Feeds

WHY would survey-slingers give YOU a free $1,500 Google Glass?

34bangbang_fun@imail.ru wants sir/madam as a beta tester. Oh ok, carry on then

5 things you didn’t know about cloud backup

Credulous punters' desire to get their hands on Google's new Project Glass head-mounted display is already being used against them by cyberscammers.

The Chocolate Factory's augmented reality glasses may be still at the prototype stage, but cybercrooks have latched onto the recent release of a demo video with their own cyber-chaff, combined with the black arts of search engine result poisoning.

As a result the top results for the search term “free Google glasses” is an eye-catching YouTube link with the title [{FREE}] Google Project Glass [[FREE GOOGLE GLASSES].

The video was copied from the original Google Glass YouTube advertisement but features links to a dodgy site in the comments. The site supposedly offers information on how "it’s possible to get similar glasses for free!" or to become a beta tester for Google Glass.

In reality the links on the scamvertised site put users through the hoops of a survey scam, which attempt to trick prospective marks into signing up to deceptively marketing premium rate phone services, Trend Micro warns.

The security firm has added website associated with the scam to its URL blacklist. It notes the re-appearance of similar scams is more than likely, so users should be cautious about implausibly generous offers. the concern that Google Glass is likely to become a theme of survey scams, replacing bogus offers of free iPads as a staple of this type of short con in the process.

"Currently, there’s no way for users to get Google Glass," Ruby Santos, a fraud analyst at Trend Micro warns in a blog post. "Preorders were only accepted at Google I/O 2012 more than eight months ago, and a campaign asking for ways to use Glass creatively just ended.

"We advise users to avoid clicking on unfamiliar links, particularly those that offer too-good-to-be-true deals. (Considering the pre-order cost $1,500, this would count as too-good-to-be-true.). Users should likewise be cautious of schemes that may abuse the #IfIhadGlass campaign." ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
JLaw, Kate Upton exposed in celeb nude pics hack
100 women victimised as Apple iCloud accounts reportedly popped
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.