BNMC Blog

By accepting you will be accessing a service provided by a third-party external to https://www.bnmc.net/

Would One of These Social Media Scams Bamboozle You?

Would One of These Social Media Scams Bamboozle You?

Social media plays an increasing role in both the professional and personal sides of our lives. Unfortunately, this means that we all experience an increase in exposure to the many scam attempts that will appear on our screens. Like any kind of scam, the best defense against those that appear on social media is good, old-fashioned awareness and vigilance.

Here, we’ll review the various scams that frequently appear on social media to help you better identify problematic content on your feeds. Many of these may not seem to apply to your business’ social media presence at first glance, but it is important to remember that your personal social media and your professional representation on social media are closely linked. As a result, a breach of your personal account could easily put your business’ representation at risk as well.

Gossip Scams

“See PHOTOS of the celebrity that secretly lives in your area!” “You’d never believe who DWAYNE JOHNSON spends his free time with!” “You’ll be SHOCKED to learn which beloved ‘90s sitcom cast formed a blood cult!”

You’ve likely seen ads pop up on your Facebook (or have had some of your connections share stories on their Newsfeeds) making claims similar to these. People like to live vicariously through the celebrities they admire, but these scams more often than not fool them into downloading malware after visiting a page. Fortunately, avoiding these scams is fairly simple - all you have to do is take in gossipy headlines with a grain of salt and avoid downloading programs from anywhere but the actual source.

Nigerian Scam/Stuck Abroad Scam

“Hello Dearest Friend, I am Prince Akinola. During the recent uprising in my country, my father was murdered in his sleep. To protect his riches, I seek a trustworthy Person to help me transfer 3 million US dollars into an account for a time. Helping me, you will be able to keep 35% of it to use as you see Fit. Please reply to me immediately with your name and phone number so I can leave this country and transfer the money to you.”

These scams are perhaps some of the most famous, originally appearing in Nigeria but quickly spreading the world over. Basically, instead of netting a large percentage of a fortune, the victim usually is scammed out of their banking credentials or are asked to pay “processing fees” before their “payment can be delivered.”

“I’m so glad I got the chance to send this message. I’m overseas in Europe and my wallet was stolen! I need $1,300 to get home. Could you wire over the money for me?”

In the more personal version of the Nigerian scam, a cybercriminal will hack into someone’s account and start spreading a facetious sob story among their friends and relatives, hoping that someone will wire money in an attempt to help. While we would all want to do anything, we could for a friend, it is important to verify their story with them via some other means of communication.

Lottery Scams/Who Viewed Your Profile Scam/IQ Scam

“Congratulations! A gift card worth $1500 is reserved for you!”

Wouldn’t it be nice, right? Quite a few of the scams that appear on social media come up in the form of pop-up messages, offering a generic prize in exchange for some personal information. Some will ask for a mobile number so they can charge data fees from you, while others will ask for your banking credentials to steal from you that way. While winning anything like what these scams offer would be undeniably awesome, you can’t win a contest that you didn’t enter.

“Want to know who’s been looking at your profile? Install this application to find out.”

One of the reasons that social media is so popular is the fact that many people use it as a popularity litmus test - how often have you posted something, only to be disappointed when so few of your followers reacted to it… or perhaps more did than your notifications would indicate? Scammers leverage this curiosity as a means of weaponizing fake links that claim to provide a list of people who have viewed their target’s profile, but actually only steal their data.

“Your IQ evaluation is finished. We’ll need a few more details to calculate your score, including your age and phone number.”

These kinds of plugins and applications seem to be a dime a dozen on social media, especially on Facebook. Somewhat ironically, these scams can actually test your intelligence… you just have to wonder how your phone number would factor into measuring your smarts. Here’s a hint: it doesn’t. These evaluations are typically just a means of getting your phone number so the persons responsible can start charging you.

Account Cancelled Scam

“We are writing you to confirm the account cancellation request that your submitted. To confirm or cancel this cancellation request, please link click below. Thank you, The Facebook Team”

If you receive a message or email from “Facebook” claiming to have received an account cancellation request from you (which you didn’t send), chances are that it is simply someone trying to direct you to a fraudulent login page so they can steal your information. Check the email address that the message came from and keep an eye out for any improper grammar or misspellings. The real Facebook can afford to hire copy editors to make sure their messages are properly composed.

Photo of You Scam

“Oh my god! LOL is this actually a photo of you?”

Some scammers like to replicate another user’s profile and will then try and scam the connections of the original page by sharing a link through an intriguing message, claiming to have a photo of them that needs to be seen. In actuality, this link will only provide the scammer with your information. Try not to click on any links that don’t seem quite right and consider setting your personal profile to private to prevent anyone who isn’t already connected to you from reaching out.

Catfishing/Romance Scams

“Hey baby, I can’t wait to meet you, but I can’t quite swing the money for the ticket… could you send some cash to help me cover it? Looking forward to meeting in person.”

Ah, romance… it only makes sense that it contributes to one of the most effective online scams there is. According to the Federal Trade Commission, 2018 saw more than 21,000 reported romance scams, claiming a total of $143 million. These totals make catfishing scams one of the most effective means for scammers to make a quick buck. In fact, the median loss to one of these scams in 2018 was $2,600 - seven times the median loss of any of the other fraud types.

If you suspect you may be being catfished, try doing a reverse image search for the profile picture the person on the other end provided. If the images are also associated with another profile, you’re likely being targeted by a scammer. Don’t send money to anyone you haven’t met in person, and don’t be afraid to lean on those in your life who you know and trust for their two cents.

While social media can be a great business tool, it isn’t without its dangers - and even the more personal risks can spill over to affect your business. For other means of protecting your organization from threats, reach out to us at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, June 06 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing Privacy User Tips Cloud Email Network Security Hosted Solutions Microsoft Computer Software Hackers Efficiency Business Malware Communication Data Google Small Business Workplace Tips IT Services IT Support Mobile Devices Cloud Computing Hardware Tech Term Internet Managed IT Services Data Recovery Backup Ransomware Innovation Users Smartphone Outsourced IT Upgrade Saving Money Mobile Device Windows Smartphones Android Miscellaneous Information Data Backup Windows 10 communications Business Continuity Disaster Recovery Microsoft Office Business Management Browser VoIP Facebook Server Phishing Cybersecurity Social Media Office 365 Managed IT Services Network Productivity Data Management Windows 10 Passwords Internet of Things App Gmail Vulnerability Remote Monitoring Gadgets Word Quick Tips Mobile Office Apps Managed Service Artificial Intelligence Infrastructure Encryption Chrome Employer-Employee Relationship Company Culture Virtual Reality Analytics Tip of the week Website Remote Workers BYOD Networking IT Support Money VPN Access Control Settings Applications Router Managed Service Provider Information Technology Save Money Google Drive Bandwidth Automation Content Filtering YouTube Employee-Employer Relationship Risk Management Education Apple Storage Paperless Office Office Tips Government Avoiding Downtime Antivirus Development Computers Data storage Unified Threat Management Hacker Big Data HIPAA BDR Display Collaboration Firewall WiFi IT Management Data Security Maintenance Robot Virtual Private Network Managed IT Administration Best Practice Tablet Wireless Solid State Drive Mouse End of Support Conferencing Managed Services Going Green Training MSP Remote Computing Hard Disk Drive Augmented Reality Two-factor Authentication Managing Stress SaaS Managed IT Service Printing OneNote Wi-Fi Password Data Breach Customer Relationship Management Scam Virtualization Laptop Windows 7 IT Holiday The Internet of Things Software as a Service Break Fix Social Network Data loss Search Telephone Systems Retail Alert desktop Outlook Spam Computing Mobile Security Downtime Marketing Bring Your Own Device Operating System Server Management Social Monitors Business Technology LiFi Vendor Management Humor Business Intelligence Chromebook iOS Hosted Solution Touchscreen Document Management IT Technicians Optimization Security Cameras Profiles File Sharing Smart Technology Current Events Connectivity Social Engineering Spying National Security Techology Computer Care IBM Human Error Memory Statistics Modem FinTech Halloween Analysis Students How To Lenovo Inventory Staff Leominster Websites Downloads Identity Theft Cryptocurrency Regulations Scalability Mail Merge Blockchain Asset Management Language Value Virus Mirgation Recycling Utility Computing Shortcut Distributed Denial of Service IT solutions IoT Safety Updates VoIP Unified Threat Management Corporate Profile Google Docs Peripheral Device Reducing Cost Bluetooth Automobile Comparison Hacks Cookies Scary Stories Mixed Reality Firefox Superfish G Suite Shadow IT K-12 Schools Bitcoin Social Networking Network Congestion Running Cable Migration Consulting Address Permissions Dell Google Wallet Memes Computing Infrastructure Professional Services LED Threats Chatbots eWaste Laptops Patch Management Cabling Star Wars Buisness PowerPoint User Error WannaCry Business Growth Virtual Desktop Mobility Batteries Specifications Google Maps Nanotechnology Writing Sports Legal Gamification Wearable Technology Network upgrade Heating/Cooling Multi-Factor Security Windows 8 Motherboard Cables Unified Communications Drones Alerts USB Co-Managed IT Identity Continuity Dark Data Update Managed Services Provider Fraud Cost Management Onboarding GDPR Time Management Printer Print Toner Myths Black Friday Mobile Device Management Screen Reader Charging Slack Hard Disk Drives Deep Learning COVID-19 Smart Office Content Huawei Servers Google Calendar Digital Payment Wires Messaging Emergency Holidays Licensing Dongle Politics Alt Codes Solar Customer Service Cybercrime Entertainment Vendor Dark Web Disaster Distribution Assessment Work/Life Balance Digital Signage Data Warehouse Network Management Digital Work Health Private Cloud Shortcuts Mobile Management Cyber Monday Smart Tech Office Samsung Monitoring Solid State Drives Remote Work Streaming Processor Legislation Voice over Internet Protocol Employee-Employer Relationships Budget Payment Card Cooperation Service Level Agreement Tech Support Spyware Typing Compliance Hybrid Cloud Microsoft Excel Uninterrupted Power Supply Logistics Hotspot Internet Exlporer Troubleshooting Business Analysis SharePoint Electronic Medical Records Notifications Error Twitter Physical Security Emoji Point of Sale Ben McDonald shares Upgrades Gadget Printers Travel Crowdsourcing Botnet Personal Information Supercomputer CrashOverride Cortana 3D Printing Motion Sickness Staffing Machine Learning Administrator Processors Taxes Financial IT Budget Web Server what was your? Unsupported Software GPS Computer Repair Relocation IT Consultant Cameras Mobile Data Recovery Meetings How To Tracking Mobile Computing Regulation Cleaning Black Market CCTV Webcam Law Enforcement

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3