ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media Scams and Everything You Should Know

Social Media Scams and Everything You Should Know

Social media has overtaken both the professional and personal aspects of online communication and connection, and while it might provide a considerable boon for both, it increases the odds of being contacted by scams and other malicious attempts. The best way to make sure you don’t fall prey to a scam is to remain vigilant. Today we’ll discuss the various scams that are created for use with social media.

Many of these might not seem to apply to a business’ social media presence, but we assure you that it’s worth considering. Furthermore, considering how easy it is to blend the two together, we urge you to limit how closely linked your personal and professional social media accounts are, as a breach on either end could put the other one in danger.

Gossip Scams

“See PHOTOS of the celebrity that secretly lives in your area!” “You’d never believe who DWAYNE JOHNSON spends his free time with!” “You’ll be SHOCKED to learn which beloved ‘90s sitcom cast formed a blood cult!”

Chances are you’ve seen some Facebook ads like those above or have seen someone you know sharing them on their news feed. People look at the lives of celebrities and try to live vicariously through their experiences, and it often leads them to falling prey to scams by downloading malware. Avoiding these scams is relatively simple, as long as you can avoid clicking on gossipy headlines. Besides, if you’re ever asked to download a program, it should be from the actual source, not a sketchy website that you’ve been redirected to.

Nigerian Scam/Stuck Abroad Scam

“Hello Dearest Friend, I am Prince Akinola. During the recent uprising in my country, my father was murdered in his sleep. To protect his riches, I seek a trustworthy Person to help me transfer 3 million US dollars into an account for a time. Helping me, you will be able to keep 35% of it to use as you see Fit. Please reply to me immediately with your name and phone number so I can leave this country and transfer the money to you.”

These are some of the more infamous scams, originally appearing in Nigeria and spreading worldwide. Instead of providing you with a percentage of a fortune, the victim has their banking credentials stolen, or they are asked to pay processing fees before a payment can be delivered.

“I’m so glad I got the chance to send this message. I’m overseas in Europe and my wallet was stolen! I need $1,300 to get home. Could you wire over the money for me?”

In this version of the scam, a hacker will take over someone’s account and spread a story of being stranded overseas, desperately in need of money so they can find a way home. In cases like this, verification of the story needs to happen, whether it’s from someone closer to this friend or from a family member.

Lottery Scams/Who Viewed Your Profile Scam/IQ Scam

“Congratulations! A gift card worth $1500 is reserved for you!”

While it would certainly be nice to win some money, you know what they say… if it’s too good to be true, it probably isn’t. Some of these scams will ask for contact information so they can charge data fees to you, while others will flat-out steal your banking credentials. It’s very important that you keep in mind that you can’t win a contest you haven’t entered.

“Want to know who’s been looking at your profile? Install this application to find out.”

This particular scam tries to use popularity and curiosity as a means to get users to install a malicious application. While it might be nice to have more people notice a post, remember that scammers often utilize these traits to their advantage.

“Your IQ evaluation is finished. We’ll need a few more details to calculate your score, including your age and phone number.”

These apps and plugins will offer to test your intelligence, which appeals to the average user’s curiosity about their IQ score. These might ask for your phone number or other information, which in turn creates expenses for the user.

Account Cancelled Scam

“We are writing you to confirm the account cancellation request that your submitted. To confirm or cancel this cancellation request, please link click below. Thank you, The Facebook Team”

Receiving a message about an account being cancelled might not seem like a suspicious thing to receive in your email but take a closer look. It might be a message from someone trying to steal your login credentials. Look for grammar and spelling errors in the message. After all, the real Facebook or Twitter has plenty of capital to hire editors and other professionals to ensure their messages are properly handled.

Photo of You Scam

“Oh my god! LOL is this actually a photo of you?”

Some scammers can replicate another user’s profile and attempt to scam others with a message indicating shock at the user being in a photo. The link will then provide the scammer with information about the user. Try not to click on links that don’t look right and consider changing your profile settings so that only those with a connection to you can send you a message in the first place.

Catfishing/Romance Scams

“Hey baby, I can’t wait to meet you, but I can’t quite swing the money for the ticket… could you send some cash to help me cover it? Looking forward to meeting in person.”

Romance in particular is a dangerous enabler for online scams. The Federal Trade Commission saw more than 21,000 reported romance scams in 2018 alone, and they cost a total of $143 million. The median loss to one of these scams in 2018 was around $2,600, more than seven times the median loss for any other fraud types.

If you think you’re being catfished, try to reverse engineer the profile of the person who is supposedly catfishing you to see if they are associated with multiple accounts. Furthermore, never send money to anyone who you haven’t met in person.

Utilizing social media in a secure fashion can be challenging, but it’s far from the only method of securing your business. For more ways to keep your company safe in an online environment, reach out to ClearView IT at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 06 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Small Business Upgrade Microsoft Office Smartphones Mobile Devices Network Managed IT Services Communication Data Recovery Quick Tips Productivity VoIP Users Social Media Mobile Device Automation Tech Term Windows 10 Business Continuity Facebook Covid-19 Disaster Recovery Passwords Holiday Windows 10 Apps Managed Service IT Support Browser Miscellaneous Cloud Computing Outsourced IT Remote Work Data Management Internet of Things Managed Service Provider Government Saving Money Operating System Gadgets Networking Windows Artificial Intelligence Workplace Strategy Managed IT services Blockchain Spam Remote Business Technology Information Mobile Device Management Bandwidth Encryption Server WiFi App Virtualization Office 365 Employee/Employer Relationship Budget History Apple Gmail Information Technology Office Two-factor Authentication BDR Wi-Fi Conferencing Cybercrime Health Analytics Access Control Big Data Data Security Save Money Remote Monitoring Hacker Employer-Employee Relationship IT Management Compliance Training Vendor Voice over Internet Protocol Cost Management Remote Computing Help Desk Hacking Document Management Patch Management Data loss Project Management Money Search... Customer Service Best Practice BYOD Unified Threat Management Firewall Computing Retail Augmented Reality Alert Vendor Management Applications Hard Drive Word Mobile Office Hiring/Firing IBM Vulnerabilities Outlook Website Managed Services Password Legal Data storage Antivirus Laptop Windows 11 Maintenance Mobile Computing Travel Virtual Reality Social Engineering Cryptocurrency Marketing Black Market Running Cable Cleaning Websites Sports Social Robot Mobility SaaS Storage DDoS Meetings Data Breach Google Maps Scam iPhone Education Cortana Remote Workers Content Filtering User VPN Twitter Windows 7 Free Resource Monitoring Router Update Healthcare Law Enforcement End of Support Printer How To The Internet of Things Chrome YouTube Paperless Office Administration Wireless Technology eWaste Google Docs Presentation Physical Security Bluetooth Excel Specifications Employees Distributed Denial of Service Downtime Avoiding Downtime Office Tips IT Consultant Safety Private Cloud Memory Holidays Customer Relationship Management Start Menu Downloads Virtual Desktop Co-Managed IT Computer Care Cooperation Virtual Assistant Entertainment Experience Vulnerability Video Conferencing Politics Machine Learning Settings Virtual Machines Software as a Service Computer Repair Data Protection Solid State Drive Processor Professional Services Disaster Chromebook Drones HIPAA Lithium-ion battery Automobile Managed Services Provider Tech Terms Virtual Private Network Multi-factor Authentication Processors How To Managed IT Microchip Digital Flexibility Current Events Saving Time Solutions Taxes Identity Theft Computers Bitcoin Hack Notifications Integration Images 101 Unified Communications PowerPoint Display Telephone File Sharing Keyboard Browsers Text Messaging Nanotechnology Proactive IT AI Administrator Trend Micro Redundancy Electronic Health Records Hard Drives Google Play Bring Your Own Device Transportation Upload Software License Electronic Payment Digital Security Cameras Cache Wasting Time intranet Social Network Workers Shortcut Data Analysis Modem Screen Reader Music Unified Threat Management Wireless eCommerce Videos Phone System Surveillance Heating/Cooling Security Cameras Environment Trends Mobile Technology Devices Supply Chain Printing Windows XP Managing Costs CCTV Social Networking Customer Resource management Fileless Malware SSID Tip of the week Touchscreen Botnet Media Emergency Development Rental Service Employer/Employee Relationships Computer Malfunction Gamification Micrsooft Company Culture Regulations Workplace Vendor Mangement Virtual Machine Telephone System Flash Optimization Samsung Directions Telephone Systems Backup and Disaster Recovery Business Growth Reviews Computer Accessories 2FA Uninterrupted Power Supply Teamwork Webcam Content Desktop Accountants Scams Data Storage Business Mangement Hypervisor Electronic Medical Records Tablets Banking Medical IT Database Google Wallet Shopping Staffing Paperless IP Address Messenger SQL Server Deep Learning Equifax Cables Google Calendar PCI DSS Licensing Supercomputer Health IT Humor Business Metrics Tactics Hosted Solution Hard Drive Disposal Gig Economy Virus Business Communications Internet Service Provider Books Azure Motion Sickness Username Language Startup Society Point of Sale Freedom of Information Comparison Troubleshooting Regulations Compliance Google Drive Managed IT Service Memes Competition Navigation Addiction email scam Recovery Visible Light Communication Human Resources Shortcuts Knowledge Net Neutrality Corporate Profile Reading Monitors Mobile Security Legislation Windows 8 News Television LiFi Financial Data Telephony Employer Employee Relationship Entrepreneur User Tip Documents IT Cabling Application Evernote Network Management Risk Management Advertising Google Apps Be Proactive Tablet Relocation G Suite Business Intelligence Displays Tracking Proxy Server Work/Life Balance Emails Tech Support Fake News Mouse Business Owner Telework VoIP Securty Communitications Microsoft 365 Service Level Agreement Computing Infrastructure Smartwatch Device security Workplace Strategies Procurement Domains Web Server Management Digital Payment Wireless Headphones Microsoft Excel SharePoint FinTech In Internet of Things IT Assessment Worker Tech Hacks Going Green Network Congestion Business Cards CES Supply Chain Management Access Reliable Computing Value Error Writing Public Cloud Bookmark Inbound Marketing Organization Time Management Cyber security Smart Devices Public Speaking Term Download Piracy HTML Smart Technology Audit Streaming Media Remote Working Spyware Scalability

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?