Four Ways That Fake-News Sites Trick People

Many fake-news websites have appeared online in recent years. And more seem to be springing up all the time. Between them, they manage to churn out a seemingly endless stream of driveling nonsense, at least some of which gets shared far and wide via social media.
 
Fake-news sites are successful because many people believe and therefore share their false reports. The more such stories are seen and shared, the more visitors the sites will get and the more money they generate for their owners.

So how do such sites trick people into believing and sharing their nonsensical stories?

Here are several techniques they use to achieve this:

1: They use URL’s That Look Like Legitimate News Site Web Addresses

Many of the sites use web addresses that appear to belong to genuine and well-known news sites. For example, one site that is responsible for a number of reports that falsely claim that various celebrities have died calls itself ‘msmbc’ and includes the letters ‘msmbc’ in its web address.

Visitors who just glance at the name and web address may be tricked into thinking the site belongs to the television news network ‘msnbc’, which is owned by US news giant NBC. Many people will not notice that ‘m’ is swapped for ‘n’ in the fake site’s name and URL.

Other fake news sites take the deception a step further by using a web address that is identical to the targeted news site except that ‘.co’ is added at the end. For example, another fake-news site has the web address ‘nbc.com.co’.

Many visitors will glance at the familiar ‘nbc.com’ part of the address and will not even realise that the added “.co” means that they are not on a real NBC website at all. There are more and more of these deceptive “.co” websites appearing.

Keep in mind that it is very easy for unscrupulous people to register a domain name that appears to be associated with a high profile news site and build a fake website that capitalises on this false association.

2: They present fake stories in news format

The fictional reports on fake-news sites are usually designed to look like genuine news reports. They use news style headlines, and are written in a way that emulates the journalistic style of popular news outlets. Like real news reports, the fake stories often include quotes from a relevant expert or official spokesperson to support their claims.

However, the expert or spokesperson is imaginary and the quotes are simply made up.

Sometimes, the fake reports even link to other websites that seemingly back up their bogus claims. But, the linked website will itself be fake and may have even been created by the same people.

3: They hide their disclaimer or don’t even have one:

Some fake-news sites do have a disclaimer explaining that their content is fictional or satirical. That would be fine if the disclaimer was displayed where people who read the fake reports might actually see it. But, the disclaimer is often buried in an ‘About’ or ‘Terms of Service’ page that many people will not visit.

Or, the disclaimer might be included in the footer of the site’s pages. Again, many people will not see this disclaimer because they are unlikely to scroll down far enough.

And, alas, some fake-news sites don’t have any meaningful disclaimer at all.

4: They mix true stories with fictional reports

An emerging trend on such sites is to mix true stories with fictional content. If people visit other pages on the site they may encounter stories that they know are factual because they have seen them on legitimate news outlets. So, they may then be much more likely to believe the site’s fictional stories as well.

The sites generally make no effort to let readers know which stories are true and which are made up nonsense.

So, don’t get caught out by these tricks. If you come across a news report that sounds a little suss, take a close look at the site’s URL. Does it belong to a genuine news site or is it just designed to make you THINK it does? Have a hunt around. Does the site have a disclaimer somewhere that admits that its material is nonsense?

And, always verify any strange or unusual ‘news’ stories that come your way before you share them on your networks. A quick search via a news aggregator such as Google News will usually reveal if a circulating story is true.

Hoax Slayer

You Might Also Read: 

Fake Facebook Pages Account For 60% Of Social Network Phishing

 

« Take An Analytical Approach To Cybersecurity Training
Cyber Command’s Plan to ‘frustrate’ Hackers Is Working »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

TWNCERT

TWNCERT

TWNCERT is the National Computer Emergency Response Team of Taiwan.

Materna Virtual Solution

Materna Virtual Solution

Materna Virtual Solution security solutions enable user-friendly, secure mobile working environments.

Cyber Risk & Insurance Forum (CRIF)

Cyber Risk & Insurance Forum (CRIF)

CRIF helps organisations understand cyber risks and the damage that might occur by supporting the development of effective insurance solutions.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

VerifyMe

VerifyMe

VerifyMe is a global technology solutions company delivering brand protection offerings to mitigate counterfeiting, product diversion, and illicit trade.

Zix

Zix

Zix offers secure email encryption, threat protection, archiving, DLP and BYOD security for hospitals, financial services, government, and more.

Government Communications Security Bureau (GCSB)

Government Communications Security Bureau (GCSB)

GCSB contributes to New Zealand’s national security by providing information assurance and cyber security to the New Zealand Government and critical infrastructure organisations.

Infortec

Infortec

Infortec provide consultancy and solutions for the protection of digital information and the management of computer resources.

Gospel Technology

Gospel Technology

Gospel presents a totally new way of accessing and controlling data which is enterprise grade scalable, highly resilient, and secure.

Civic Technologies

Civic Technologies

Civic’s Secure Identity Platform (SIP) uses a verified identity for multi-factor authentication on web and mobile apps without the need for usernames or passwords.

Adzuna

Adzuna

Adzuna is a search engine for job ads used by over 10 million visitors per month that aims to list every job everywhere, including thousands of vacancies in Cybersecurity.

Omega Systems

Omega Systems

Omega Systems is a leading managed service provider (MSP) and managed security service provider (MSSP) to mid-market organizations.

KBE Information Security

KBE Information Security

KBE is a global consulting firm, with offices in Toronto and Milan, which specializes in the area of IT and information security with over 20 years of experience.

Bastazo

Bastazo

Bastazo provides tools for vulnerability and patch management. Focus your cybersecurity operations on vulnerabilities with the highest risk of exploitation.

Axians

Axians

Axians supports its customers in their digital transformation journey. We offer ICT solutions and services in areas including Enterprise Networks and Cybersecurity.