facebook linkedin twitter

Computerware Blog

Social Media Scams and Everything You Should Know

Social Media Scams and Everything You Should Know

Social media has overtaken both the professional and personal aspects of online communication and connection, and while it might provide a considerable boon for both, it increases the odds of being contacted by scams and other malicious attempts. The best way to make sure you don’t fall prey to a scam is to remain vigilant. Today we’ll discuss the various scams that are created for use with social media.

Many of these might not seem to apply to a business’ social media presence, but we assure you that it’s worth considering. Furthermore, considering how easy it is to blend the two together, we urge you to limit how closely linked your personal and professional social media accounts are, as a breach on either end could put the other one in danger.

Gossip Scams

“See PHOTOS of the celebrity that secretly lives in your area!” “You’d never believe who DWAYNE JOHNSON spends his free time with!” “You’ll be SHOCKED to learn which beloved ‘90s sitcom cast formed a blood cult!”

Chances are you’ve seen some Facebook ads like those above or have seen someone you know sharing them on their news feed. People look at the lives of celebrities and try to live vicariously through their experiences, and it often leads them to falling prey to scams by downloading malware. Avoiding these scams is relatively simple, as long as you can avoid clicking on gossipy headlines. Besides, if you’re ever asked to download a program, it should be from the actual source, not a sketchy website that you’ve been redirected to.

Nigerian Scam/Stuck Abroad Scam

“Hello Dearest Friend, I am Prince Akinola. During the recent uprising in my country, my father was murdered in his sleep. To protect his riches, I seek a trustworthy Person to help me transfer 3 million US dollars into an account for a time. Helping me, you will be able to keep 35% of it to use as you see Fit. Please reply to me immediately with your name and phone number so I can leave this country and transfer the money to you.”

These are some of the more infamous scams, originally appearing in Nigeria and spreading worldwide. Instead of providing you with a percentage of a fortune, the victim has their banking credentials stolen, or they are asked to pay processing fees before a payment can be delivered.

“I’m so glad I got the chance to send this message. I’m overseas in Europe and my wallet was stolen! I need $1,300 to get home. Could you wire over the money for me?”

In this version of the scam, a hacker will take over someone’s account and spread a story of being stranded overseas, desperately in need of money so they can find a way home. In cases like this, verification of the story needs to happen, whether it’s from someone closer to this friend or from a family member.

Lottery Scams/Who Viewed Your Profile Scam/IQ Scam

“Congratulations! A gift card worth $1500 is reserved for you!”

While it would certainly be nice to win some money, you know what they say… if it’s too good to be true, it probably isn’t. Some of these scams will ask for contact information so they can charge data fees to you, while others will flat-out steal your banking credentials. It’s very important that you keep in mind that you can’t win a contest you haven’t entered.

“Want to know who’s been looking at your profile? Install this application to find out.”

This particular scam tries to use popularity and curiosity as a means to get users to install a malicious application. While it might be nice to have more people notice a post, remember that scammers often utilize these traits to their advantage.

“Your IQ evaluation is finished. We’ll need a few more details to calculate your score, including your age and phone number.”

These apps and plugins will offer to test your intelligence, which appeals to the average user’s curiosity about their IQ score. These might ask for your phone number or other information, which in turn creates expenses for the user.

Account Cancelled Scam

“We are writing you to confirm the account cancellation request that your submitted. To confirm or cancel this cancellation request, please link click below. Thank you, The Facebook Team”

Receiving a message about an account being cancelled might not seem like a suspicious thing to receive in your email but take a closer look. It might be a message from someone trying to steal your login credentials. Look for grammar and spelling errors in the message. After all, the real Facebook or Twitter has plenty of capital to hire editors and other professionals to ensure their messages are properly handled.

Photo of You Scam

“Oh my god! LOL is this actually a photo of you?”

Some scammers can replicate another user’s profile and attempt to scam others with a message indicating shock at the user being in a photo. The link will then provide the scammer with information about the user. Try not to click on links that don’t look right and consider changing your profile settings so that only those with a connection to you can send you a message in the first place.

Catfishing/Romance Scams

“Hey baby, I can’t wait to meet you, but I can’t quite swing the money for the ticket… could you send some cash to help me cover it? Looking forward to meeting in person.”

Romance in particular is a dangerous enabler for online scams. The Federal Trade Commission saw more than 21,000 reported romance scams in 2018 alone, and they cost a total of $143 million. The median loss to one of these scams in 2018 was around $2,600, more than seven times the median loss for any other fraud types.

If you think you’re being catfished, try to reverse engineer the profile of the person who is supposedly catfishing you to see if they are associated with multiple accounts. Furthermore, never send money to anyone who you haven’t met in person.

Utilizing social media in a secure fashion can be challenging, but it’s far from the only method of securing your business. For more ways to keep your company safe in an online environment, reach out to Computerware at (703) 821-8200.

Can Your Business Benefit From a Private Cloud?
Tip of the Week: File Management Tips
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, October 18, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Hackers Data Hardware Microsoft Backup Workplace Tips Managed Service Provider Network Security Productivity Hosted Solutions Business Email Malware IT Services Saving Money Efficiency Computer User Tips Productivity Google IT Support Innovation Small Business Smartphones Mobile Devices VoIP Quick Tips Data Backup Microsoft Office Business Continuity Gadgets Collaboration Social Media communications Data Recovery Disaster Recovery IT Support Network Android Upgrade Mobile Office Server Communication Virtualization Mobile Device Management Smartphone Miscellaneous Phishing Cybersecurity Ransomware Windows 10 Windows Tech Term Unified Threat Management Vendor Management Apps Outsourced IT Facebook Holiday Operating System Remote Monitoring Passwords Automation Managed IT Services Mobile Computing BDR Analytics BYOD Remote Computing Users Managed IT services WiFi Mobile Device Internet of Things Apple Data Management The Internet of Things Marketing History Artificial Intelligence Save Money Firewall Browser Big data Help Desk Alert App Encryption Spam IT Consultant Office 365 Two-factor Authentication Cloud Computing Content Filtering Information Technology Windows 10 Going Green Health Training Bring Your Own Device Antivirus Gmail Bandwidth Business Technology Office Maintenance Printer Cybercrime Tech Support Virus Lithium-ion Battery Best Practice Cost Management Information Hiring/Firing Hard Drives Budget Wireless Technology Saving Time Windows 8 Computers Outlook VPN Search Managed Service Managed IT Government Employer-Employee Relationship Retail Networking Hacking IBM Money Phone System Document Management Healthcare Access Control Customer Service It Management Travel Blockchain Education Recovery Update iPhone Risk Management Value Password Legal Save Time Hacker Downtime Regulations Current Events Augmented Reality PowerPoint Proactive IT SaaS Running Cable File Sharing Administration Applications Hard Drive Law Enforcement Twitter Intranet Compliance Mobility Website Patch Management Data storage Avoiding Downtime Humor Data Loss Cryptocurrency Word Laptop Monitoring Data Breach Business Intelligence Private Cloud Cortana Business Growth Excel Digital Digital Payment Project Management Telephony Websites Router Management Customer Relationship Management Machine Learning Comparison Tablet Paperless Office Vulnerabilities Telephone Systems Sports Company Culture User Computing Computer Repair Vendor Disaster End of Support Social Networking Hosted Solution Robot Social Windows 7 Fax Server Wireless Data Security Securty Google Maps DDoS Storage Solid State Drive Social Engineering Flexibility Scam Black Market Voice over Internet Protocol Redundancy Computing Infrastructure Hack Google Docs Net Neutrality Pain Points Memory How To eWaste Download Evernote Experience Chrome Monitors Virtual Assistant Cleaning Wi-Fi Office Tips Microchip Taxes Telephone Processors Start Menu Tech Terms Computer Accessories USB Managed IT Service Mobile Technology YouTube Distributed Denial of Service Trending Co-managed IT Presentation Gaming Console Cooperation Software as a Service Unified Communications Settings User Error Public Cloud Licensing Uninterrupted Power Supply Mouse Virtual Desktop Webcam Processor Specifications Safety Text Messaging Vulnerability Statistics Bitcoin Programming Identity Theft IT service Network Congestion Lifestyle Documents Data Protection Teamwork Heating/Cooling Distribution Entertainment Downloads Politics Virtual Reality Emails Bluetooth Streaming Media Conferencing Automobile Inbound Marketing Chromebook Fileless Malware Hybrid Cloud Google Calendar Deep Learning Devices Messenger Tracking Domains Tip of the week Work/Life Balance Read Fraud Tactics UTM Content Rental Service Meetings Public Speaking Modem Touchscreen News Visible Light Communication Get More Done Proxy Server Azure VoIP IT Plan Enterprise Resource Planning Web Server Printer Server Shortcut Term Managed Services Provider Consultation IT consulting Legislation Error Cabling Turn Key Electronic Medical Records Transportation Knowledge Device Management Entrepreneur Directions Display Technology Tips Business Managemenet Accountants A.I. Books Workers Troubleshooting Recording Content Management email scam Addiction Administrator Trojan Audit CIO Multi-factor Authentication Supercomputer Organize HIPAA Upselling SSID Fake News Advertising Flash Environment Dark Web Free Resource Migration Connected Devices Competition Processing Managed Services Data Warehousing Windows XP Wireless Headphones Worker Electronic Payment Health IT Employee/Employer Relationship Video Surveillance Staffing Google Wallet online Currency Saving ZTime Wasting Time Access Displays Equifax Fleet Tracking Reading Samsung Business Owner Logistics Emergency Hard Drive Disposal Society Network Management Computer Care Micrsooft LinkedIn Device security MSP Employer Employee Relationship IP Address Microsoft Excel G Suite Bookmark Desktop Finance Hacks Physical Security Webinar Application Harddrive Google Play Telephone Service Google Drive Windows Server 2008 Nanotechnology Social Network Human Resources Employer/Employee Relationships Debate Drones Botnet Managing Costs Spyware Mobile Payment Skype Startup Asset Tracking Relocation Tablets GPS Microsoft 365 Archive Business Cards Service Level Agreement Banking Electricity Printing Username Medical IT Permissions Language Unified Threat Management Backup and Disaster Recovery Sync External Harddrive Browsers Gamification Notifications CCTV Digital Signature Security Cameras Threats Point of Contact Screen Reader Customer Resource management User Tip Proactive Maintenance Business Metrics Computer Malfunction Navigation Thin CLient Virtual Machine cache Television switches Writing Smart Tech Reliable Computing 3D Solutions Ebay Music Piracy Upload Smart Phones Data Analysis Employees WannaCry Upgrades HTML Professional Services Fiber-Optic Database In Internet of Things Best Practives Recycling Mobile Security GDPR Time Management Freedom of Information LiFi Analytic Telephone System PDF SQL Server Corporate Profile Trends Motion Sickness Best Available Keyboard Tech Leadership Hypervisor Assessment SharePoint Product Reviews Multi-Factor Security Cost Scalability Microserver Adminstration Integration Pirating Information Software License CrashOverride Regulation 3D Printing Capital Productuvuty Personal Information Financial Managing Stress Printers

toner1