ALL >> Computers >> View Article
Fraudsters Attempt To Deceive Facebook Users Through Fake Video Links Of The Oslo Blast
Recently, Norway was shook by twin attacks, one targeted on a government building in Oslo, and the other a killing spree on the Utoya Island. The otherwise peaceful country plunged into distress after the attacks. While the counter crime agencies were successful in arresting the perpetrator of the crime, the attack resulted in the loss of over ninety lives. On the other hand, cybercriminals were quick to take advantage of the tragedy by posting a fake URL link on thousands of user accounts on social networking site Facebook. The scam first identified by security researchers at Sophos attempts to attract the attention of the members by claiming that a security camera has captured the blast. Users who click on the link are redirected to a seemingly legitimate, but fake page of site, with a video player. The fake page urges users to prove that they are 18 years old by taking a survey. People who fall prey to the scam are required to answer questions and disclose their mobile numbers. Users who share their mobile numbers inadvertently incur expenses for receiving questions through Short Message Service (SMS). People use social ...
... media sites to communicate and enquire regarding the safety of their friends and loved ones in the event of disasters as mobile phones are jammed. Scammers attempt to take advantage of the situation to defraud users.
Cybercriminals keep track of natural disasters, terrorist strikes, assassinations, and swiftly devise fraudulent schemes to take advantage of the panic and sympathy generated by such events. Earlier in the year, scammers were quick to leverage earthquake and Tsunami in Japan. They attempted to defraud users through fake charitable schemes. Social media sites provide opportunity for scammers to target large number of Internet users through mass spam campaigns.
Internet users must be wary of clicking links on social media sites such as Facebook and Twitter. They must avoid disclosing too much information on these sites, and make use of the privacy settings to restrict sharing of e-mail address, messages, pictures and videos to friends. They must avoid participating in surveys devised by unknown users. Adherence to advisories by cyber security researchers on blogs and social media sites may help them in safeguarding their computers from malicious attacks. They may also gain understanding of IT security fundamentals through online degree courses.
Owners of the social media sites must conduct scrutiny of the websites at regular intervals to identify and block fraudulent schemes. Professionals may leverage programs such as secured programming and online university degree programs to improve their technical skills and expertise.
Organizations must update IT security policy at regular intervals on the basis of changing threat scenario. IT professionals must ensure implementation and adherence to the IT security policy by the employees. They must also keep track of the latest technological developments and improve the security mechanisms. Employees must be cautious while sharing business information on social media sites. Professionals qualified in masters of security science may help organizations in detecting the threat vectors and initiating measures to secure the IT infrastructure.
Add Comment
Computers Articles
1. What Identity Governance Really Means In Modern EnterprisesAuthor: Mansoor Alam
2. Strategies For Successful Site Selection In Clinical Trials
Author: Giselle Bates
3. Simplifying Business Purchases With Smart, Reliable Procurement Solutions
Author: suma
4. How Businesses In Dubai Are Scaling Faster With Modern Erp Software
Author: Al murooj solutions
5. How To Choose The Right Weapon Tracking System: 7 Must-have Features
Author: 3PL Insights
6. Power Bi Tutorial For Beginners: Learn Business Intelligence Step By Step
Author: Tech Point
7. Spark Matrix™: Data Governance Solutions
Author: Umangp
8. How Prediction Market Software Development Is Transforming Data-driven Decision Making
Author: david
9. Naming Development & Management
Author: brainbell10
10. Mysql Database Development & Management Services
Author: brainbell10
11. Mongodb Development & Management
Author: brainbell10
12. Spark Matrix™: Conversational Automation
Author: Umangp
13. How Care Home Software Helps Improve Daily Operations In Care Homes
Author: Centrim Life UK
14. Pc & Tech Stores: Latest Trends In Hardware And Accessories
Author: Jack Williams
15. The Infozed Blueprint: Powering The Modern Workspace
Author: suma






