Feeds

Rogue Twitter counter app punts survey scam

#duhhhh

Beginner's guide to SSL certificates

A rogue application ultimately designed to punt a survey scam began spreading rapidly on Twitter on Tuesday.

Follow Finder 332 promises to provide users with information on who might have "unfollowed" them (unsubscribed from their Twitter feed). In reality it does nothing but offer up a worthless survey that falsely promises lavish prizes for completing a questionnaire, earning the originators of the scam money in the process from unscrupulous marketing firms.

Scams of this type have been endemic on Facebook for years but are now moving onto Twitter. This particular scam uses hashtags featuring trending terms, a tactic designed to give scam messages from victims maximum exposure by reaching not only their friends but anyone following hot topics of conversation.

A full write-up of the scam can be found in a blog post by Sophos here.

Survey scams take various themes and use various lures. Popular examples in the past have falsely offered Facebook unlike buttons or various strains of ostensibly salacious or bizarre content (eg a supposed amateur grumble flick featuring Charlie Sheen).

Other lures have been based around upcoming video games: spam messages on Twitter this week related to the upcoming Portal 2 game lead onto either survey scams or supposed game cracks that probably come loaded with malware. The lures look to be auto-generated by bots and feature random content, some of which refers to cake. But, as GFI Software researcher Chris Boyd explains, "The cake is a lie". ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?