SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
It’s a bird! It’s a plane.
  No, it’s our Social Scam Infograph.

             Helps you understand the
        dynamics of online social interactions.


 Sheds light on the psychological factors
exploited by social engineering techniques.



         Reveals the internal mechanisms of
                online social scams.
Some apps provide a way of interacting with your friends
and visitors in ways that the platform you are using does                   The App
not allow by default and which copy real-life gestures                      Promise
which border the illicit. We’ve got apps that promise to
become your eyes and spy on people who drop by.                              Land

           math                         Other apps
          whizzes                                            detective apps
         (they always
                                       populate the               (promise
             count                    virtual world         to dig up who knows
          something)                  as busy doers             what secret)
                                         of things:
      artsy apps
   (ready to help you                                                  errand boy
       make your                  fortune tellers and                 apps (they’ll take
 Facebook home more             horoscope readers, etc.               your gifts and best
       pleasant)                                                        wishes to your
                                                                           friends)

         Just as in the real world, we’ve got the good and the bad guys.
                          How do you tell the difference?
profile

Tricky
            34.7%
                       insights (“see
                       who viewed your



                                         16,2%
                       profile/ who               social game
 app                   deleted you”,
                       “my profile
                       stalker”, etc.)
                                                 bonuses
                                                 (FarmVille,
                                                 CityVille, etc.)
                                                                                   shocking
                                                                                   images ( “this
 baits
                                                                       14,1%
                                                                                   girl killed
                                                                                   herself after…”,
                                                                                   “you will never
                                                                                   text again after
                 inexistent                                                        seeing this”,
                 Facebook                                                          etc.)
                 features ( “my


         12,5%
                 first status”, “how
                 long have you been
                 logged in to                versions


                                      8,4%
                 facebook”, “who             of famous
                 poked me the                games (Super


                                                                       5,7%
                 most”, a dislike            Mario, The                           free gadgets
                 button, etc.)               Sims, World of
                                             Warcraft, etc.)                      (iPhones, iPads,
                                                                                  etc.)




         4,3%     malware



                                                  4,1%              Other types of
                                                                    less popular threats
This is definitely not cloud number 9, or, for
   The            that matter any other cloud you would want your
              social account to be in or on. We’ve put together
Spam word     a list of words that are most likely to be appear
               in scam messages that flood social
  cloud     networks. This is a true dictionary of
             human curiosity triggers.
The
Scam Phrase
   cloud
                         is this you

                what are you doing in this video


   when/ after i saw this ….
                       I’ve just found out x about me. Check yours

    how could he/she               just found out that

         how can someone do x?
                                       i cannot believe
That’s                and                 and
                      that’s              that’s
  Ma
                      Pa                 Auntie!




    To say that scams are social animals would
  not be that far-fetched. The same scam usually
spreads through several URLs that come in waves.
    How can you tell it’s a wave? If several URLs
   lead to applications that have almost identical
 functionalities, spread through approximately the
same message, within a short period of time, then
                    that’s a wave.
The process whereby posted content is LIKED without the
  user’s consent or knowledge. Simply put, after clicking a
  link (to view the content behind it) you find that a message                                  Likejacking
  is automatically posted on your Wall, in your name, saying
  that you LIKED that link.



 “GRAPHIC VIDEO.. Japan                       “OMG! Look What happens
  Tsunami Sends WHALE                           when FATHER catches
SMashing Into A Building”                    DAUGHTER on her WEBCAM”



           Your friend                                         you are redirected          behind the video
                                        you click
        apparently liked                                        to what seems to           there’s a hidden
                                         the link
        a link to a video                                           be a video                like button




                            an automatic post on your wall indicates                 you unwillingly endorse that
                              that you liked that link, although you                link and your friends get into
                               didn’t actually click any like button                   the loop after clicking it
A case                                                                               Top
 study                                                    Busiest Scam                 5
                                                          Clicking Countries*
                 See who viewed your profile.                                    *sample is the BitDefender
                                                                                           Safego user base
                                                                                    *only scams distributed
  According to Bitdefender Safego data, this scam
  spread through approximately 286 unique URLs               1. USA               through goo.gl shortened
                                                                                                       links

               per wave, on the average.
Variations in the message used in the propagation of
    the scam: view/viewers, peek, stalk/stalker,
                                                                                2. India
        see who has viewed/who stalks you,
            who was your top stalker, etc.
These URLs led to 14 unique Facebook applications
                                          applications,
                                                              3. UK
   on the average. (apps.facebook.com/app_uniq).
    Based on the data provided by url shortening
  services that offer statistics on shortened links,
                                                                            4. Canada
                                       clicks
     these URLs gathered 1,411,743 clicks. The
      distribution spike per URL is of 34 hours
                                           hours.
                                                          5. Australia
Share safely with BitDefender safego:

http://apps.facebook.com/bd-safego/

Más contenido relacionado

Más de Bitdefender

Suita 2010 de solutii BitDefender
Suita 2010 de solutii BitDefenderSuita 2010 de solutii BitDefender
Suita 2010 de solutii BitDefenderBitdefender
 
H1 2009 Malware And Spam Review1
H1 2009 Malware And Spam Review1H1 2009 Malware And Spam Review1
H1 2009 Malware And Spam Review1Bitdefender
 
Conferinta Securitate Web 2.0
Conferinta Securitate Web 2.0Conferinta Securitate Web 2.0
Conferinta Securitate Web 2.0Bitdefender
 
Atacurile de phishing in Romania si in strainatate
Atacurile de phishing in Romania si in strainatateAtacurile de phishing in Romania si in strainatate
Atacurile de phishing in Romania si in strainatateBitdefender
 
Gama De Produse BitDefender 2009
Gama De Produse BitDefender 2009Gama De Produse BitDefender 2009
Gama De Produse BitDefender 2009Bitdefender
 
Do Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern RecognitionDo Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern RecognitionBitdefender
 

Más de Bitdefender (8)

Suita 2010 de solutii BitDefender
Suita 2010 de solutii BitDefenderSuita 2010 de solutii BitDefender
Suita 2010 de solutii BitDefender
 
H1 2009 Malware And Spam Review1
H1 2009 Malware And Spam Review1H1 2009 Malware And Spam Review1
H1 2009 Malware And Spam Review1
 
Conferinta Securitate Web 2.0
Conferinta Securitate Web 2.0Conferinta Securitate Web 2.0
Conferinta Securitate Web 2.0
 
Atacurile de phishing in Romania si in strainatate
Atacurile de phishing in Romania si in strainatateAtacurile de phishing in Romania si in strainatate
Atacurile de phishing in Romania si in strainatate
 
Gama De Produse BitDefender 2009
Gama De Produse BitDefender 2009Gama De Produse BitDefender 2009
Gama De Produse BitDefender 2009
 
Spam Clustering
Spam ClusteringSpam Clustering
Spam Clustering
 
Do Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern RecognitionDo Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern Recognition
 
Phishing101
Phishing101Phishing101
Phishing101
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

BitDefender safego Infographic Out and About

  • 1. It’s a bird! It’s a plane. No, it’s our Social Scam Infograph. Helps you understand the dynamics of online social interactions. Sheds light on the psychological factors exploited by social engineering techniques. Reveals the internal mechanisms of online social scams.
  • 2. Some apps provide a way of interacting with your friends and visitors in ways that the platform you are using does The App not allow by default and which copy real-life gestures Promise which border the illicit. We’ve got apps that promise to become your eyes and spy on people who drop by. Land math Other apps whizzes detective apps (they always populate the (promise count virtual world to dig up who knows something) as busy doers what secret) of things: artsy apps (ready to help you errand boy make your fortune tellers and apps (they’ll take Facebook home more horoscope readers, etc. your gifts and best pleasant) wishes to your friends) Just as in the real world, we’ve got the good and the bad guys. How do you tell the difference?
  • 3. profile Tricky 34.7% insights (“see who viewed your 16,2% profile/ who social game app deleted you”, “my profile stalker”, etc.) bonuses (FarmVille, CityVille, etc.) shocking images ( “this baits 14,1% girl killed herself after…”, “you will never text again after inexistent seeing this”, Facebook etc.) features ( “my 12,5% first status”, “how long have you been logged in to versions 8,4% facebook”, “who of famous poked me the games (Super 5,7% most”, a dislike Mario, The free gadgets button, etc.) Sims, World of Warcraft, etc.) (iPhones, iPads, etc.) 4,3% malware 4,1% Other types of less popular threats
  • 4. This is definitely not cloud number 9, or, for The that matter any other cloud you would want your social account to be in or on. We’ve put together Spam word a list of words that are most likely to be appear in scam messages that flood social cloud networks. This is a true dictionary of human curiosity triggers.
  • 5. The Scam Phrase cloud is this you what are you doing in this video when/ after i saw this …. I’ve just found out x about me. Check yours how could he/she just found out that how can someone do x? i cannot believe
  • 6. That’s and and that’s that’s Ma Pa Auntie! To say that scams are social animals would not be that far-fetched. The same scam usually spreads through several URLs that come in waves. How can you tell it’s a wave? If several URLs lead to applications that have almost identical functionalities, spread through approximately the same message, within a short period of time, then that’s a wave.
  • 7. The process whereby posted content is LIKED without the user’s consent or knowledge. Simply put, after clicking a link (to view the content behind it) you find that a message Likejacking is automatically posted on your Wall, in your name, saying that you LIKED that link. “GRAPHIC VIDEO.. Japan “OMG! Look What happens Tsunami Sends WHALE when FATHER catches SMashing Into A Building” DAUGHTER on her WEBCAM” Your friend you are redirected behind the video you click apparently liked to what seems to there’s a hidden the link a link to a video be a video like button an automatic post on your wall indicates you unwillingly endorse that that you liked that link, although you link and your friends get into didn’t actually click any like button the loop after clicking it
  • 8. A case Top study Busiest Scam 5 Clicking Countries* See who viewed your profile. *sample is the BitDefender Safego user base *only scams distributed According to Bitdefender Safego data, this scam spread through approximately 286 unique URLs 1. USA through goo.gl shortened links per wave, on the average. Variations in the message used in the propagation of the scam: view/viewers, peek, stalk/stalker, 2. India see who has viewed/who stalks you, who was your top stalker, etc. These URLs led to 14 unique Facebook applications applications, 3. UK on the average. (apps.facebook.com/app_uniq). Based on the data provided by url shortening services that offer statistics on shortened links, 4. Canada clicks these URLs gathered 1,411,743 clicks. The distribution spike per URL is of 34 hours hours. 5. Australia
  • 9. Share safely with BitDefender safego: http://apps.facebook.com/bd-safego/