{"id":74795,"date":"2017-06-06T08:24:14","date_gmt":"2017-06-06T15:24:14","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=74795"},"modified":"2025-08-26T01:28:11","modified_gmt":"2025-08-26T08:28:11","slug":"curbing-threat-fake-accounts","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/","title":{"rendered":"Curbing The Threat Of Fake Accounts"},"content":{"rendered":"<p>My bubbly teen was so excited the day she found Priyanka Chopra had started following her on Twitter. She was literally hopping around the room, squealing in delight. As a parent and my daughter\u2019s cybersafety guide, I checked her page to confirm and what I saw made me sad but I had to burst her bubble.<\/p>\n<p>\u201c<em>No darling, that\u2019s not the real Priyanka Chopra following you but a fake twitter account. See <\/em>here <a href=\"https:\/\/twitter.com\/priyankachopra\">@priyankachopra\u00a0\u200f<\/a>,<em> this is her original handle. And see this blue tick &#8211; it means Twitter has validated this account to be a genuine one as it usually verifies popular accounts.\u201d<\/em><\/p>\n<p><em>\u201cWhy do people create fake accounts then?<\/em>\u201d ranted the peeved teen, as she angrily blocked the fake handle. <em>(It\u2019s painful to lose a celeb follower on social media you know.)<\/em><\/p>\n<p>Why indeed? Why do people create false accounts on social media sites like Twitter, Instagram, LinkedIn and Facebook? For the same reason why we have fakes\/imitations in the real world; someone stands to gain from it, or leverage it to make mischief.<\/p>\n<p>Are the number of fake accounts significant enough to warrant attention and action? It apparently is. According to a research carried out by a graduate student at UCL recently, there are more than 500,000 fake accounts on Twitter alone, for instance, Deepika Padukone\u2019s account <a href=\"https:\/\/twitter.com\/Deepika_Officia\">(@Deepika_Officia<\/a>). Fake LinkedIn accounts of company CEOs is a common way to fraud job seekers signing up on the site. Another big fake account source is the duplication of celebrity accounts and hapless fans often end up following the fake account online. These can do major harm by sharing false or inappropriate content. Fake accounts are also created to boost follower counts, share incendiary or dishonest messages, create trending topics, send spam, troll and abuse users, launch scam or phishing attacks or set traps for na\u00efve children.<\/p>\n<p>Fake account creators bank on the intrinsic trusting nature of users that lead them to believe in the authenticity of an account. They leverage this trust to swindle, bully, defame the person or others. So, the thing to do is to be skeptical and vigilant.<\/p>\n<h2><strong>Identifying fake accounts on social media:<\/strong><\/h2>\n<p>This is not an easy task by any means, but still we need to be vigilant to avoid risks. Here are a few pointers that will help you stay safer online:<\/p>\n<ul>\n<li><strong>Absent:<\/strong> The account does not engage in real-time conversations much<\/li>\n<li><strong>Mechanic:<\/strong> Repeats a single message and tags several accounts at random<\/li>\n<li><strong>Agenda:<\/strong> Shares false, inappropriate or suspicious content consistently. Sometimes engages in trolling or bullying and apart from it, does not share any tangible storyline or views<\/li>\n<li><strong>Inadequate identity:<\/strong> A Twitter handle without a profile image<\/li>\n<li><strong>Imposters: <\/strong>New friend requests from existing friends, not to mention those suspicious favors asked online. The moment you come across a duplicate or fake account, flag and report it. That way the sites would know of its existence and take remedial actions. And never be in a hurry to accept friend\/follow requests. Take your time. Check the account profile, posts and friend list. Then decide. Do not trust blindly- each new friend or follower need to earn your trust before you interact with the account. Remember to be a true Doubting Thomas when online. STOP. THINK. CONNECT.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>My bubbly teen was so excited the day she found Priyanka Chopra had started following her on Twitter. She was&#8230;<\/p>\n","protected":false},"author":674,"featured_media":157223,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,12],"tags":[],"coauthors":[3973],"class_list":["post-74795","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-family-safety"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Curbing The Threat Of Fake Accounts | McAfee Blog<\/title>\n<meta name=\"description\" content=\"My bubbly teen was so excited the day she found Priyanka Chopra had started following her on Twitter. She was literally hopping around the room, squealing\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Curbing The Threat Of Fake Accounts | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"My bubbly teen was so excited the day she found Priyanka Chopra had started following her on Twitter. She was literally hopping around the room, squealing\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-06T15:24:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-26T08:28:11+00:00\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Curbing The Threat Of Fake Accounts\",\"datePublished\":\"2017-06-06T15:24:14+00:00\",\"dateModified\":\"2025-08-26T08:28:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/\"},\"wordCount\":554,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_deleting_account.png\",\"articleSection\":[\"Internet Security\",\"Family Safety\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/\",\"name\":\"Curbing The Threat Of Fake Accounts | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_deleting_account.png\",\"datePublished\":\"2017-06-06T15:24:14+00:00\",\"dateModified\":\"2025-08-26T08:28:11+00:00\",\"description\":\"My bubbly teen was so excited the day she found Priyanka Chopra had started following her on Twitter. She was literally hopping around the room, squealing\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_deleting_account.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_deleting_account.png\",\"width\":614,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Family Safety\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Curbing The Threat Of Fake Accounts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Curbing The Threat Of Fake Accounts | McAfee Blog","description":"My bubbly teen was so excited the day she found Priyanka Chopra had started following her on Twitter. She was literally hopping around the room, squealing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Curbing The Threat Of Fake Accounts | McAfee Blog","og_description":"My bubbly teen was so excited the day she found Priyanka Chopra had started following her on Twitter. She was literally hopping around the room, squealing","og_url":"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-06-06T15:24:14+00:00","article_modified_time":"2025-08-26T08:28:11+00:00","author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Curbing The Threat Of Fake Accounts","datePublished":"2017-06-06T15:24:14+00:00","dateModified":"2025-08-26T08:28:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/"},"wordCount":554,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_deleting_account.png","articleSection":["Internet Security","Family Safety"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/","url":"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/","name":"Curbing The Threat Of Fake Accounts | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_deleting_account.png","datePublished":"2017-06-06T15:24:14+00:00","dateModified":"2025-08-26T08:28:11+00:00","description":"My bubbly teen was so excited the day she found Priyanka Chopra had started following her on Twitter. She was literally hopping around the room, squealing","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_deleting_account.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_deleting_account.png","width":614,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/curbing-threat-fake-accounts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Family Safety","item":"https:\/\/www.mcafee.com\/blogs\/family-safety\/"},{"@type":"ListItem","position":3,"name":"Curbing The Threat Of Fake Accounts"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/74795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=74795"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/74795\/revisions"}],"predecessor-version":[{"id":221133,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/74795\/revisions\/221133"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/157223"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=74795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=74795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=74795"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=74795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}