ALL >> Computers >> View Article
Fraudsters Attempt To Deceive Facebook Users Through Fake Video Links Of The Oslo Blast

Recently, Norway was shook by twin attacks, one targeted on a government building in Oslo, and the other a killing spree on the Utoya Island. The otherwise peaceful country plunged into distress after the attacks. While the counter crime agencies were successful in arresting the perpetrator of the crime, the attack resulted in the loss of over ninety lives. On the other hand, cybercriminals were quick to take advantage of the tragedy by posting a fake URL link on thousands of user accounts on social networking site Facebook. The scam first identified by security researchers at Sophos attempts to attract the attention of the members by claiming that a security camera has captured the blast. Users who click on the link are redirected to a seemingly legitimate, but fake page of site, with a video player. The fake page urges users to prove that they are 18 years old by taking a survey. People who fall prey to the scam are required to answer questions and disclose their mobile numbers. Users who share their mobile numbers inadvertently incur expenses for receiving questions through Short Message Service (SMS). People use social ...
... media sites to communicate and enquire regarding the safety of their friends and loved ones in the event of disasters as mobile phones are jammed. Scammers attempt to take advantage of the situation to defraud users.
Cybercriminals keep track of natural disasters, terrorist strikes, assassinations, and swiftly devise fraudulent schemes to take advantage of the panic and sympathy generated by such events. Earlier in the year, scammers were quick to leverage earthquake and Tsunami in Japan. They attempted to defraud users through fake charitable schemes. Social media sites provide opportunity for scammers to target large number of Internet users through mass spam campaigns.
Internet users must be wary of clicking links on social media sites such as Facebook and Twitter. They must avoid disclosing too much information on these sites, and make use of the privacy settings to restrict sharing of e-mail address, messages, pictures and videos to friends. They must avoid participating in surveys devised by unknown users. Adherence to advisories by cyber security researchers on blogs and social media sites may help them in safeguarding their computers from malicious attacks. They may also gain understanding of IT security fundamentals through online degree courses.
Owners of the social media sites must conduct scrutiny of the websites at regular intervals to identify and block fraudulent schemes. Professionals may leverage programs such as secured programming and online university degree programs to improve their technical skills and expertise.
Organizations must update IT security policy at regular intervals on the basis of changing threat scenario. IT professionals must ensure implementation and adherence to the IT security policy by the employees. They must also keep track of the latest technological developments and improve the security mechanisms. Employees must be cautious while sharing business information on social media sites. Professionals qualified in masters of security science may help organizations in detecting the threat vectors and initiating measures to secure the IT infrastructure.
Add Comment
Computers Articles
1. How To Improve The Security Of Android App?Author: goodcoders
2. How To Earn Money From Free Apps?
Author: goodcoders
3. How Artificial Intelligence Is Revolutionizing Accounting?
Author: goodcoders
4. Explain About Web Application Architecture: Components, Types, Best Practices
Author: goodcoders
5. Complete Guide To Fitness App Development
Author: goodcoders
6. Erp For Small And Big Enterprise
Author: AITS Software
7. Top Software Development Company Melbourne
Author: Technothinksup Solutions
8. The Devops Revolution: Accelerating Innovation In The Digital Age
Author: basheer ansari shaik
9. How Ai Is Transforming Software Development
Author: Technothinksup Solutions
10. How To Do Web Scraping With Ruby?
Author: goodcoders
11. How Mobile Apps Blooming In The Fashion Industry?
Author: goodcoders
12. How Cloud Computing Helps In The Field Of Mobile App Development?
Author: goodcoders
13. The Importance Of Cybersecurity In The Digital Age
Author: Mohammad Arsh
14. First-ever ‘identity Management Day’ Is April 13, 2021
Author: Reinfosec
15. Top 5 Project Management Software Of 2025
Author: Ben Gross