Bin Laden news targets social networking weak spot

News about Osama bin Laden's death is a hot topic on social networking sites, and that makes it a target for cybercriminals.

The death of Osama bin Laden, the dramatic events surrounding the military operation against bin Laden's compound in a posh Pakistani suburb, and the resulting conspiracy theories and fear of retaliatory attacks from Al Qaeda are all very popular topics of discussion. The hunger for details and breaking news is a catch-22, though, as malware developers use bin Laden as bait for attacks.

How did you first learn that Osama bin Laden had been killed by a US military strike? A Washington Post-Pew Research Center poll found that a majority of Americans first learned the news through local, network, or cable news.

Personally, though, I learned about it on Twitter. I was just getting ready to watch a backlog of favorite shows on my DVR, and happened to peek at Tweetdeck as I was getting a drink. Had I not seen the news come across Twitter, I most likely wouldn't have know what was going on in the world until the next day because I would have been busy watching recorded shows from days earlier.

While the address by President Obama--which aired at 11:35pm Eastern after much of the United States had probably gone to bed--was the most watched presidential speech in a decade, drawing more than 56 million viewers, it was just the beginning. Once that nine minute address was over, people around the world turned to the Internet to find more information, to share news and links, and to talk about this major event.

One Pakistani man inadvertently live-tweeted the attack on the bin Laden compound. Google tweeted that searches for Osama bin Laden spiked one million percent following the news. Events like this demonstrate how crucial the Internet and social media have become as a medium for breaking news and real-time communication around the globe. Social networking has completely altered the culture of news and information.

Unfortunately, the very thing that makes social networking so great is also its Achilles heel. People connect with one another on Facebook, or follow one another on Twitter because they want to know what those people have to say. Social networking is built on a sort of inherent trust, and an expectation that you are interested in reading about what those in your social networks choose to share.

And that is its weak point. That is what malware developers and cyber-criminals prey on. You might be (should be) highly suspicious of unsolicited emails from strangers containing links or attachments, but if the link or attachment comes from someone in your social network you are much less likely to have your guard up, and much more likely to fall victim to your own inherent trust.

It is an unfortunate catch-22 that best resource for breaking news and real-time information is also the best attack vector for spreading malware and stealing your identity or money. I am not going to tell you to abandon social networking, but I am going to recommend that you let go of that inherent trust and instead maintain some healthy skepticism even within your social network.

If a Facebook friend who has never sent you a Facebook message or initiated a chat with you suddenly connects with you to share a link about bin Laden, that should raise red flags. Suffice it to say, for the next week or two (at least) just assume that any email, instant message, tweet, Facebook status update, or other image or video link having anything remotely to do with Osama Bin Laden is a malware scam. Just delete it and move on.

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags spamantispamtrojan horsesvirusessecuritytwittersocial networksphishingmalware

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Tony Bradley

PC World (US online)
Show Comments

Cool Tech

Crucial Ballistix Elite 32GB Kit (4 x 8GB) DDR4-3000 UDIMM

Learn more >

Gadgets & Things

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

Family Friendly

Lexar® JumpDrive® S57 USB 3.0 flash drive 

Learn more >

Stocking Stuffer

Plox Star Wars Death Star Levitating Bluetooth Speaker

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest News Articles


GGG Evaluation Team

Kathy Cassidy


First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni


For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell


The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi


The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott


My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?