ALL >> Computers >> View Article
Fraudsters Attempt To Deceive Facebook Users Through Fake Video Links Of The Oslo Blast
Recently, Norway was shook by twin attacks, one targeted on a government building in Oslo, and the other a killing spree on the Utoya Island. The otherwise peaceful country plunged into distress after the attacks. While the counter crime agencies were successful in arresting the perpetrator of the crime, the attack resulted in the loss of over ninety lives. On the other hand, cybercriminals were quick to take advantage of the tragedy by posting a fake URL link on thousands of user accounts on social networking site Facebook. The scam first identified by security researchers at Sophos attempts to attract the attention of the members by claiming that a security camera has captured the blast. Users who click on the link are redirected to a seemingly legitimate, but fake page of site, with a video player. The fake page urges users to prove that they are 18 years old by taking a survey. People who fall prey to the scam are required to answer questions and disclose their mobile numbers. Users who share their mobile numbers inadvertently incur expenses for receiving questions through Short Message Service (SMS). People use social ...
... media sites to communicate and enquire regarding the safety of their friends and loved ones in the event of disasters as mobile phones are jammed. Scammers attempt to take advantage of the situation to defraud users.
Cybercriminals keep track of natural disasters, terrorist strikes, assassinations, and swiftly devise fraudulent schemes to take advantage of the panic and sympathy generated by such events. Earlier in the year, scammers were quick to leverage earthquake and Tsunami in Japan. They attempted to defraud users through fake charitable schemes. Social media sites provide opportunity for scammers to target large number of Internet users through mass spam campaigns.
Internet users must be wary of clicking links on social media sites such as Facebook and Twitter. They must avoid disclosing too much information on these sites, and make use of the privacy settings to restrict sharing of e-mail address, messages, pictures and videos to friends. They must avoid participating in surveys devised by unknown users. Adherence to advisories by cyber security researchers on blogs and social media sites may help them in safeguarding their computers from malicious attacks. They may also gain understanding of IT security fundamentals through online degree courses.
Owners of the social media sites must conduct scrutiny of the websites at regular intervals to identify and block fraudulent schemes. Professionals may leverage programs such as secured programming and online university degree programs to improve their technical skills and expertise.
Organizations must update IT security policy at regular intervals on the basis of changing threat scenario. IT professionals must ensure implementation and adherence to the IT security policy by the employees. They must also keep track of the latest technological developments and improve the security mechanisms. Employees must be cautious while sharing business information on social media sites. Professionals qualified in masters of security science may help organizations in detecting the threat vectors and initiating measures to secure the IT infrastructure.
Add Comment
Computers Articles
1. How To Design A Website That Keeps Visitors Hooked For LongerAuthor: peter
2. Why Australian Businesses Should Collaborate With Local Odoo Partners
Author: Alex Forsyth
3. Web Scraping Api For Zepto Grocery Data In India
Author: FoodDataScraper
4. Spark Matrix™ : Benchmarking Global Leaders In Object-based Storage Solutions
Author: Umangp
5. Leading Epson Printer Dealers In Hyderabad
Author: pbs
6. Will Upgrading To Windows 11 Make Your System Faster?
Author: Smita Jain
7. Scrape Data From Usa Top Grocery Platforms For Retail Intelligence
Author: FoodDataScraper
8. Odoo Manufacturing: How Australian Smes Can Slash Costs Using Odoo 19 Features
Author: Alex Forsyth
9. Top-rated Scholarship Management Software For Universities: Simplifying The Award Process
Author: Brenda Joyce
10. Leveraging Restaurants Menu Details Dataset From Deliveroo Uk
Author: FoodDataScraper
11. Avoid These Costly Mistakes When Hiring An Odoo Implementation Company
Author: Alex Forsyth
12. Grocery Details Dataset From Publix Usa
Author: FoodDataScraper
13. Scrape Luxury Food Trends Data 2025 For Culinary Innovations
Author: FoodDataScrape
14. Selenium With Python Tutorial: Simple Way To Start Automation Testing
Author: Tech Point
15. Top Barcode Scanner Dealers In Andhra Pradesh
Author: prime poskart






