Four Ways That Fake-News Sites Trick People

Many fake-news websites have appeared online in recent years. And more seem to be springing up all the time. Between them, they manage to churn out a seemingly endless stream of driveling nonsense, at least some of which gets shared far and wide via social media.
 
Fake-news sites are successful because many people believe and therefore share their false reports. The more such stories are seen and shared, the more visitors the sites will get and the more money they generate for their owners.

So how do such sites trick people into believing and sharing their nonsensical stories?

Here are several techniques they use to achieve this:

1: They use URL’s That Look Like Legitimate News Site Web Addresses

Many of the sites use web addresses that appear to belong to genuine and well-known news sites. For example, one site that is responsible for a number of reports that falsely claim that various celebrities have died calls itself ‘msmbc’ and includes the letters ‘msmbc’ in its web address.

Visitors who just glance at the name and web address may be tricked into thinking the site belongs to the television news network ‘msnbc’, which is owned by US news giant NBC. Many people will not notice that ‘m’ is swapped for ‘n’ in the fake site’s name and URL.

Other fake news sites take the deception a step further by using a web address that is identical to the targeted news site except that ‘.co’ is added at the end. For example, another fake-news site has the web address ‘nbc.com.co’.

Many visitors will glance at the familiar ‘nbc.com’ part of the address and will not even realise that the added “.co” means that they are not on a real NBC website at all. There are more and more of these deceptive “.co” websites appearing.

Keep in mind that it is very easy for unscrupulous people to register a domain name that appears to be associated with a high profile news site and build a fake website that capitalises on this false association.

2: They present fake stories in news format

The fictional reports on fake-news sites are usually designed to look like genuine news reports. They use news style headlines, and are written in a way that emulates the journalistic style of popular news outlets. Like real news reports, the fake stories often include quotes from a relevant expert or official spokesperson to support their claims.

However, the expert or spokesperson is imaginary and the quotes are simply made up.

Sometimes, the fake reports even link to other websites that seemingly back up their bogus claims. But, the linked website will itself be fake and may have even been created by the same people.

3: They hide their disclaimer or don’t even have one:

Some fake-news sites do have a disclaimer explaining that their content is fictional or satirical. That would be fine if the disclaimer was displayed where people who read the fake reports might actually see it. But, the disclaimer is often buried in an ‘About’ or ‘Terms of Service’ page that many people will not visit.

Or, the disclaimer might be included in the footer of the site’s pages. Again, many people will not see this disclaimer because they are unlikely to scroll down far enough.

And, alas, some fake-news sites don’t have any meaningful disclaimer at all.

4: They mix true stories with fictional reports

An emerging trend on such sites is to mix true stories with fictional content. If people visit other pages on the site they may encounter stories that they know are factual because they have seen them on legitimate news outlets. So, they may then be much more likely to believe the site’s fictional stories as well.

The sites generally make no effort to let readers know which stories are true and which are made up nonsense.

So, don’t get caught out by these tricks. If you come across a news report that sounds a little suss, take a close look at the site’s URL. Does it belong to a genuine news site or is it just designed to make you THINK it does? Have a hunt around. Does the site have a disclaimer somewhere that admits that its material is nonsense?

And, always verify any strange or unusual ‘news’ stories that come your way before you share them on your networks. A quick search via a news aggregator such as Google News will usually reveal if a circulating story is true.

Hoax Slayer

You Might Also Read: 

Fake Facebook Pages Account For 60% Of Social Network Phishing

 

« Take An Analytical Approach To Cybersecurity Training
Cyber Command’s Plan to ‘frustrate’ Hackers Is Working »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Secure Identity Alliance (SIA)

Secure Identity Alliance (SIA)

The Secure Identity Alliance is dedicated to supporting sustainable worldwide economic growth and prosperity through the development of trusted digital identities and the adoption of secure eServices.

Cyber Aware

Cyber Aware

Cyber Aware aims to drive behaviour change amongst small businesses and individuals, so that they adopt simple secure online behaviours.

CommuniTake

CommuniTake

CommuniTake builds security, enablement, and management solutions to provide people and organizations with better, and more secure mobile device use.

Montimage

Montimage

Montimage develops tools for testing and monitoring networks, applications and services; in particular, for the verification of functional, performance (QoS/QoE) and security aspects.

Heidrick & Struggles International

Heidrick & Struggles International

Heidrick & Struggles is a premier provider of leadership consulting and senior-level executive search services for roles including Information & Technology Officers and Cybersecurity.

Upfort

Upfort

Upfort (formerly Paladin Cyber) unifies award-winning security and robust cyber insurance to deliver comprehensive cyber risk solutions.

SearchInform

SearchInform

SearchInform is a leading risk management product developer, protecting business and government institutions against data theft, harmful human behavior, compliance breaches and incomplete audit.

Ribbon Communications

Ribbon Communications

Ribbon Communications delivers global communications software and network solutions to service providers, enterprises, and critical infrastructure sectors.

ChaosSearch

ChaosSearch

ChaosSearch is a massively scalable ELK-compatible log analysis platform delivered as a fully managed service with high-performance and low cost.

Comparitech

Comparitech

Comparitech strives to promote cyber security and privacy for all. We are committed to providing detailed information to help our readers become more cyber secure and cyber aware.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

Chartered Institute of Information Security (CIISec)

Chartered Institute of Information Security (CIISec)

CIISec is dedicated to helping individuals and organisations develop capability and competency in cyber security.

Lucidum

Lucidum

The Lucidum platform helps you assess risk and mitigate vulnerabilities by finding and correlating data from your security tech stack.

Clango

Clango

Clango employs an identity-centric approach to optimizing your cybersecurity investment while minimizing risk.

StrongDM

StrongDM

StrongDM is the leader in Zero Trust Privileged Access Management (PAM).

GetReal Security

GetReal Security

GetReal Security is the world’s leading authority on malicious digital content and deepfake protection.