With the development of these media, they have become the target of various attacks. In particular, the existence of fake accounts on social networks can lead to many types of abuse, such as phishing or disinformation, which is a big challenge nowadays. In this ...
Security of online social networksFake accountsSybil detectionGraph computingDistributed systemGraph-based approaches for fake account detection is one of the important means to fight against fake accounts' attacks on social networks. With the growth of the scale of social networks, more and......
Social media monitoring To combat fake ads on social media, Netcraft’s social media monitoring and takedown platform enables you to track platform misuse and launch takedowns against criminal impersonation attempts across Facebook, Twitter, Instagram, TikTok, Telegram, and Pinterest. In addition, Netcr...
CovFakeBot: a machine learning based chatbot using ensemble learning technique for COVID-19 fake news detection The outbreak of the SARS-Cov-2 virus epidemic has been followed by a flood of misleading information on social media which is impacting millions of people ... H Batra,GK Palawat,K...
2020 25th International Conference on Pattern Recognition (ICPR), IEEE (2021), pp. 10367-10374 CrossrefGoogle Scholar Pathak, 2014 A. Pathak An analysis of various tools, methods and systems to generate fake accounts for social media Northeastern University Boston, Massachusetts December (2014) Goog...
Canva is a graphic design platform that allows users to create social media graphics, presentations, posters, and other visual content. Attackers abused the Canva platform to host a page that shows a fake OneDrive document preview and links to a phishing URL: Figure 4. Sc...
Financial institutions have found millions of fake accounts in the past. This can be especially prevalent for institutions that offer potential customers a cash incentive to sign up. Credential theft It’s important for banks to identify suspicious activity when it occurs on customer accounts. Banks...
Although there is voluminous data flow in social media, it is still possible to create an effective system that can detect malicious activities within a shorter time and provide situational awareness. This thesis developed patterns for a probabilistic approach to identify malicious behavior by monitoring...
Learn how Darktrace's OT Threat Detection technology identified a sophisticated ICS attack on an international airport. Read more on Darktrace's blog. As Industrial Control Systems (ICS) and traditional IT networks converge, the number of cyber-attack...
Our thought was that fake services might also post fake reviews on their own objects. Many of those accounts left reviews on the same cluster of other Google Maps places. This suggested that these accounts were also fake. As a consequence, we deemed the reviews published by them as fake ...