Review fraud: Hijacked Amazon reviews a big problem says Consumer Reports

Review fraud: Hijacked Amazon reviews a big problem says Consumer Reports

The fake reviews problem on Amazon isn't going away any time soon. Amazon’s fake reviews problem is apparently getting worse. But most consumers are unaware of the issue, let alone its size and scope. Amazon, review graders battle over size of problem. FakeSpot and ReviewMeta, which analyze Amazon reviews, have published studies that argue majorities of reviews in specific product categories (e.g.,…
Are Consumer Reviews Trustworthy and Reliable?

Are Consumer Reviews Trustworthy and Reliable?

Looking for a good restaurant? Maybe a contractor to build a fence for you? Many of us do some research before hiring anyone or buying just about anything, and more often than not we find reviews, ratings, and recommendations from other buyers. But how much can you rely on consumer reviews? Online Reviews Some websites,…
How to spot a fake review: you’re probably worse at it than you realize

How to spot a fake review: you’re probably worse at it than you realize

Survey results suggest about three-quarters of the population trust online reviews at least a moderate amount. www.shutterstock.com Adrian R. Camilleri, University of Technology Sydney Ever relied on an online review to make a purchasing decision? How do you know it was actually genuine? Consumer reviews can be hugely influential, so it’s hardly surprising there’s a…
Deepfakes – the bot made me do it

Deepfakes – the bot made me do it

As deepfakes become indistinguishable from reality and the potential for the misuse of synthetic content is virtually endless, what can you do to avoid falling victim to deepfake fraud? A deepfake rendition of a loved one saying they’ve been kidnapped paints a grim picture of what future deepfakes – specially constructed videos from real data…
IISerpent: Malware‑driven SEO fraud as a service

IISerpent: Malware‑driven SEO fraud as a service

The last in our series on IIS threats introduces a malicious IIS extension used to manipulate page rankings for third-party websites ESET researchers have discovered and analyzed a previously undocumented server-side trojan that manipulates search engine results by hijacking the reputation of the websites it compromises. We named the trojan IISerpent to highlight its two…
DEF CON 29: Satellite hacking 101

DEF CON 29: Satellite hacking 101

How poking at the innards of satellites can make the future of cybersecurity in space more palatable Here at DEF CON 29, the Aerospace Village is alive and well, and aside from the repeated wailing of the neighboring car hacking village setting the car alarm off every 30 seconds, the hardware sitting here, called a…
Ransomware runs rampant, so how can you combat this threat?

Ransomware runs rampant, so how can you combat this threat?

A new paper explains how ransomware has become one of the top cyberthreats of the day and how your organization can avoid becoming the next victim The infosec community has long been warning that ransomware has the potential to grow into the number one cyberthreat for business. However, since ransom demands were low and malware…