SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
A Way to figure out false social media network requests.

By 404Whylo

©2013 www.404Whylo.com™ All rights reserved. 26 November, 2013

Hack Back Series:
How to spot fake pictures

1
• Hack back series is all about YOU and how I can contribute to
make the internet a safer place for everyone.

©2011 www.404Whylo.com™ All rights reserved. 26 November, 2013

Summary

2
• Based on the elevation of fake request on social media
platforms I decided to create this short practical guide on how
to spot fake pictures.
• Based on a real life LinkedIn request I will show you some
tricks in spotting fake pictures very easily.
• Follow the steps and try it out yourself.

©2011 www.404Whylo.com™ All rights reserved. 26 November, 2013

How to spot fake pictures

3
Check also for the e-mail
address of the connection
request. If the e-mail
address is suspicious then
try to write to the persons email address and wait for a
reply. Or ask the person if
he or she can confirm the
e-mail or write back from
the claimed place of work.
In this example you could
ask the person to write you
an e-mail from the company
e-mail account (Dell).

©2011 www.404Whylo.com™ All rights reserved. 26 November, 2013

The profile of the request

4
• Right click on the profile picture of the person and do a Google
search (i.e. Search Google for this image).
• By the way if there is no profile picture of the person who
wants to connect to you this is maybe also is not a good sign of
a legitimate profile.

©2011 www.404Whylo.com™ All rights reserved. 26 November, 2013

Right profile picture

5
This easy search
reveals already that
this
picture
is
probably from a job
search webpage. If
this where a true
person you might
would find multiple
pictures in different
contexts which then
can confirm it’s a real
person.

©2011 www.404Whylo.com™ All rights reserved. 26 November, 2013

The results…

6
• Advanced profile picture search (with
the help of http://www.tineye.com/ ) .
Just to let you know I am in no way
affiliated with http://www.tineye.com/
nor do I get any incentives,
endorsements etc. etc. It’s a tool and
it’s free and it works. It helps to protect
you so just try it at your discretion.
• First go to the profile picture:
• Then right click on the profile picture
and select “Copy image URL” After
that open a new browser window for
http://www.tineye.com/ There you can
paste the image URL in the ENTER
image Address box and click search .

©2011 www.404Whylo.com™ All rights reserved. 26 November, 2013

Tineye advance search

7
As you can see the
picture is all over
the place, the exact
same
picture.
Conclusion:
this
cannot be an actual
picture of a real
person
therefore
you should not
actually
connect
with this person

©2011 www.404Whylo.com™ All rights reserved. 26 November, 2013

Tineye results

8
©2011 www.404Whylo.com™ All rights reserved. 26 November, 2013

Thanks and don’t
forget to have
fun!
9

Weitere ähnliche Inhalte

Andere mochten auch

Yahoo For You - Services and Libraries
Yahoo For You - Services and LibrariesYahoo For You - Services and Libraries
Yahoo For You - Services and LibrariesChristian Heilmann
 
Jack the ripper who is this -by andré
Jack the ripper  who is this -by andréJack the ripper  who is this -by andré
Jack the ripper who is this -by andréAndré Stanley
 
The Yorkshire Ripper
The Yorkshire RipperThe Yorkshire Ripper
The Yorkshire RipperDani Cathro
 
[Computer] hacking for dummies how to learn to hack in easy steps
[Computer] hacking for dummies   how to learn to hack in easy steps[Computer] hacking for dummies   how to learn to hack in easy steps
[Computer] hacking for dummies how to learn to hack in easy stepsLee Toulouse
 
Hack 101 @ HackU - IIT Madras
Hack 101 @ HackU - IIT MadrasHack 101 @ HackU - IIT Madras
Hack 101 @ HackU - IIT Madrasknutties
 
Jack the Ripper - presentation.
Jack the Ripper - presentation.Jack the Ripper - presentation.
Jack the Ripper - presentation.Ceci Zzr
 
Password Attack
Password Attack Password Attack
Password Attack Sina Manavi
 
"Hack The Interview" BSidesCT 2011
"Hack The Interview" BSidesCT 2011"Hack The Interview" BSidesCT 2011
"Hack The Interview" BSidesCT 2011jadedsecurity
 

Andere mochten auch (17)

Jacktheripper
JacktheripperJacktheripper
Jacktheripper
 
Diccionario virtual 2
Diccionario virtual 2Diccionario virtual 2
Diccionario virtual 2
 
Yahoo For You - Services and Libraries
Yahoo For You - Services and LibrariesYahoo For You - Services and Libraries
Yahoo For You - Services and Libraries
 
Seminar1
Seminar1Seminar1
Seminar1
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Hacking 101
Hacking 101Hacking 101
Hacking 101
 
Jack the ripper who is this -by andré
Jack the ripper  who is this -by andréJack the ripper  who is this -by andré
Jack the ripper who is this -by andré
 
The Yorkshire Ripper
The Yorkshire RipperThe Yorkshire Ripper
The Yorkshire Ripper
 
Advances in Open Source Password Cracking
Advances in Open Source Password CrackingAdvances in Open Source Password Cracking
Advances in Open Source Password Cracking
 
[Computer] hacking for dummies how to learn to hack in easy steps
[Computer] hacking for dummies   how to learn to hack in easy steps[Computer] hacking for dummies   how to learn to hack in easy steps
[Computer] hacking for dummies how to learn to hack in easy steps
 
Hack 101 @ HackU - IIT Madras
Hack 101 @ HackU - IIT MadrasHack 101 @ HackU - IIT Madras
Hack 101 @ HackU - IIT Madras
 
Jack the ripper
Jack the ripperJack the ripper
Jack the ripper
 
Jack The Ripper
Jack The RipperJack The Ripper
Jack The Ripper
 
Jack the Ripper - presentation.
Jack the Ripper - presentation.Jack the Ripper - presentation.
Jack the Ripper - presentation.
 
Password Attack
Password Attack Password Attack
Password Attack
 
Georgia Tech Hack Day
Georgia Tech Hack DayGeorgia Tech Hack Day
Georgia Tech Hack Day
 
"Hack The Interview" BSidesCT 2011
"Hack The Interview" BSidesCT 2011"Hack The Interview" BSidesCT 2011
"Hack The Interview" BSidesCT 2011
 

Mehr von Reputelligence

Sicherheit welche gefahren durch drohnen drohen golem.de
Sicherheit  welche gefahren durch drohnen drohen   golem.deSicherheit  welche gefahren durch drohnen drohen   golem.de
Sicherheit welche gefahren durch drohnen drohen golem.deReputelligence
 
Intensity levels social engineering engagement framework (seef) first cut d...
Intensity levels social engineering engagement framework (seef)   first cut d...Intensity levels social engineering engagement framework (seef)   first cut d...
Intensity levels social engineering engagement framework (seef) first cut d...Reputelligence
 
Artikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup ProcessArtikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup ProcessReputelligence
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSReputelligence
 
The real- wolfpack story 2
The  real- wolfpack story 2The  real- wolfpack story 2
The real- wolfpack story 2Reputelligence
 
Quantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementQuantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementReputelligence
 
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...Reputelligence
 
Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Reputelligence
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Reputelligence
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Reputelligence
 
Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Reputelligence
 
Teaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationTeaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationReputelligence
 
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Reputelligence
 
Seef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbSeef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbReputelligence
 
Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence
 
Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence
 
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?Reputelligence
 
Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence
 
SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)Reputelligence
 
Security agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rolloutSecurity agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rolloutReputelligence
 

Mehr von Reputelligence (20)

Sicherheit welche gefahren durch drohnen drohen golem.de
Sicherheit  welche gefahren durch drohnen drohen   golem.deSicherheit  welche gefahren durch drohnen drohen   golem.de
Sicherheit welche gefahren durch drohnen drohen golem.de
 
Intensity levels social engineering engagement framework (seef) first cut d...
Intensity levels social engineering engagement framework (seef)   first cut d...Intensity levels social engineering engagement framework (seef)   first cut d...
Intensity levels social engineering engagement framework (seef) first cut d...
 
Artikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup ProcessArtikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup Process
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
 
The real- wolfpack story 2
The  real- wolfpack story 2The  real- wolfpack story 2
The real- wolfpack story 2
 
Quantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementQuantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk management
 
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
 
Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...
 
Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef
 
Teaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationTeaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentation
 
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
 
Seef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbSeef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcb
 
Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"
 
Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example
 
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
 
Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3
 
SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)
 
Security agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rolloutSecurity agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rollout
 

Kürzlich hochgeladen

IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...AJHSSR Journal
 
social media for the hospitality industry.
social media for the hospitality industry.social media for the hospitality industry.
social media for the hospitality industry.japie swanepoel
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer MarketingCut-the-SaaS
 
Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...SejarahLokal
 
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfYouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfAlexander Sirach
 
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...baharayali
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer MarketingCut-the-SaaS
 
Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!andrekr997
 
办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书saphesg8
 
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In DubaiDubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In Dubaihf8803863
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一ra6e69ou
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosSocioCosmos
 
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170Komal Khan
 
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...jicagig173
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...SocioCosmos
 

Kürzlich hochgeladen (20)

IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
 
social media for the hospitality industry.
social media for the hospitality industry.social media for the hospitality industry.
social media for the hospitality industry.
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer Marketing
 
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
 
Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...
 
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfYouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
 
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer Marketing
 
Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!
 
办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书
 
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In DubaiDubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
 
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
 
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
 
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In  Vinod Nagarlooking for escort 9953056974 Low Rate Call Girls In  Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio Cosmos
 
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
 
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...
 
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
 

Hack back series how to spot fake pictures- a way to figure out false social media network requests v0.2

  • 1. A Way to figure out false social media network requests. By 404Whylo ©2013 www.404Whylo.com™ All rights reserved. 26 November, 2013 Hack Back Series: How to spot fake pictures 1
  • 2. • Hack back series is all about YOU and how I can contribute to make the internet a safer place for everyone. ©2011 www.404Whylo.com™ All rights reserved. 26 November, 2013 Summary 2
  • 3. • Based on the elevation of fake request on social media platforms I decided to create this short practical guide on how to spot fake pictures. • Based on a real life LinkedIn request I will show you some tricks in spotting fake pictures very easily. • Follow the steps and try it out yourself. ©2011 www.404Whylo.com™ All rights reserved. 26 November, 2013 How to spot fake pictures 3
  • 4. Check also for the e-mail address of the connection request. If the e-mail address is suspicious then try to write to the persons email address and wait for a reply. Or ask the person if he or she can confirm the e-mail or write back from the claimed place of work. In this example you could ask the person to write you an e-mail from the company e-mail account (Dell). ©2011 www.404Whylo.com™ All rights reserved. 26 November, 2013 The profile of the request 4
  • 5. • Right click on the profile picture of the person and do a Google search (i.e. Search Google for this image). • By the way if there is no profile picture of the person who wants to connect to you this is maybe also is not a good sign of a legitimate profile. ©2011 www.404Whylo.com™ All rights reserved. 26 November, 2013 Right profile picture 5
  • 6. This easy search reveals already that this picture is probably from a job search webpage. If this where a true person you might would find multiple pictures in different contexts which then can confirm it’s a real person. ©2011 www.404Whylo.com™ All rights reserved. 26 November, 2013 The results… 6
  • 7. • Advanced profile picture search (with the help of http://www.tineye.com/ ) . Just to let you know I am in no way affiliated with http://www.tineye.com/ nor do I get any incentives, endorsements etc. etc. It’s a tool and it’s free and it works. It helps to protect you so just try it at your discretion. • First go to the profile picture: • Then right click on the profile picture and select “Copy image URL” After that open a new browser window for http://www.tineye.com/ There you can paste the image URL in the ENTER image Address box and click search . ©2011 www.404Whylo.com™ All rights reserved. 26 November, 2013 Tineye advance search 7
  • 8. As you can see the picture is all over the place, the exact same picture. Conclusion: this cannot be an actual picture of a real person therefore you should not actually connect with this person ©2011 www.404Whylo.com™ All rights reserved. 26 November, 2013 Tineye results 8
  • 9. ©2011 www.404Whylo.com™ All rights reserved. 26 November, 2013 Thanks and don’t forget to have fun! 9