Download Nexgate 2013 State of Social Media Spam Research Report PDF

TitleNexgate 2013 State of Social Media Spam Research Report
TagsTypes Presentations
File Size7.4 MB
Total Pages21
Document Text Contents
Page 2

Nexgate
 
 |
 
 nexgate.com
 
 |
 
 [email protected]
 
 |
 
 +1
 (650)
 762-­‐9890
 
@NXGate
 
 facebook.com/NXGate
 
 linkedin.com/company/NXGate
 

Table
 of
 Contents
 

 
56(7"-%8(*+"..9/:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;<4*

=(&(9/7'*>(-'?)[email protected]:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;<A*

B(:*C%D)%[email protected]&;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;<A*

ED-/?)"7-%?D;;;;;;;;;;;;;;;;;;;;;;;;;<<;;;;;;;;;;<<<F*

G:,(&*?H*+?7%9$*+,9.;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;<<I*

Link
 Spam;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;<;;;;;;<I
 

Text
 Spam;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;<;;;;;<<<<J
 

K9&(*+-"):L*+,9.*%D*M7-%?D;;;;;;;;;;;;;;;;;;;;;<;;;;;;31*

Leading
 Entertainment
 Brand;;;;;;;;;;;;;;;;;;;<;;<<;;<<<31
 

Major
 Sports
 League;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;34
 

+?7%9$*+,9.*K?.."D%79-%?D*>(7'9D%&.&;;;;;<;;;;;;;;;;;;;3A*

Spammy
 Apps.;;;;;;;;;;;;;;;;;<;;;;;;;;;;;;;;;;3F
 

Like-­‐Jacking;;;;;;;;;;;;;;;;;;;<<;;;;;;;;;;;;;;<<<3I
 

Social
 Bots;;;;;;;;;;;;;;;;;;;;;<;;;;;;;;;;;;;;3I
 

Fake
 Accounts;;;;;;;;;;;;;;;;;<<;;;;;;;;;;<<<;;;;<<3N
 

+?7%9$*+,9.*G/(D)&<<;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;<<3O*

Chart:
 Grown
 Percentage
 of
 Spam
 vs.
 Comments
 Across
 All
 Social………..<<<<<12
 

K?D7$"&%?D;;;;;;;;;;;;;;;;;;<<<;;;;;;;;;;;;;;;;;<12*

M#?"-*-'(*M"-'?/;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;<13*

=(H(/(D7(&;;;;;;;;;;;;;;;;;;;<;;;;;;;;;;<;;;;<<<;<<13

Page 10

Nexgate
 
 |
 
 nexgate.com
 
 |
 
 [email protected]
 
 |
 
 +1
 (650)
 762-­‐9890
 
@NXGate
 
 facebook.com/NXGate
 
 linkedin.com/company/NXGate
 


 

 
The
 author
 of
 the
 following
 “work-­‐from-­‐home”
 spam
 knows
 that
 his
 message
 is
 too
 good
 to
 
be
 true,
 and
 he
 understands
 that
 you
 might
 be
 doubtful
 about
 his
 claims.
 By
 deceptively
 
admitting
 that
 most
 “work-­‐from-­‐home”
 schemes
 are
 a
 scam,
 the
 spammer
 aims
 to
 earn
 
your
 trust
 by
 giving
 you
 advice
 on
 how
 to
 avoid
 other
 “work-­‐from-­‐home”
 schemes.
 
However,
 the
 message
 itself
 is
 nothing
 but
 another
 “work-­‐from-­‐home”
 scheme.

Page 11

Nexgate
 
 |
 
 nexgate.com
 
 |
 
 [email protected]
 
 |
 
 +1
 (650)
 762-­‐9890
 
@NXGate
 
 facebook.com/NXGate
 
 linkedin.com/company/NXGate
 


 

 
Text
 spam
 may
 be
 used
 as
 phishing
 attacks,
 where
 the
 recipient
 is
 asked
 to
 verify
 their
 
account
 using
 their
 credentials.
 These
 phishing
 attacks
 allow
 the
 perpetrator
 to
 gather
 
identification
 information
 from
 the
 victim,
 which
 may
 then
 be
 used
 to
 gain
 access
 to
 other
 
accounts,
 such
 as
 bank
 accounts.
 A
 few
 examples
 of
 these
 seemingly
 legitimate
 but
 
exploitative
 attacks
 are
 shown
 here
 [9]:

Page 20

Nexgate
 
 |
 
 nexgate.com
 
 |
 
 [email protected]
 
 |
 
 +1
 (650)
 762-­‐9890
 
@NXGate
 
 facebook.com/NXGate
 
 linkedin.com/company/NXGate
 

Instead
 of
 looking
 at
 the
 rate
 of
 growth
 of
 spam
 vs.
 comments
 for
 a
 particular
 social
 media
 
account,
 we
 now
 turn
 our
 attention
 to
 rate
 of
 growth
 of
 spam
 vs.
 comments
 for
 all
 social
 
media
 accounts
 in
 the
 Nexgate
 corpus.
 
 


 
As
 we
 saw
 in
 our
 case
 study,
 the
 rate
 of
 spam
 is
 growing
 faster
 than
 the
 rate
 of
 comments.
 
A
 slight
 kink
 towards
 the
 bottom
 left
 of
 the
 red
 curve
 suggests
 that,
 perhaps
 for
 a
 brief
 
time,
 social
 spam
 was
 growing
 slower
 than
 comments
 in
 general.
 However,
 either
 through
 
a
 new
 strategy
 or
 becoming
 smarter
 than
 social
 networks’
 standard
 detection
 networks,
 
social
 spam
 has
 grown
 significantly
 faster
 than
 comments.
 
 

 

 

3*4,.85-*4%

 
Spam
 has
 been
 with
 us
 for
 a
 long
 time
 –
 through
 the
 evolution
 of
 email,
 the
 telephone,
 and
 
now
 our
 social
 media.
 
 It’s
 no
 surprise
 that
 the
 ‘bad
 guys’
 are
 targeting
 today’s
 most
 
population
 dense
 communication
 medium;
 however,
 until
 now,
 few
 have
 truly
 investigated
 
the
 methods
 of
 these
 new
 age
 spammers,
 or
 developed
 technology
 to
 adequately
 address
 
the
 problem
 on
 behalf
 of
 the
 social
 networks
 and
 the
 brands
 and
 fans
 that
 enjoy
 them.
 

 
The
 same
 expertise
 and
 research
 used
 for
 this
 study
 also
 powers
 the
 detection
 and
 
enforcement
 engines
 of
 the
 Nexgate
 product
 suite.
 
 Nexgate
 is
 the
 leading
 provider
 of
 social
 
media
 security
 and
 compliance
 with
 automated
 detection,
 classification,
 and
 removal
 of
 
spam,
 malicious,
 and
 inappropriate
 content
 across
 all
 major
 social
 media
 platforms.
 
 Our
 
patent-­‐pending
 technology
 seamlessly
 connects
 to
 social
 networks
 to
 remove
 unauthorized
 
content
 and
 protect
 your
 brand
 and
 followers.
 
 

 
To
 learn
 more
 about
 how
 Nexgate
 can
 help
 your
 brand
 automate
 social
 media
 security
 and
 
tackle
 the
 problem
 of
 social
 media
 spam,
 visit
 nexgate.com.
 

L:*M4%E):,)4'(@)%*+%&/(0%95N%3*00)4'5%
D,:*55%D..%&*,-(.%D,,*84'5%

Comments
  Spam

Page 21

Nexgate
 
 |
 
 nexgate.com
 
 |
 
 [email protected]
 
 |
 
 +1
 (650)
 762-­‐9890
 
@NXGate
 
 facebook.com/NXGate
 
 linkedin.com/company/NXGate
 


 

About
 Nexgate
 

 
Nexgate
 provides
 cloud-­‐based
 brand
 protection
 and
 compliance
 for
 enterprise
 social
 media
 
accounts.
 Its
 patent-­‐pending
 technology
 seamlessly
 integrates
 with
 the
 leading
 social
 
media
 platforms
 and
 applications
 to
 find
 and
 audit
 brand
 affiliated
 accounts,
 control
 
connected
 applications,
 detect
 and
 remediate
 compliance
 risks,
 archive
 communications,
 
and
 detect
 fraud
 and
 account
 hacking.
 

 
Nexgate
 is
 based
 in
 San
 Francisco,
 California,
 and
 is
 used
 by
 some
 of
 the
 world’s
 largest
 
financial
 services,
 pharmaceutical,
 Internet
 security,
 manufacturing,
 media,
 and
 retail
 
organizations
 to
 discover,
 audit
 and
 protect
 their
 social
 infrastructure.
 
 

 

 

About
 the
 Author
 

 
Harold
 Nguyen
 is
 a
 data
 scientist
 at
 Nexgate,
 and
 has
 years
 of
 experience
 fighting
 spam.
 
 His
 
areas
 of
 expertise
 include
 Machine
 Learning,
 Statistical
 Analysis,
 and
 Algorithms
 Research.
 
Harold
 holds
 a
 Ph.D.
 in
 physics
 from
 U.C.
 Riverside,
 and
 a
 B.A.
 from
 Berkeley,
 and
 
conducted
 research
 with
 the
 Compact
 Muon
 Solenoid
 Experiment
 at
 the
 Large
 Hadron
 
Collider
 located
 in
 Geneva,
 Switzerland.
 He
 is
 passionate
 about
 social
 media,
 security
 and
 
Big
 Data.
 

 

 

References
 

 
(1) "EdgeRank: The Secret Sauce That Makes Facebook's News Feed Tick". TechCrunch.
2010-04-22. Retrieved 2012-12-08.
 
(2)
 Getting the message, at last". The Economist. 2007-12-14.
(3) http://blog_impermium_com.s3.amazonaws.com/wp-
content/uploads/2011/10/Impermium_Halloween_Small2.jpg
(4)
 http://www.itworld.com/it-­‐managementstrategy/264648/social-­‐spam-­‐taking-­‐over-­‐internet
 
(5)
 http://www.businessweek.com/articles/2012-05-24/likejacking-spammers-hit-social-media
 
(6)
 http://www.nytimes.com/2013/08/11/sunday-­‐review/i-­‐flirt-­‐and-­‐tweet-­‐follow-­‐me-­‐at-­‐
socialbot.html?emc=eta1&_r=1&
 
(7)
 
http://online.wsj.com/article/SB10001424052970203686204577112942734977800.html?cb=logged
0.9653948666527867&cb=logged0.13351966859772801
 
(8)
 http://www.socialbakers.com
 
(9)
 http://nakedsecurity.sophos.com/2011/02/01/facebook-­‐will-­‐close-­‐all-­‐accounts-­‐today-­‐rogue-­‐app-­‐
spreads-­‐virally/

Similer Documents