{"id":1149,"date":"2009-09-20T12:33:20","date_gmt":"2009-09-20T17:33:20","guid":{"rendered":"http:\/\/www.bspcn.com\/2009\/09\/20\/5-popular-facebook-scams-and-how-to-avoid-them\/"},"modified":"2010-05-31T07:24:00","modified_gmt":"2010-05-31T14:24:00","slug":"5-popular-facebook-scams-and-how-to-avoid-them","status":"publish","type":"post","link":"http:\/\/localhost\/wordpress\/2009\/09\/20\/5-popular-facebook-scams-and-how-to-avoid-them\/","title":{"rendered":"5 Popular Facebook Scams (and How to Avoid Them)"},"content":{"rendered":"

Written by Terrence O’Brien<\/a> <\/strong><\/p>\n

\n

\"\"<\/p>\n<\/div>\n

Just as bearded hipsters migrate from bar to bar in pursuit of young ladies to ogle, so too have scammers<\/a> and hackers followed their prey from MySpace to Facebook<\/a>. As a result, the social network<\/a> once deemed the “safe” option is now plagued by legions of 419 scammers<\/a>, phishers<\/a>, and peddlers of malware<\/a>.
\nFortunately, there are a few simple rules Facebookers can follow to stay safe: Never click on suspicious links from friends; use a service like
LongURL<\/a> before following any shortened links; and assume that anyone begging for money is up to no good. And if you do happen to fall victim to a scam, quickly alert your friends (to prevent spreading the damage), then alert Facebook administrators and, if it’s serious, law enforcement as well.
\nSince a reputable source once counseled that
knowing is half the battle<\/a>, here’s a rundown of the Facebook scams most demanding of your awareness and good judgment:<\/p>\n

\n

\"\"<\/p>\n<\/div>\n

1) The friendly 419 scam<\/a>:<\/strong><\/p>\n

The notorious 419 scams have sadly become ubiquitous on the Internet. While they began as e-mail cons, usually involving promises of a vast fortune from a Nigerian prince, they have morphed into a new and more sophisticated ploy that involves hijacking the Facebook account of a friend in order to fool kind souls into thinking they’re helping a pal. Thieves use an account to garner sympathy as they claim to be in desperate need of cash, often because they’ve been robbed or detained while traveling abroad. One duped Missouri woman wound up handing over $4,000<\/a> before she realized she’d been had.<\/p>\n

\n

\"\"<\/p>\n<\/div>\n

2) <\/strong>Hidden fee apps<\/strong><\/a>:<\/strong><\/p>\n

There are plenty of Facebook apps and quizzes<\/a> with questionable motives<\/a> and privacy policies<\/a>, but there are some that are outright scams. Take, for instance, the sad tale of Leanne Saylor<\/a>, who fell prey to scammers after taking a simple IQ quiz on the service. To receive her results, she was required to submit her cell phone number and wait for a text. When she didn’t receive anything, Saylor entered her phone number two more times. When she opened her next cell phone bill, she discovered three charges from the app, totaling a whopping $44. AT&T blocked future fees, but Saylor learned the hard way that she should never give out her cell phone number to strangers, much less strange apps.<\/p>\n

\n

\"\"<\/p>\n<\/div>\n

3) <\/strong>Fake login pages<\/strong><\/a>:<\/strong><\/p>\n

A particularly sneaky method of ensnaring Facebookers lies in the loads<\/a> of phishing<\/a> messages<\/a> that lead to convincing-but-fake versions of the Facebook login page. Typically, these spam e-mails are brief and contain a link, usually ending in “.im” or “.at.” (We received one that simply read, “Look at goodmall.be.”) Once you enter your e-mail and password to ‘log in,’ it’s game over; a hacker has control of your account and will quickly use it to perpetrate any one of the scams listed here. What’s worse, they’ll impersonate you to spread phishing e-mails to all of your friends.<\/p>\n

\n

\"\"<\/p>\n<\/div>\n

4) <\/strong>Malware links<\/strong><\/a>:<\/strong><\/p>\n

Once an account is hijacked, it can be used to deluge that account holder’s friends with messages containing links to malicious sites. It’s rough stuff. These poisonous software packages leave you vulnerable to the theft of even more data, including all the passwords, account numbers and credit card information you may have entered into your PC. Recently, a barrage of spam messages featuring a link to “CoooooL Video<\/a>” actually led to nothing but a nasty malware infection.<\/p>\n

\n

\"\"<\/p>\n<\/div>\n

5) <\/strong>Facebook apps that are malware<\/strong><\/a>:<\/strong><\/p>\n

Creating Facebook applications has become so easy that hackers have created apps with the sole aim of tricking you into handing over your personal data or Facebook password. Some versions impersonate one of the standard Facebook<\/a> features, like “Your Photos” and “Friend’s Gifts,” and send convincing notifications, like “someone has commented on your photo,” or so-and-so “has posted on your wall.” But clicking on them either leads to a fake login page, or a window asking for permission to access your Facebook account. These scams are particularly tough to spot because they mimic actual Facebook notifications. The only way to protect yourself is to look for tiny inconsistencies in the false apps (e.g., odd or incorrect icons, clunky wording and poor English usage). It seems your teacher wasn’t lying after all when she said learning grammar was important.<\/p>\n","protected":false},"excerpt":{"rendered":"

Written by Terrence O’Brien Just as bearded hipsters migrate from bar to bar in pursuit of young ladies to ogle, so too have scammers and hackers followed their prey from MySpace to Facebook. As a result, the social network once deemed the “safe” option is now plagued by legions of 419 scammers, phishers, and peddlers […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[],"tags":[],"_links":{"self":[{"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/posts\/1149"}],"collection":[{"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/comments?post=1149"}],"version-history":[{"count":1,"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/posts\/1149\/revisions"}],"predecessor-version":[{"id":1863,"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/posts\/1149\/revisions\/1863"}],"wp:attachment":[{"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/media?parent=1149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/categories?post=1149"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/tags?post=1149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}