Check out these telltale characteristics of the phony Facebook 'Friend,' courtesy of Barracuda Networks.
Want to know who your real Facebook Friends are and are not?
Turns out there are some common characteristics of the fake Friend, according to new data revealed Thursday by Barracuda Networks. For one thing, it's likely a female: Some 97% of fakes pose as women, while about 40% of real Facebook accounts are women, said Paul Judge, chief research officer at Barracuda, here at the Kaspersky Lab Security Analyst Summit in Cancun, Mexico.
"Fake users can take over your account, spam your wall and feeds," Judge said. Many of these profiles are automatically generated, aimed at making money off of affiliate campaigns or spam-related scams: They spread phony ad campaigns for free gift cards from Starbucks or other trusted brands, he said.
A typical Facebook fake profile starts out by joining a group, such as a college network, in a large metropolitan area (think: population) and then shoots out friend requests to its members. They are all about luring new friends, and Barracuda has gathered some of the common traits of these fakes, such as their profile information and activities.
They hedge their bets: For example, 58% of fake Facebook accounts say they are interested in both men and women, while only about 6% of legitimate accounts say the same. In addition, phony profiles tend to stand out due to the sheer volume of their "Friends." On average, they boast 726 Facebook friends, while real users have about 130 Friends on the social network. Nearly 70% of the posers claim to have attended college, while about 40% of legitimate users' profiles include college educations.
There's plenty of evidence of automated generation of these fake profiles, too.
It's no longer a matter of if you get hacked, but when. In this special retrospective of news coverage, Monitoring Tools And Logs Make All The Difference, Dark Reading takes a look at ways to measure your security posture and the challenges that lie ahead with the emerging threat landscape. (Free registration required.)
Published: 2015-03-29 Multiple buffer overflows in pbm212030 allow remote attackers to cause a denial of service (crash) or possible execute arbitrary code via a crafted PBM image, related to (1) stream line data, which triggers a heap-based buffer overflow, or (2) vectors related to an "internal intermediate heap-based ...
Published: 2015-03-29 Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integration Engine (NIE) 5xxx-x, and NxE8500, allows remote attackers to read pa...
Published: 2015-03-29 Unrestricted file upload vulnerability in unspecified web services in Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integratio...
Published: 2015-03-29 Stack-based buffer overflow in the PmBase64Decode function in an unspecified demonstration application in MICROSYS PROMOTIC stable before 8.2.19 and PROMOTIC development before 8.3.2 allows remote attackers to execute arbitrary code by providing a large amount of data.