website statistics

Spammers have switched to social media sites for spamming rather than e-mailing.
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading...

Everyday our e-mail accounts are filled with a lot of unwanted e-mails that we call junk emails or spam. Over the years email services have devised many hacks to detect and filter spam. And, spam has grown less effective due to breakthroughs in spam filtering techniques. Now, the spammers have switched to a new medium for spamming – the social media. The huge growth in the social media and immature protection techniques has lured the spammers exploit the loopholes.

Stop spam, Image Credit: vyatta4people.org

Many people in the past few months have become a victim of the spamming in different social media sites. Due to spammers’ activities, these victims are sometimes losing their faces to friends. Moreover, some victims’ business reputation has been already lost.

Michelle Espinoza, a resident of Santa Rosa Beach, FL, is a jewelry maker. She has become a victim of the spamming in a social networking site. She designed a pearl cuff bracelets and it was showed up on Pinterest, a site where users create virtual bulletin boards, grouping images in categories. For 10 days in April, anybody who clicked on the photo ended up watching pornography. Sometime it led the clickers downloading a virus unknowingly. For this, Espinoza has lost so many customers. But who knew her or had a little bit idea about her or her well-wishers had understood that Espinoza became a victim of spamming and notified her. When she asked about the issue to Pinterest, Pinterest mentioned that their engineers were actively working on the site to make it harder for fake or harmful content to get into the site.

On the other side, chief executive officer of Impermium Mark Risher said, “Social spam can be a lot more effective than e-mail spam. The bad guys are taking to this with great abandon”. According to him, spammers create as many as 40 percent of the accounts on social-media sites. About 8 percent of messages sent via social pages are spam. In addition, spammers use the sharing features on social sites to spread their messages. While clicking on a spammer’s link, it may ask you to “like” or “share” a page, or to allow an app to gain access to your profile.

It is true that social media sites are often poorly equipped to deal with such influx. To protect their sites from spammers, Facebook and Twitter hired programmers and security specialists. In January, Facebook sued advertising network Adscend Media because of sending unsolicited messages to Facebook users. By clicking on a link provided by the spammer, some users had done unwittingly “likejacking.” At least 280,214 users were tricked into interacting with spam. About 80 percent of Adscend’s monthly revenue of $1.2 million came from Facebook scams.

Another social networking site Twitter last month sued spam software makers Skootle and JL4 Web Solutions and official staffs. The company mentioned that they were responsible for spam that resulted in some users canceling accounts. But, Skootle denied the wrongdoing. JL4 hasn’t responded yet to the complaint.

If the spammers can attack Facebook, Twitter or Pimterest, no doubt any time they can attack other social media sites too. That means, we need to be very careful when using social networking sites.

Source : Businessweek

Buy Cheapest Related Product From Amazon.com


Firefox 13 Is Here With New Home Page And One-Click Fixes

Airtime – A New Venture By Napster Co-Founders Launches Today
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On June 6, 2012(4 years, 1 month ago.)

You May Also Like:

What Do You Think?

3 Responses

  1. Bloughmee Says:

    ” loosing their face to their friends. ”  Uh Yuh….do you mean “losing” you illiterate turd ?   Amazing that nobody at “TheTechJournal” can be bothered to copy-edit these posts before posting.  Pathetic.  I’m waiting for the you’re vs. your faux pas.  

    Posted on June 6th, 2012 at 11:01 AM

  2. Duncan Cabrera Says:

    The huge growth in the social media and immature protection techniques has lured.

    Posted on June 6th, 2012 at 12:30 PM

  3. The Tech Journal STAFF Says:

    Thanks for noticing the typographical error. We are also sorry for the frustration it might have caused. We are continually working for the betterment of TheTechJournal’s quality. We hope to find you beside us in this journey.

    Posted on June 7th, 2012 at 12:25 AM

Leave a Reply




Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.


Recent Search

Recent Tutorials

If you are trying to jailbreak iPhone, iPad or iPod on iOS 9.2 - 9.3.3 without using a computer or Apple ID, then check this video tutorial.
Pokemon Go users are complaining about the crashing and server issues. Check out the tutorial to solve error problems and thanks us later.
Turning off Wi-Fi Assist is a great way to save mobile data since it automatically starts using cellular data when Wi-Fi signal is poor .
If you want to secure your SIM card from others using it, then check out this tutorial to know how to set up the SIM Pin code on your iPhone.
CiderTV is a great alternative to control Apple TV from the Notification Center. Check out this tutorial to set up CiderTV on your iPhone.
Are you annoyed by the split screen mode on the iPhone 6 Plus or 6s Plus? Check out this quick tutorial to turn off split screen feature.
If you could not wait to installed the iOS 10 beta version on you iPhone and now struggling for the errors, then this tutorial is for you.
Siri might not understand the question you asked. But you can use Siri by editing the text that you asked & it will give an updated answer.
Perhaps, you are new Apple user and you might have no idea how to change name of your iPhone. Check out this tutorial to change the name.
Check out this tutorial to lock Android phone using PIN code, Password or Pattern. Following the easy steps, you can secure your smartphone.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook