active-technologies.com - Network Computer Services - Web Page Design and Hosting - QuickBooks & Bookkeeping Services            
  • Login

Network & Computer Services

  • Full Network - Computer Maintenance - Repair
  • Cloud - Servers - Desktops - Mobile
  • New Equipment Roll-outs
  • System Upgrade - Lifecycle Management
  • Windows - Linux - Office - LibreOffice
  • Backup Systems
  • WiFI & Barcode
  • Security - AntiVirus - Malware
  • System Design - Planning - Training
  • Purchase Equipment At Cost Through Us
  • On-site and On-line Service Service



Web Page Design & Optimization

  1. Drive Customers To Your Business
  2. Web Hosting and Maintenance
  3. Web and Mobile Web Sites
  4. Wordpress Customization
  5. Drupal CMS Customization
  6. Organic Search Engine Optimization (SEO)
  7. Local Search Engine Optimization (SEO)
  8. Website Re-Design and Intranets
  9. Online Shopping Carts & Catalogs
  10. Web Analytics and Reporting

QuickBooks & Bookkeeping Services

  • Quickbooks Online Certified
  • Quickbooks Desktop MultiUser
  • Building Construction Job Costing
  • Landscaping - Cleaning Services
  • Point of Sale and Warehousing
  • Installation Upgrades Support
  • Inventory
  • Payroll
  • Custom Reporting
  • 12+ Years Experience!

  • Home
  • About Us
  • Projects
  • Legalease
  • Green Policy
  • Recommendations
  • CIM Manufacturing Demo
  • Contact Us

You are here

Home | Stop annoying Internet videos from autoplaying

Services

  • What We Do
  • Web Page Design
  • Mobile Web
  • Web Hosting
  • Identity Management
  • Search Optimization
  • Content Manager
  • Computer Repair
  • Network Service
  • Backup System
  • Network Assessment
  • Disaster Recovery
  • Data Recovery
  • Technology Planning
  • Technology Partner
  • AntiVirus
  • Quickbooks

Navigation

  • Chaos Tools AJAX Demo
  • Forums
  • Recent content

Identity Theft Farcing overtakes Phishing

Submitted by gma on Mon, 08/11/2014 - 06:44

Photo

(Rob hyrons @ Fotolia.com) It was only a matter of time before scammers discovered social media. To them, email phishing scams are so 2009. Really aggressive identity thieves are now using social media sites like Facebook, Twitter and LinkedIn to ensnare victims. It turns out it's easier and a lot more lucrative.

Social media uses are always getting friend requests. Most often it's someone from the user's circle of friends. But getting a friend request from a friend-of-a-friend is not uncommon.

Assuming that person is who they say they are, without confirming it, is dangerous, says Arun Vishwanath, associate professor of communication at the University of Buffalo. You could fall victim to what's being called “farcing,” exposing dozens of your friends and contacts for good measure.

“Farcing takes place on popular social media platforms like Facebook, Twitter, LinkedIn and Google Plus and has been used for online bullying, identity theft, organizational espionage, child pornography and even burglary,” said Vishwanath.

Wealth of information

Consider all the information that is available to a “friend.” It's enough to make a scammer hyperventilate. Once accepted as a friend, the scammer would have access to your name, your nicknames and the names of friends and relatives.

Chances are he would learn what schools you attended and where you have worked. He might even learn your address, pet’s name, favorite vacation sites plus when you’re leaving and how long you’ll be gone. The list is almost endless and all of it is valuable to someone trying to steal your identity.

Vishwanath got the idea for a study of the phenomenon from a local crime story in the Buffalo area. He says a substitute teacher created a false identity and fake Facebook profile in which he pretended to be a female student. He allegedly used that identity to entice minors — some of whom were his students — to send him explicit sexual photographs. He is now serving 30 years in prison.

But people who want more than mere sexual titillation have grabbed onto social media as a means to pry sensitive information from unsuspecting victims – information that can be used to take out loans and clean out bank accounts.

Testing his theory

PhotoTo prove his point Vishwanath set up a simulated farcing experiment on Facebook and watched it unfurl. He created 4 fake profiles, each with different levels of information attached to them. For example, some had photos and other friends, some didn't.

He next recruited 150 Facebook users and contacted them with friend requests. One in 5 agreed with the initial friend request. Another 13% of that group agreed to provide the new “friend” with additional information about themselves when he asked. That's what he calls Stage 2 of a farcing attack.

“A motivated farcer can go on to the second stage, requesting more information directly from the victim by using messaging functions within the social media platform,” Vishwanath said. “Messages can be crafted to take advantage of the asymmetries between the information mined from the victim’s page and the deceptive intent of the phisher.”

Protecting yourself

One obvious way to protect yourself, he says, is to be much more careful when you make friending decisions — phony, even felonious, characters will present themselves as great new friend possibilities. Only friend people you actually know. Another way is to limit the amount and types of personal information you share on social media sites.

“These scams are on the rise and will continue to increase with the popularity of social media, exponentially increasing the number of farcing victims worldwide,” Vishwanath said.

The Identity Theft Resource Center (ITRC) has conducted a study of Facebook users, assessing their awareness of the farcing threat. The results were not encouraging.

The ITRC study found that more users tended to be concerned and aware of identity theft related to Facebook, they did not always act in accordance with such concerns. Consumers still tend to believe that financial harm cannot be caused by Facebook usage, the report concluded.

“As our world transforms more and more into a cyber environment, social networking becomes a larger part of our lives,” said Nikki Junker, Social Media Coordinator for the ITRC. “Because of this, it is important to understand how social networking users comprehend the safety risks while engaging on such sites.”

‹ IT security issues shift as data moves to cloud up Identity Theft Seven Common Mistakes ›
  • Printer-friendly version
  • Log in to post comments
  • 2708 reads

News

  • News

References

  • Thunderbird
  • Outlook
  • Excel
  • Word
  • Access
  • General
  • Open Source
  • Mobile
  • Security
  • ShareWare
  • Site map
  • SEO News/Tips
  • Social Media

Search form

Copyright © 2004-2021 Active Technologies, LLC
Network Computer - Web Services - Quickbooks Provider
(Powered by active-technologies.com)

Search engine optimization