123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Cybercriminals Attempt To Entice Internet Users With Counterfeit Google+ Invites

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Google+ is the latest venture of Google in social media business. Google aims to compete with Facebook through the new initiative, the most popular social networking site. As was expected, the new site has generated lot of interest among people. However, Google had to suspend sending new invites due to large number of requests, which the company has termed as 'insane demand'. The company apparently wants to expand the user base in a controlled manner. One of the major challenges for Facebook has been to deal with the onslaught of various types of scams. The popularity of the site makes it one of the favorite destinations for cybercriminals. Google+ also faces similar risk of being the target of cybercriminals. As such, controlled phasing out of invites seems to be a rational approach. However, scammers are still attempting to take advantage of the interest among people to join the new social media site.

Security researchers at Trend Micro recently identified a website, which attempts to leverage the demand for Google+ invites. The person owning the website claims that he has received 1000 additional invites for being ...
... a friend of an employee to pass on free memberships, and offers free download of the invite. Internet users who fall prey to the scam and click on the link are lead to a survey page, wherein scammers ask them to answer any of the several surveys.

Visitors, who choose to close the survey page are led to another site wherein they are sought to answer one of the surveys to download the invite for free or download a premium invite by subscribing to 3 days, one month, quarterly or half yearly membership. The site urges visitors, who choose to download free invite by answering the surveys to provide valid information to download the invite or risk permanent ban from the site. On completion of the survey, the site urges people to share their contact number. According to the security firm, visitors who enter the mobile number inadvertently also subscribe to certain clubs, which would charge them specific fees on daily basis. As such, visitors of site end up making payments and disclosing their personally identifiable information as well as contact details rather than getting invite for the Google+.

Internet users must be cautious of dubious schemes, and avoid answering to survey scams. They must be cautious, while disclosing personal and financial information. Following security blogs, adherence to vendor's security advisories and alerts by Computer Emergency Response Teams (CERTs) and leveraging online computer degree programs may help Internet users in understanding prevailing security threats and inculcating safe online computing practices.

Professionals qualified in IT masters degree programs and security certifications may help developers in understanding internal as well as external security risks, identifying discrepancies and initiating corrective measures. The vibrant threats in the security environment require proactive action by counter crime agencies. Security professionals qualified in online technology degree programs may help counter crime professionals in tracing and blocking fraudulent schemes. Timely sharing of threat information between organizations, Internet security firms and counter crime agencies may help in bringing perpetrators of crime to justice.

Total Views: 168Word Count: 524See All articles From Author

Add Comment

Computers Articles

1. Exploring How Ai In The Cloud Can Transform Your Business
Author: TechDogs

2. The Power Of Cloud And Ai: A New Era Of Collaboration
Author: TechDogs

3. Get Business Insights Using Expedia & Booking. Com Review Data Scraping
Author: DataZivot

4. Top 10 Reasons A Strong Communication Strategy Drives Prm Program Success
Author: Archi

5. Achieve Scalable Web Scraping With Aws Lambda
Author: Devil Brown

6. Overcoming Common Challenges In Iso 27001 Implementation
Author: Jenna Miller

7. Basic Computer Course: Your Gateway To Skill Development | The Institute Of Professional Accountants
Author: Tipa Institute

8. Top 7 Advantages Of React Js
Author: Bella Stone

9. Top 7 App Marketing Tools For Mobile Success
Author: Bella Stone

10. Revolutionizing Education Management With Samphire It Solution Pvt Ltd’s Erp Software
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD

11. Top 10 Healthcare Technology Trends
Author: goodcoders

12. "building Tomorrow’s Factories: The Role Of Automation & Robotics In Modern Manufacturing"
Author: andrew smith

13. The Ultimate Guide To The Best Ecommerce Plugin For Wordpress
Author: Rocket Press

14. Xsosys Erp: A Scalable Solution For Businesses In Any Industry
Author: Xsosys Technology(S) Pte. Ltd.

15. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: