Fake Users and Spam Destroying Value of Social Media - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Fake Users and Spam Destroying Value of Social Media-4 Next

Social media exploitation techniques are evolving fast. If there is a strong consumer brand or significant news event, it's being exploited on the social Web. For example, social spammers are increasingly using emotionally-charged news to win clicks. The deaths of Osama Bin Laden and Amy Winehouse, among other major stories, deceived users into clicking on malicious links.

A new quarterly index based on data collected by social spam fighter Impermium finds social Web spam and abuse is now posing significant reputation risk and cost to Internet businesses that depend on public user profiles.

"Most companies will be shocked to see how rampant user registration fraud is on their site," says Mark Risher, CEO of Impermium. "Bulk accounts for most popular social networks can now be purchased on the black market for pennies. This type of fraud has many significant ramifications, including a company's ability to accurately value its user base and determine the actual cost of new customer acquisition."

The data comes from the inaugural Impermium Social Spam Index, the industry's first resource for regularly published data on social Web spam and abuse trends. The following trends are based on a 100-consecutive-day sample of the social Web between June and August, conducted by researchers at Impermium Corporation. Impermium analyzed 104 million pieces of user-generated content (UGC) on social networks, blogs and social bookmarking sites from a base of 90 million users spread across 72 countries.

More Slideshows:

How Password Savvy Are You?Test your password acumen with these 10 questions.

Nine Instant Messaging Best PracticesEssential etiquette rules for instant messaging.

Five Mistakes Companies Make in Their Cloud StrategiesLearn how to capture the full potential of the cloud.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.