ALL >> Computers >> View Article
Fraudsters Attempt To Deceive Facebook Users Through Fake Video Links Of The Oslo Blast
Recently, Norway was shook by twin attacks, one targeted on a government building in Oslo, and the other a killing spree on the Utoya Island. The otherwise peaceful country plunged into distress after the attacks. While the counter crime agencies were successful in arresting the perpetrator of the crime, the attack resulted in the loss of over ninety lives. On the other hand, cybercriminals were quick to take advantage of the tragedy by posting a fake URL link on thousands of user accounts on social networking site Facebook. The scam first identified by security researchers at Sophos attempts to attract the attention of the members by claiming that a security camera has captured the blast. Users who click on the link are redirected to a seemingly legitimate, but fake page of site, with a video player. The fake page urges users to prove that they are 18 years old by taking a survey. People who fall prey to the scam are required to answer questions and disclose their mobile numbers. Users who share their mobile numbers inadvertently incur expenses for receiving questions through Short Message Service (SMS). People use social ...
... media sites to communicate and enquire regarding the safety of their friends and loved ones in the event of disasters as mobile phones are jammed. Scammers attempt to take advantage of the situation to defraud users.
Cybercriminals keep track of natural disasters, terrorist strikes, assassinations, and swiftly devise fraudulent schemes to take advantage of the panic and sympathy generated by such events. Earlier in the year, scammers were quick to leverage earthquake and Tsunami in Japan. They attempted to defraud users through fake charitable schemes. Social media sites provide opportunity for scammers to target large number of Internet users through mass spam campaigns.
Internet users must be wary of clicking links on social media sites such as Facebook and Twitter. They must avoid disclosing too much information on these sites, and make use of the privacy settings to restrict sharing of e-mail address, messages, pictures and videos to friends. They must avoid participating in surveys devised by unknown users. Adherence to advisories by cyber security researchers on blogs and social media sites may help them in safeguarding their computers from malicious attacks. They may also gain understanding of IT security fundamentals through online degree courses.
Owners of the social media sites must conduct scrutiny of the websites at regular intervals to identify and block fraudulent schemes. Professionals may leverage programs such as secured programming and online university degree programs to improve their technical skills and expertise.
Organizations must update IT security policy at regular intervals on the basis of changing threat scenario. IT professionals must ensure implementation and adherence to the IT security policy by the employees. They must also keep track of the latest technological developments and improve the security mechanisms. Employees must be cautious while sharing business information on social media sites. Professionals qualified in masters of security science may help organizations in detecting the threat vectors and initiating measures to secure the IT infrastructure.
Add Comment
Computers Articles
1. Future-proof Your Legacy Systems With Expert Foxpro Migration Services By Tech GazebosAuthor: Tech Gazebos
2. Why Fortigate 40f And Fortigate 60f Are The Best Choices For Business Network Security
Author: Stacklink uk
3. Why Modern Facilities Rely On Environmental Monitoring And Remote Temperature Probes For Compliance And Control
Author: Chris Miller
4. Spark Matrix™: Autonomous Mobile Robots (amr)
Author: Umangp
5. Spark Matrix™: Ai Observability Solutions
Author: Umangp
6. The Future Of Asset Intelligence: How Iot And Rfid Are Transforming Modern Operations
Author: TrackerIoT
7. Your Partner For Reliable Dynamics 365 Solutions!
Author: brainbell10
8. Download Pst Splitter Software (windows) – Split Large Pst Safely
Author: vSoftware
9. Buy Epson Thermal Printer: What To Know
Author: pbs
10. Pst To Mbox Conversion Without Losing Email Headers
Author: vSoftware
11. How Telecom Custom Order Management Software Is Transforming Customer Experience In The Digital Era
Author: Kevin
12. How To Launch A Successful Food Delivery App In Usa
Author: swizajoy
13. Flexible & Affordable Desktop Rental Solutions For Businesses | Renton Technologies
Author: Renton Technologies
14. Importance Of Good Identity And Access Management System In 2026
Author: adlerconway
15. What Is Vapt? Guide To The Introductory Vulnerability Assessment And Penetration Testing
Author: Lorcam Securities






