporte a la actividad 3, filosofiaeticaAporte a la actividad 3, filosofiaetica
Aporte a la actividad 3, filosofiaeticapsicomariaunad
 
Gráfico diario del ibex 35 para el 28 01 2014
Gráfico diario del ibex 35 para el 28 01 2014Gráfico diario del ibex 35 para el 28 01 2014
Gráfico diario del ibex 35 para el 28 01 2014Experiencia Trading
 
اوراق ملونه
اوراق ملونهاوراق ملونه
اوراق ملونهHuda Ahmad
 
Proyecto informatica penal1
Proyecto informatica penal1Proyecto informatica penal1
Proyecto informatica penal1siemprefm
 
Mikrospendenkampagne: Mit einem Euro ein Stipendium ermöglichen
Mikrospendenkampagne: Mit einem Euro ein Stipendium ermöglichenMikrospendenkampagne: Mit einem Euro ein Stipendium ermöglichen
Mikrospendenkampagne: Mit einem Euro ein Stipendium ermöglichenprophildresden
 
Jose Eduardo Martinez Ruedas
Jose Eduardo Martinez RuedasJose Eduardo Martinez Ruedas
Jose Eduardo Martinez Ruedasjosemartinez-17
 
Informe 494 postulantes relatores del stj
Informe 494 postulantes relatores del stj Informe 494 postulantes relatores del stj
Informe 494 postulantes relatores del stj siemprefm
 
Horario v ciclo
Horario v cicloHorario v ciclo
Horario v cicloLOCUER21
 
Praktikum 1 sri muliyani
Praktikum 1 sri muliyaniPraktikum 1 sri muliyani
Praktikum 1 sri muliyaniSri Muliyani
 

Viewers also liked (10)

Aporte a la actividad 3, filosofiaetica
Aporte a la actividad 3, filosofiaeticaAporte a la actividad 3, filosofiaetica
Aporte a la actividad 3, filosofiaetica
 
Gráfico diario del ibex 35 para el 28 01 2014
Gráfico diario del ibex 35 para el 28 01 2014Gráfico diario del ibex 35 para el 28 01 2014
Gráfico diario del ibex 35 para el 28 01 2014
 
اوراق ملونه
اوراق ملونهاوراق ملونه
اوراق ملونه
 
Proyecto informatica penal1
Proyecto informatica penal1Proyecto informatica penal1
Proyecto informatica penal1
 
Mikrospendenkampagne: Mit einem Euro ein Stipendium ermöglichen
Mikrospendenkampagne: Mit einem Euro ein Stipendium ermöglichenMikrospendenkampagne: Mit einem Euro ein Stipendium ermöglichen
Mikrospendenkampagne: Mit einem Euro ein Stipendium ermöglichen
 
Jose Eduardo Martinez Ruedas
Jose Eduardo Martinez RuedasJose Eduardo Martinez Ruedas
Jose Eduardo Martinez Ruedas
 
Informe 494 postulantes relatores del stj
Informe 494 postulantes relatores del stj Informe 494 postulantes relatores del stj
Informe 494 postulantes relatores del stj
 
Mono Codebits
Mono CodebitsMono Codebits
Mono Codebits
 
Horario v ciclo
Horario v cicloHorario v ciclo
Horario v ciclo
 
Praktikum 1 sri muliyani
Praktikum 1 sri muliyaniPraktikum 1 sri muliyani
Praktikum 1 sri muliyani
 

Recently uploaded

Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 

Recently uploaded (20)

Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 

How to avoid common social network frauds – TotalDefense Blog

  • 1. How to avoid common social network frauds Since the last blogs posted about multiple social networks frauds, I‟ve been getting multiple questions so I‟ve decided to publish the common fraud attack methods and how to recognize and avoid them. The social networks are very fertile ground for cybercriminals, and sometimes it is difficult to distinguish between true stories and those who spread viruses or other scams. Here are some common scams you should avoid on the social networks: 1. "One fact" The format of Twitter, which is only a short text message, subjected to attacks when used in scandalous headlines to lure unwary users that share them without reading or checking if they are correct. An example is the hacked Twitter account of celeb news channel „E!‟ earlier this year, a series of false tweets began with news coming out about Justin Bieber allegedly being gay, who shared 1,200 times within a few hours. It would be much safer to verify the news with other sources than to click on links attached to such news. 2. “News from around the world” You should start to suspect if a news story appears on the social network only once. Global scale news using rapidly spreading, with stories and angles distributed by friends and different sources. Hackers often use scandalous or outrageous headlines to get readers to click on the link to spread viruses and malware on Twitter and Facebook. If you see such titles, you can check them on other sites or Google them before clicking the provided links. 3. “Stories begging you to „Like‟ them” Have you ever pressed „Like‟ on a post that offers something for free? Or to help someone get a million Likes so their parents buy them a dog/cat/send them on a trip around the world? All such request should encourage you to „Like‟ suspicion. Many scams on the social network are distributed to collect your „Likes‟ then sell them to other companies, which in turn start spreading you and your friends adverts. If you suspect you have done something like that and now regret it, you can always remove it using the Activity Log from your profile. 4. “Amazing stories about diets” The phenomenon of obesity is so prevalent that it has received the nickname "the epidemic of the 21st century", which means that many people will look for information about obesity and ways to get rid of it. One of the biggest attacks focused on this issue was distributed via Instagram last July using a picture of tropical fruit. Clicking on the image transferred users to a fake BBC site with the title "tropical fruit Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com Page 1
  • 2. to drop you 8 pounds in 22 days”. Of course, that issue was a scam and clicking on the link caused Instagram accounts to distribute the spam to other unsuspecting friends and followers. 5. “News sites you never heard of” At the height of the hysteria surrounding the royal baby's birth of Prince William and his wife Kate Middleton, the rate of related Tweets was around 23,500 Tweets per minute. Network criminals could not ignore the situation and sent their own tweets with links to news sites pose with promises you will not of course find anywhere else. Needless to say that the links lead to sites that in turn spread viruses and other malicious software and did not provide any news about the royal birth. 6. “Gift Cards” Gift cards can be quite tempting, especially when they are shipped to you from a friend. Unfortunately, most of them are frauds. "Gift cards" that offer you all kinds of free products are usually scams and recently observed on photo-sharing social networks like Pinterest, when one of the steps for getting the “gifts” was that the surfer prompted to share the post with friends. Needless to say that the “gifts” do not exist at all and eventually you will find yourself revealing personal information, or worse install a virus on your computer. About TotalDefense: Total Defense(@Total_Defense) is a global leader in malware detection and anti-crimeware solutions. We offer a broad portfolio of leading security products for the consumer market used by over four million consumers worldwide. Our solutions also include the industry‟s first complete cloud security platform, providing fully integrated endpoint, web and email security through a single Web-based management console with a single set of enforceable security policies Total Defense is a former business of CA Technologies, one of the largest software companies in the world, and has operations in New York, California, Europe, Israel and Asia. Visit http://www.totaldefense.com/ for web, cloud & mobile security solutions for home users and businesses. Copyright © 2013 TotalDefense, Inc. | All rights reserved www.totaldefense.com Page 2