Four Ways That Fake-News Sites Trick People

Many fake-news websites have appeared online in recent years. And more seem to be springing up all the time. Between them, they manage to churn out a seemingly endless stream of driveling nonsense, at least some of which gets shared far and wide via social media.
 
Fake-news sites are successful because many people believe and therefore share their false reports. The more such stories are seen and shared, the more visitors the sites will get and the more money they generate for their owners.

So how do such sites trick people into believing and sharing their nonsensical stories?

Here are several techniques they use to achieve this:

1: They use URL’s That Look Like Legitimate News Site Web Addresses

Many of the sites use web addresses that appear to belong to genuine and well-known news sites. For example, one site that is responsible for a number of reports that falsely claim that various celebrities have died calls itself ‘msmbc’ and includes the letters ‘msmbc’ in its web address.

Visitors who just glance at the name and web address may be tricked into thinking the site belongs to the television news network ‘msnbc’, which is owned by US news giant NBC. Many people will not notice that ‘m’ is swapped for ‘n’ in the fake site’s name and URL.

Other fake news sites take the deception a step further by using a web address that is identical to the targeted news site except that ‘.co’ is added at the end. For example, another fake-news site has the web address ‘nbc.com.co’.

Many visitors will glance at the familiar ‘nbc.com’ part of the address and will not even realise that the added “.co” means that they are not on a real NBC website at all. There are more and more of these deceptive “.co” websites appearing.

Keep in mind that it is very easy for unscrupulous people to register a domain name that appears to be associated with a high profile news site and build a fake website that capitalises on this false association.

2: They present fake stories in news format

The fictional reports on fake-news sites are usually designed to look like genuine news reports. They use news style headlines, and are written in a way that emulates the journalistic style of popular news outlets. Like real news reports, the fake stories often include quotes from a relevant expert or official spokesperson to support their claims.

However, the expert or spokesperson is imaginary and the quotes are simply made up.

Sometimes, the fake reports even link to other websites that seemingly back up their bogus claims. But, the linked website will itself be fake and may have even been created by the same people.

3: They hide their disclaimer or don’t even have one:

Some fake-news sites do have a disclaimer explaining that their content is fictional or satirical. That would be fine if the disclaimer was displayed where people who read the fake reports might actually see it. But, the disclaimer is often buried in an ‘About’ or ‘Terms of Service’ page that many people will not visit.

Or, the disclaimer might be included in the footer of the site’s pages. Again, many people will not see this disclaimer because they are unlikely to scroll down far enough.

And, alas, some fake-news sites don’t have any meaningful disclaimer at all.

4: They mix true stories with fictional reports

An emerging trend on such sites is to mix true stories with fictional content. If people visit other pages on the site they may encounter stories that they know are factual because they have seen them on legitimate news outlets. So, they may then be much more likely to believe the site’s fictional stories as well.

The sites generally make no effort to let readers know which stories are true and which are made up nonsense.

So, don’t get caught out by these tricks. If you come across a news report that sounds a little suss, take a close look at the site’s URL. Does it belong to a genuine news site or is it just designed to make you THINK it does? Have a hunt around. Does the site have a disclaimer somewhere that admits that its material is nonsense?

And, always verify any strange or unusual ‘news’ stories that come your way before you share them on your networks. A quick search via a news aggregator such as Google News will usually reveal if a circulating story is true.

Hoax Slayer

You Might Also Read: 

Fake Facebook Pages Account For 60% Of Social Network Phishing

 

« Take An Analytical Approach To Cybersecurity Training
Cyber Command’s Plan to ‘frustrate’ Hackers Is Working »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

RioRey

RioRey

The DDoS mitigation specialist, from single server to Enterprise wide carrier level networks the RioRey Solution provides effective immediate and easy to manage protection.

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

Advenica

Advenica

Advenica develops, manufactures and sells innovative cybersecurity solutions for encryption and secure information exchange.

BeOne Development

BeOne Development

BeOne Development provide innovative training and learning solutions for information security and compliance.

ThreadStone Cyber Security

ThreadStone Cyber Security

ThreadStone Cyber Security offer reliable, practical and affordable cyber security solutions for both large and smaller organizations that we develop and deliver ourselves from Europe.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

K2 Cyber Security

K2 Cyber Security

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks.

Hunton Andrews Kurth

Hunton Andrews Kurth

Hunton Andrews Kurth LLP serves clients across a broad range of complex transactional, litigation and regulatory matters. Practice areas include Privacy and Cybersecurity.

Help AG

Help AG

Help AG provides leading enterprise businesses and governments across the Middle East with strategic consultancy combined with tailored information security solutions and services.

Swissbit

Swissbit

Swissbit AG is the leading European manufacturer of storage, security and embedded IoT solutions for demanding applications.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

Def-Logix

Def-Logix

Def-Logix was founded in 2008 to help solve cyber threats being experienced by government agencies of the United States.

NexGen Cyber

NexGen Cyber

NexGen Cyber helps customers in commercial SMB markets with IT security, security integration, service management, outsourced service transition, and transformative security solutions.

Strategic Technology Solutions (STS)

Strategic Technology Solutions (STS)

Strategic Technology Solutions specialize in providing Cybersecurity and Managed IT Services to the legal industry.

Paramount Defenses

Paramount Defenses

Paramount Defenses have unrivaled capability in two of the most critical areas in cyber security today – Active Directory Security and Privileged Access.