ALL >> Computers >> View Article
Fraudsters Attempt To Deceive Facebook Users Through Fake Video Links Of The Oslo Blast

Recently, Norway was shook by twin attacks, one targeted on a government building in Oslo, and the other a killing spree on the Utoya Island. The otherwise peaceful country plunged into distress after the attacks. While the counter crime agencies were successful in arresting the perpetrator of the crime, the attack resulted in the loss of over ninety lives. On the other hand, cybercriminals were quick to take advantage of the tragedy by posting a fake URL link on thousands of user accounts on social networking site Facebook. The scam first identified by security researchers at Sophos attempts to attract the attention of the members by claiming that a security camera has captured the blast. Users who click on the link are redirected to a seemingly legitimate, but fake page of site, with a video player. The fake page urges users to prove that they are 18 years old by taking a survey. People who fall prey to the scam are required to answer questions and disclose their mobile numbers. Users who share their mobile numbers inadvertently incur expenses for receiving questions through Short Message Service (SMS). People use social ...
... media sites to communicate and enquire regarding the safety of their friends and loved ones in the event of disasters as mobile phones are jammed. Scammers attempt to take advantage of the situation to defraud users.
Cybercriminals keep track of natural disasters, terrorist strikes, assassinations, and swiftly devise fraudulent schemes to take advantage of the panic and sympathy generated by such events. Earlier in the year, scammers were quick to leverage earthquake and Tsunami in Japan. They attempted to defraud users through fake charitable schemes. Social media sites provide opportunity for scammers to target large number of Internet users through mass spam campaigns.
Internet users must be wary of clicking links on social media sites such as Facebook and Twitter. They must avoid disclosing too much information on these sites, and make use of the privacy settings to restrict sharing of e-mail address, messages, pictures and videos to friends. They must avoid participating in surveys devised by unknown users. Adherence to advisories by cyber security researchers on blogs and social media sites may help them in safeguarding their computers from malicious attacks. They may also gain understanding of IT security fundamentals through online degree courses.
Owners of the social media sites must conduct scrutiny of the websites at regular intervals to identify and block fraudulent schemes. Professionals may leverage programs such as secured programming and online university degree programs to improve their technical skills and expertise.
Organizations must update IT security policy at regular intervals on the basis of changing threat scenario. IT professionals must ensure implementation and adherence to the IT security policy by the employees. They must also keep track of the latest technological developments and improve the security mechanisms. Employees must be cautious while sharing business information on social media sites. Professionals qualified in masters of security science may help organizations in detecting the threat vectors and initiating measures to secure the IT infrastructure.
Add Comment
Computers Articles
1. How A Free Seo Checker Can Help You Understand And Improve Your WebsiteAuthor: Mahesh
2. "empowering Digital Excellence: Lcc Computer Education In Bhubaneswar"
Author: Khushi Gill
3. How Cat6 Ethernet Cables Improve Streaming, Gaming, And Downloads
Author: Jennifer Truong
4. Why Choose The 1452 Bluetooth Scanner In 2025?
Author: prime pos
5. Scraping Chipotle Menu Data From All Us Locations
Author: Food Data Scrape
6. The Rise Of Digital Marketing Agencies: A Deep Dive Into The Digital Marketing Landscape In Bangalore
Author: Cubikeymedia
7. What Are The Different Types Of Computer Cables?
Author: Jennifer Truong
8. How To Check If Your Business Idea Will Really Work?
Author: goodcoders
9. Boost Insights With Carfax Car Listing Data Extraction
Author: travel scrape
10. Cat6 Ethernet Cable: The Key To Faster Internet
Author: Jennifer Truong
11. Google Ads Company In Dubai: Realizing Business Growth With Webtek Digital
Author: webtek Digiytal
12. How To Troubleshoot Common Usb Cable Issues?
Author: Jennifer Truong
13. Why Melbourne’s Computer Shops Are The Best For Custom-built Pcs?
Author: Jack Williams
14. How To Manage Staff Productivity When Working Virtually?
Author: goodcoders
15. The Future Is Now – Top Digital Marketing Updates In 2025
Author: Gautam Khatnani