The internet is a great place to do almost anything: make connections, share stories, shop, or run a business. But there’s a risk associated with using the internet, too. You can be the victim of scams designed to gather your personal information, banking information, or anything else you put on the internet. Even when you think your information is safe, there’s no way to be completely sure who has access to it now—or who will gain access to it later. [Read more…]
Some things are just too juicy not to Tweet or re-Tweet. There is the thrill of thinking that one is the first or at least among the first to tell the world about something that seems monumentally important at the moment. Then there is the chance of becoming somewhat famous on twitter for a couple of hours, days or weeks. And if you’re an online traffic junkie, well, nothing beats the stats of a well crafted post launched at the right time — it’s like lighting up a huge pile of kindling.
It would be great if it turned out that your Tweet or re-Tweet was actually spot on, but what if you end up unknowingly passing off something that is not only false but malicious as well?
With Apple’s new iTunes-based social network Ping skyrocketing past 1 million users in its first two days, it was perhaps inevitable that it come strongly across the radar of hackers, spammers, and scammers. In fact, it took less than 24 hours for the first wave to spam to appear. Now the same problems that have long plagued other popular networks like Facebook and Twitter have taken root in Ping.
The million dollar question is: how effectively, and quickly, can Apple not only eradicate existing spam, but prevent future spam from occurring?
According to eSecurity Planet, Bradley Anstis of M86 Security suggests Apple could begin by effectively disabling links in comments, since comments are the offending medium. “It would be too much to manage comment approvals, but implementing some form of automation to strip out links from comments is a good starting point,” he said. [Read more…]
Personalities on Twitter are being hijacked to spread spam, scams and malware – look out! [Read more…]
One of the best aspects of the Twitter toolset is the fact the team allowed external programmers access to the service so that 3rd party applications and tools could be created. The downside of course is that not everyone has end users best interests at heart, and therefore there are trojan tools out there aiming just to grab your user account details for their own nasty ends … [Read more…]
I’m working on my annual Things I Want Gone from the Web article and I’ve personally designated this “The Year of Original Content.” We’re done playing around with feed scraping and autoblogging.
The blog echo chamber effect of someone blockquoting and linking the same content as a recommendation, echoing through the web without original content, is a beginner’s mistake. Don’t do it. Always add your original voice and content to your recommendations, telling your readers why it is important to leave this blog and go to another, then come back for more.
Google took action to penalize duplicate content within a site and between sites, and added bonus points for original and unique, appropriate and relevant keywords around links, especially link lists, rewarding original content providers with nicer PageRank scores. Similar actions are being taken by other major search engines, directories, and legitimate content aggregators.
As a serious blogger, you’ve learned the lesson and stay focused on creating original content. You link to other people’s content appropriately, taking care to protect their copyrights and not confuse your reader’s, putting other people’s content in blockquotes with clearly indicated links and credits.
For scammers, scrapers, and plagiarists, other people’s content has turned into a major money-maker as they use other people’s content for financial gain and misdirection. [Read more…]
With the line between a legit blog and scam blog getting harder to detect, how do you really know when the blog you are reading is a scam blog? As part of this ongoing series on blog scams, we’ve covered how blog scams are growing and the impact on the economy and job market for stay-at-home workers. Learning to tell the difference between a legit blog and a scam blog is becoming more and more important as the work force moves online looking for jobs.
You begin the process of detection of a scam blog by checking the facts. I covered a lot of information previously on how to check the facts in:
- Web Browser Guide: Scams, Hoaxes, Rumor Mills, and Online Trash – Check the Facts
- Blogging Resources and Sources to Help You Blog
- Blog Resources: Researching the Research, Finding the Facts, and Seeking Supporting Evidence
Some of the sites I recommend you use to check your facts when it comes to the hoaxes, scams, and snake oil claims some blogs can make include: [Read more…]
The WebWatch’s ‘Look Before You Click’ Campaign was created with a grant from the New York State Office of Attorney General and uses a cartoon animation and satrical musical verse to educate Internet users about Internet fraud that comes in through email, blogs, and websites. [Read more…]
In Flipping Blog Scams MMO Niche is Full of Jerks, Garry Conn takes on the scams associated with Make Money Online Niches (MMON) and reselling domain names and sites:
It takes a lot to get me upset; however, when I witness people within the MMO niche that act like a bunch of middle school kids making fun of the ugly girl who dropped her books in the hall it pisses me off and without a doubt shows me the true colors of many of the individuals out here. Not only do these people scam, take money and trick their readers but now they make fun of them when they get the courage to step foot into the MMO arena.
While Garry is talking about the quick flipping of MMON blogs, where people buy good named domains, launch it with a nice blog, manipulate the stats, then resell it leading the buyer on. [Read more…]
While I can excuse those who overhype their Plugins, Themes, and contests on their blog, I have a hard time forgiving those who use their blogs as scams. As the blog platform becomes more ubiquitous and easier to use with a lot of automatic content generating tools and comment and trackback spam tools, blogs are being used more and more for the dark side of blogging.
In The Thin Line Between Legitimate Blog Models and Scams, Weblog Scout writes that there is a think line between a scan and legitimate blog model as scammers tend to use the same tools as legit blogs do, such as autoblogging WordPress Plugins, auto-pings, mass site submission tools, and feed scrapers: [Read more…]