Four Ways That Fake-News Sites Trick People

Many fake-news websites have appeared online in recent years. And more seem to be springing up all the time. Between them, they manage to churn out a seemingly endless stream of driveling nonsense, at least some of which gets shared far and wide via social media.
 
Fake-news sites are successful because many people believe and therefore share their false reports. The more such stories are seen and shared, the more visitors the sites will get and the more money they generate for their owners.

So how do such sites trick people into believing and sharing their nonsensical stories?

Here are several techniques they use to achieve this:

1: They use URL’s That Look Like Legitimate News Site Web Addresses

Many of the sites use web addresses that appear to belong to genuine and well-known news sites. For example, one site that is responsible for a number of reports that falsely claim that various celebrities have died calls itself ‘msmbc’ and includes the letters ‘msmbc’ in its web address.

Visitors who just glance at the name and web address may be tricked into thinking the site belongs to the television news network ‘msnbc’, which is owned by US news giant NBC. Many people will not notice that ‘m’ is swapped for ‘n’ in the fake site’s name and URL.

Other fake news sites take the deception a step further by using a web address that is identical to the targeted news site except that ‘.co’ is added at the end. For example, another fake-news site has the web address ‘nbc.com.co’.

Many visitors will glance at the familiar ‘nbc.com’ part of the address and will not even realise that the added “.co” means that they are not on a real NBC website at all. There are more and more of these deceptive “.co” websites appearing.

Keep in mind that it is very easy for unscrupulous people to register a domain name that appears to be associated with a high profile news site and build a fake website that capitalises on this false association.

2: They present fake stories in news format

The fictional reports on fake-news sites are usually designed to look like genuine news reports. They use news style headlines, and are written in a way that emulates the journalistic style of popular news outlets. Like real news reports, the fake stories often include quotes from a relevant expert or official spokesperson to support their claims.

However, the expert or spokesperson is imaginary and the quotes are simply made up.

Sometimes, the fake reports even link to other websites that seemingly back up their bogus claims. But, the linked website will itself be fake and may have even been created by the same people.

3: They hide their disclaimer or don’t even have one:

Some fake-news sites do have a disclaimer explaining that their content is fictional or satirical. That would be fine if the disclaimer was displayed where people who read the fake reports might actually see it. But, the disclaimer is often buried in an ‘About’ or ‘Terms of Service’ page that many people will not visit.

Or, the disclaimer might be included in the footer of the site’s pages. Again, many people will not see this disclaimer because they are unlikely to scroll down far enough.

And, alas, some fake-news sites don’t have any meaningful disclaimer at all.

4: They mix true stories with fictional reports

An emerging trend on such sites is to mix true stories with fictional content. If people visit other pages on the site they may encounter stories that they know are factual because they have seen them on legitimate news outlets. So, they may then be much more likely to believe the site’s fictional stories as well.

The sites generally make no effort to let readers know which stories are true and which are made up nonsense.

So, don’t get caught out by these tricks. If you come across a news report that sounds a little suss, take a close look at the site’s URL. Does it belong to a genuine news site or is it just designed to make you THINK it does? Have a hunt around. Does the site have a disclaimer somewhere that admits that its material is nonsense?

And, always verify any strange or unusual ‘news’ stories that come your way before you share them on your networks. A quick search via a news aggregator such as Google News will usually reveal if a circulating story is true.

Hoax Slayer

You Might Also Read: 

Fake Facebook Pages Account For 60% Of Social Network Phishing

 

« Take An Analytical Approach To Cybersecurity Training
Cyber Command’s Plan to ‘frustrate’ Hackers Is Working »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

softScheck

softScheck

softScheck is an IT security consultancy. Services range from pentesting and compliance testing to security auditing of software and IT infrastructure.

L J Kushner & Associates

L J Kushner & Associates

L.J. Kushner is a leading Information Security recruiting firm.

Telia Cygate

Telia Cygate

Cygate are specialists in information security, data networks, and data centre and cloud technologies.

Me Learning

Me Learning

Me Learning provides engaging, informative and clearly explained learning materials for complex and challenging professional environments in areas including GDPR and Information Governance.

Randori

Randori

Randori is an attack platform that provides "red-teaming" as a service - basically, staging simulated hack attacks to test for vulnerabilities and gaps in the security response.

Dutch Accreditation Council (RvA)

Dutch Accreditation Council (RvA)

RvA is the national accreditation body for the Netherlands. The directory of members provides details of organisations offering certification services for ISO 27001.

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory is a manufacturer of military security and data destruction equipment for sensitive, classified, and secret information.

Knowledge Lens

Knowledge Lens

Knowledge Lens builds innovative solutions on niche technology areas such as Big Data Analytics, Data Science, Artificial Intelligence, Internet of Things, Augmented Reality, and Blockchain.

GajShield

GajShield

GajShield Infotech provides Data Security Firewall solutions to Corporate’s and Government agencies.

Marcum Technology

Marcum Technology

Marcum Technology consultants are focused on helping you reach your company’s full potential by exploring creative ways to integrate tomorrow’s technology into your business today.

CyberGate Technologies

CyberGate Technologies

CyberGate Technologies is a world-class, customer focus cyber security service and consultancy company operating the UK, Europe, Middle East, and Africa.

Professional Labs

Professional Labs

Professional Labs specialize in simplifying complex problems for our customers with Cloud Services, Managed Services and Cyber Security.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.

Tracer

Tracer

Tracer (formerly Appdetex) is a next-generation brand protection solution. It constantly finds, analyzes, and stops brand abuse across Web2 and Web3 digital channels.

CardinalOps

CardinalOps

The CardinalOps platform continuously assesses your detection posture and eliminates coverage gaps in your existing detection stack so you can easily implement a threat-informed defense.

Cyber Castle

Cyber Castle

Linux Demands Sophisticated, Purpose-Built Security. Cyber Castle is the solution. A safe, deployable platform down to the edge device for monitoring Linux security anywhere across the globe.