Friday, March 29, 2024

Facebook Removed 559 Pages and 251 Accounts For Breaking Rules Ahead of US Midterm Elections

Facebook removed accounts and pages for spam and coordinated inauthentic behavior. The pages and account are taken down involved in activities of driving fake traffic to the websites seem legitimate, but are actually ad farms.

The social media against said on Tuesday that they removed 559 Pages and 251 accounts that have consistently broken our rules against spam and coordinated inauthentic behavior.

Facebook enforced the policy against many pages, groups, and accounts created in motivating the political debate, including in the US, the Middle East, Russia, and the UK.

“Most politically motivated activity we’ve seen, the “news” stories or opinions these accounts and Pages share are often indistinguishable from the legitimate political debate”, the company added.

“Topics like natural disasters or celebrity gossip have been popular ways to generate clickbait. But today, these networks increasingly use sensational political content – regardless of its political slant,” reads the Facebook blog post.

The company said the common type of spam has been posts that hawk fraudulent products like fake sunglasses or weight loss “remedies.” But a lot of the spam we see today is different.

“Many people using fake accounts or multiple accounts and posts the same contents across all the pages and groups to drive huge traffic to their website and Many used the same techniques to make their content appear more popular,” said Oscar Rodriguez, Facebook Product Manager.

Facebook said the taken down accounts and pages are often used to dozens of clickbait and artificially inflates engagement for their inauthentic Pages and posts they share.

According to the New York Times, who obtains a list of some pages removed, shows some popular pages have been removed. “Among them were Right Wing News, which had more than 3.1 million followers, and left-wing pages that included the Resistance and Reverb Press, which had 240,000 and 816,000 followers.”

Recently Facebook admitted security breach, hackers steal more than 50 million accounts access tokens by exploiting a bug in View As a feature.

Related Read

Hackers Selling Facebook Account Logins Details On Dark Web For $3

Facebook Launches Open Source Library Fizz To Enhance TLS 1.3 Protocol

Popular Facebook Quiz App that Exposes 120 Million Users Personal Data Publicly

Website

Latest articles

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles