Protect Yourself From Social Media Scams

Protect Yourself From Social Media Scams

In addition to protecting yourself against hackers, however, you need to guard against scammers who target social media users. Here are eight ways to avoid scams on social media:

1. Watch out for scam giveaways, contests, and surveys.

Criminals sometimes offer “free gift cards” or “amazing discount coupons” under the guise of bringing business to a particular venue, or offer some reward in exchange for completing a survey. These are scams used to either gain access to your social media account information–if, for example, you need to authorize a Facebook app to access your account to win the prize–or to collect personal information, both of which will ultimately be used for nefarious purposes. One telltale sign of trouble is when a survey, contest, or giveaway is being advertised solely via social media posts, and does not appear on the website or social media account/page of the party associated with the reward, or on those of any other legitimate party. Don’t fall prey to these scams–and please don’t spread them by sharing such posts with others.

2. Beware, make sure not to connect with fake people.

Criminals often create accounts for nonexistent people in order to connect with real people and then exploit their contacts, or use the information in victims’ private posts to social engineer the victims’ co-workers or friends. For a full description on ways to detect fake LinkedIn accounts, please see the article “How to Protect Yourself From LinkedIn-Based Scams.” Many of the recommendations in that article apply to Facebook and other social media platforms as well. Of course, on Facebook it is also important not to accept friend requests from unknown parties.

3. Beware of connection requests from impersonation accounts.

Before accepting a friend request on Facebook, or a connection request on LinkedIn, from someone you ostensibly know, check that the account actually belongs to that person. Criminals sometimes set up fake accounts using publicly available photos of people. I have, more than once, been impersonated in such a fashion on multiple social media platforms. To help determine if an account is real, see how many friends or contacts the person requesting the connection has in common with you and consider if that number makes sense, see how far back the posts in the account go, etc.

4. Watch out for posts from impersonation accounts.

Crooks have been known to join conversations on Facebook or Twitter by impersonating a party in the conversation. For example, on a business’s Facebook page on which someone has posted a question, a criminal may answer it using an account impersonating the business or one of its key employees. The same is true with tweets to customer service departments or the like. If a business or individual is Verified, all responses from a non-verified account should obviously be treated with suspicion. Be especially wary of links possibly posted by impersonation accounts–sometimes criminals will respond to a customer service request and advise the user to visit a particular website or download some program. Don’t fall prey to such a scam. More generally, never take a risky action on the basis of a social media post or comment–if you have a problem involving something sensitive, contact the business through a venue that others cannot easily listen in to or join; send an email, or even better, make a phone call.

5. Guard against fake live stream and movie offers.

Scammers sometimes offer fake live streams of popular events or movies. The links from these posts often go to websites that distribute malware; or that request a credit card, stating it won’t be charged until after a free trial (of course, there won’t be one–the crooks just want to steal your credit card details); or that ask for personal information, which will then be used either for identity theft or social engineering. Live streams of events should always be accessed on the pages of the events, and movies should always be accessed from parties that legitimately are authorized to provide them.

6. Avoid clickbait.

Whether claiming to offer a scoop about some breaking celebrity news, previously unseen salacious photos of some celebrity, or some secret information that can help you make quick money through some stock investment, criminals have been known to post links that attract attention; the links, of course, often direct to malicious websites similar to those used in the giveaway, contest, and survey scams.

7. Avoid oversharing.

Most people overshare. If in doubt, don’t post. Oversharing can give criminals the information they need to social engineer you into falling prey to one of the aforementioned six attacks, or assist criminals in tricking your co-workers or friends into falling victim to such scams.

8. Secure your social media accounts.

If something does go wrong, you want to make sure that scammers cannot easily gain control of your social media accounts and use them to attack your friends and colleagues. A major social media account breach would be embarrassing, to say the least.

Share this now!

3 Comments


  1. Great Info…. thanks NexxyTech!

    Reply

  2. Imagine the social media developers like facebook and twitter cnt even manage to protect us “the users”. Its a big shame, and its just crazy coz we just cnt do without these social networks

    Reply

  3. Newton, we are the ones to protect ourselves! Evry day, new tech evolves to steal information from social media users, thank you Nexxytech for these steps to protect ourselves on social media

    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *