Bin Laden news targets social networking weak spot

News about Osama bin Laden's death is a hot topic on social networking sites, and that makes it a target for cybercriminals.

The death of Osama bin Laden, the dramatic events surrounding the military operation against bin Laden's compound in a posh Pakistani suburb, and the resulting conspiracy theories and fear of retaliatory attacks from Al Qaeda are all very popular topics of discussion. The hunger for details and breaking news is a catch-22, though, as malware developers use bin Laden as bait for attacks.

How did you first learn that Osama bin Laden had been killed by a US military strike? A Washington Post-Pew Research Center poll found that a majority of Americans first learned the news through local, network, or cable news.

Personally, though, I learned about it on Twitter. I was just getting ready to watch a backlog of favorite shows on my DVR, and happened to peek at Tweetdeck as I was getting a drink. Had I not seen the news come across Twitter, I most likely wouldn't have know what was going on in the world until the next day because I would have been busy watching recorded shows from days earlier.

While the address by President Obama--which aired at 11:35pm Eastern after much of the United States had probably gone to bed--was the most watched presidential speech in a decade, drawing more than 56 million viewers, it was just the beginning. Once that nine minute address was over, people around the world turned to the Internet to find more information, to share news and links, and to talk about this major event.

One Pakistani man inadvertently live-tweeted the attack on the bin Laden compound. Google tweeted that searches for Osama bin Laden spiked one million percent following the news. Events like this demonstrate how crucial the Internet and social media have become as a medium for breaking news and real-time communication around the globe. Social networking has completely altered the culture of news and information.

Unfortunately, the very thing that makes social networking so great is also its Achilles heel. People connect with one another on Facebook, or follow one another on Twitter because they want to know what those people have to say. Social networking is built on a sort of inherent trust, and an expectation that you are interested in reading about what those in your social networks choose to share.

And that is its weak point. That is what malware developers and cyber-criminals prey on. You might be (should be) highly suspicious of unsolicited emails from strangers containing links or attachments, but if the link or attachment comes from someone in your social network you are much less likely to have your guard up, and much more likely to fall victim to your own inherent trust.

It is an unfortunate catch-22 that best resource for breaking news and real-time information is also the best attack vector for spreading malware and stealing your identity or money. I am not going to tell you to abandon social networking, but I am going to recommend that you let go of that inherent trust and instead maintain some healthy skepticism even within your social network.

If a Facebook friend who has never sent you a Facebook message or initiated a chat with you suddenly connects with you to share a link about bin Laden, that should raise red flags. Suffice it to say, for the next week or two (at least) just assume that any email, instant message, tweet, Facebook status update, or other image or video link having anything remotely to do with Osama Bin Laden is a malware scam. Just delete it and move on.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags spamantispamtrojan horsesvirusessecuritytwittersocial networksphishingmalware

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Tony Bradley

PC World (US online)
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?