Sneaky spammer tactics and how to avoid them
Authored by a Symantec employee
Spam is a problem on the Internet, coming at us from just about every angle of the online space. Some spammers develop sophisticated, well-planned strategies, while others can be sloppy and still drive results. Either way, spam tactics come in a variety of shades, and it’s up to users to identify signals early on and avoid unsolicited content.
Safety for every device.
Security is no longer a one-machine affair. You need a security suite that helps protect all your devices – your Windows PC, Mac, Android smartphone or your iPad.
Here’s a look at some spam tactics used in popular Internet spaces. Become familiar with these tactics to help identify them and avoid them whenever possible.
Spam on Social Media
A lot of the time, spam on social media is just bad social media marketing, or content marketing gone array. Being on either end (sending or receiving) of social media spam is not a good place to be. For receiving parties, it can be frustrating and even dangerous, depending on what the intention of the spammer is; and for senders, it’s extremely unprofessional and not a good way of building rapport with an audience.
The most dangerous spammers on social media are not simply interested in poorly marketing a product; they’re interested in releasing malware and ransomware, as well as persuading unsuspecting users to reveal personal information which can later result in identity theft.
To avoid social media scammers, it is recommended that you increase the security settings on your social media accounts. Moreover, you should be dubious of ‘liking’ or ‘sharing’ any posts that look suspicious, especially if they’re from people you don’t know or recognize. Check your applications in the settings menu of your accounts regularly. Delete, don’t just uninstall, applications that you don’t recognize. And finally, be cautious of connecting with people you don’t know online. A simple friend request can lead to a monsoon of spam and unwanted content. Make an effort to avoid these things by remaining vigilant while using social media.
This type of spam is often more sophisticated than what you might see on social media or in pop-up windows around the Web. That’s because email service providers like Google and Yahoo have gone to great lengths to improve the user experience by developing anti-spam filters and special algorithms to detect unwanted solicitations, which, of course, include email spam.
Spam is often referred to as ‘junk mail’. These communications are unwanted solicitations postured to sell something or incite further online action through the use of automated email correspondence. Most of the time, spam is harmless. However, spam is sometimes disguised to look like official communication between you and your financial institution, or a government agency.
In the cases above, the objective of the spammer is to get the user to click through and take further action. Just clicking a link can trigger a malware or ransomware. Other times, clicking through will take you to a landing page that looks strangely similar to your bank’s website or medical portal.
Usually, the user is prompted to type in personal information to continue.
Requests for your login and password, social security number, and phone number are popular ones from online identity thieves.
To avoid these sneaky tactics, look carefully at the email before clicking through. Do you recognize the sender? Does the subject line look suspicious?
Also, if you’re unsure whether a website is legitimate, always err on the side of caution. Look for security features like HTTPS extension at the beginning of the URL.
Do you see a small padlock or green bar over the URL? If these things are missing, the website is not operating with standard security features, and you should exit the site immediately.
Spam is all over the Internet, and if you’re not careful you can unintentionally become a victim of identity theft. Take steps to secure your computer and always practice vigilance when using email or social media to ensure your safety and to enjoy a more comfortable user experience online.
Don’t wait until a threat strikes.
Security threats and malware lurk on Windows PCs, Macs, and Android and iOS devices. If you use more than one device – like most of us do – you need an all-in-one security suite. Meet Norton Security Premium.
Enjoy peace of mind on every device you use with Norton Security Premium.
Symantec Corporation, the world’s leading cyber security company, allows organizations, governments, and people to secure their most important data wherever it lives. More than 50 million people and families rely on Symantec’s Norton and LifeLock comprehensive digital safety platform to help protect their personal information, devices, home networks, and identities.
Copyright © 2019 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Norton, Norton by Symantec, LifeLock, and the LockMan Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Google Chrome and Android are trademarks of Google, LLC. Mac, iPhone and iPad are trademarks of Apple Inc. Microsoft and the Windows logo are trademarks of Microsoft Corporation in the United States and/or other countries. The Android robot is reproduced and/or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other company names and product names are registered trademarks or trademarks of each company.