Four Ways That Fake-News Sites Trick People

Many fake-news websites have appeared online in recent years. And more seem to be springing up all the time. Between them, they manage to churn out a seemingly endless stream of driveling nonsense, at least some of which gets shared far and wide via social media.
 
Fake-news sites are successful because many people believe and therefore share their false reports. The more such stories are seen and shared, the more visitors the sites will get and the more money they generate for their owners.

So how do such sites trick people into believing and sharing their nonsensical stories?

Here are several techniques they use to achieve this:

1: They use URL’s That Look Like Legitimate News Site Web Addresses

Many of the sites use web addresses that appear to belong to genuine and well-known news sites. For example, one site that is responsible for a number of reports that falsely claim that various celebrities have died calls itself ‘msmbc’ and includes the letters ‘msmbc’ in its web address.

Visitors who just glance at the name and web address may be tricked into thinking the site belongs to the television news network ‘msnbc’, which is owned by US news giant NBC. Many people will not notice that ‘m’ is swapped for ‘n’ in the fake site’s name and URL.

Other fake news sites take the deception a step further by using a web address that is identical to the targeted news site except that ‘.co’ is added at the end. For example, another fake-news site has the web address ‘nbc.com.co’.

Many visitors will glance at the familiar ‘nbc.com’ part of the address and will not even realise that the added “.co” means that they are not on a real NBC website at all. There are more and more of these deceptive “.co” websites appearing.

Keep in mind that it is very easy for unscrupulous people to register a domain name that appears to be associated with a high profile news site and build a fake website that capitalises on this false association.

2: They present fake stories in news format

The fictional reports on fake-news sites are usually designed to look like genuine news reports. They use news style headlines, and are written in a way that emulates the journalistic style of popular news outlets. Like real news reports, the fake stories often include quotes from a relevant expert or official spokesperson to support their claims.

However, the expert or spokesperson is imaginary and the quotes are simply made up.

Sometimes, the fake reports even link to other websites that seemingly back up their bogus claims. But, the linked website will itself be fake and may have even been created by the same people.

3: They hide their disclaimer or don’t even have one:

Some fake-news sites do have a disclaimer explaining that their content is fictional or satirical. That would be fine if the disclaimer was displayed where people who read the fake reports might actually see it. But, the disclaimer is often buried in an ‘About’ or ‘Terms of Service’ page that many people will not visit.

Or, the disclaimer might be included in the footer of the site’s pages. Again, many people will not see this disclaimer because they are unlikely to scroll down far enough.

And, alas, some fake-news sites don’t have any meaningful disclaimer at all.

4: They mix true stories with fictional reports

An emerging trend on such sites is to mix true stories with fictional content. If people visit other pages on the site they may encounter stories that they know are factual because they have seen them on legitimate news outlets. So, they may then be much more likely to believe the site’s fictional stories as well.

The sites generally make no effort to let readers know which stories are true and which are made up nonsense.

So, don’t get caught out by these tricks. If you come across a news report that sounds a little suss, take a close look at the site’s URL. Does it belong to a genuine news site or is it just designed to make you THINK it does? Have a hunt around. Does the site have a disclaimer somewhere that admits that its material is nonsense?

And, always verify any strange or unusual ‘news’ stories that come your way before you share them on your networks. A quick search via a news aggregator such as Google News will usually reveal if a circulating story is true.

Hoax Slayer

You Might Also Read: 

Fake Facebook Pages Account For 60% Of Social Network Phishing

 

« Take An Analytical Approach To Cybersecurity Training
Cyber Command’s Plan to ‘frustrate’ Hackers Is Working »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Encode

Encode

Encode delivers a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Services.

Exprivia

Exprivia

Exprivia is active in the design, development and integration of IT systems including cyber security.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies provides artificial intelligence solutions and information security solutions.

NovaTech Automation

NovaTech Automation

NovaTech products and services make the world’s power grids and essential process industries more reliable, efficient, sustainable and secure.

AntemetA

AntemetA

AntemetA specializes in network infrastructure, security and cloud computing, helping companies transform their Information Systems.

OneSpan

OneSpan

OneSpan (formerly Vasco Data Security) is a global leader in digital identity security, transaction security and business productivity.

Cybersecurity Tech Accord

Cybersecurity Tech Accord

The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies.

International Accreditation Forum (IAF)

International Accreditation Forum (IAF)

The IAF is the world association of Conformity Assessment Accreditation Bodies. Its primary function is to develop a single worldwide programme of conformity assessment.

Center for Cyber & Homeland Security (CCHS)

Center for Cyber & Homeland Security (CCHS)

The Center for Cyber and Homeland Security at Auburn University is a nonpartisan think tank that works to develop innovative strategies to address current and future threats to the United States.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.

Knowledge Lens

Knowledge Lens

Knowledge Lens builds innovative solutions on niche technology areas such as Big Data Analytics, Data Science, Artificial Intelligence, Internet of Things, Augmented Reality, and Blockchain.

Bores Security Consultancy

Bores Security Consultancy

Bores Security Consultancy are an established family-run business delivering expertise in security and technology.

Intel Ignite

Intel Ignite

Intel Ignite is an internationally renowned acceleration program for early-stage deep tech startups.

Thoropass

Thoropass

Thoropass (formerly Laika) helps you get and stay compliant with smart software and expert services.

Cyver Core

Cyver Core

Cyver Core is a pentest management and pentest report automation platform that consolidates cybersecurity work, automates overhead, and frees cybersecurity professionals up for the work that matters.