Today we know that LinkedIn removed around 35 million profiles that were review as fake profiles, but the problem is that these continue to appear. Many people have been reporting a series of fake profiles to LinkedIn and the matter does not seem to end.

However, if so many people report them, why do they keep popping up?

  • Well, it must be said that PORPS like them for several reasons, among which we can mention:
  • It is free, but it is also super cheap if you want to configure it.
  • It is very easy to use, if you want to use it in a malicious and nefarious way.
  • They are easy to remove, since they can get too hot or, on the other hand, the platform can turn them off.
  • They are easily and infinitely replaceable

How to use the PERP these burner profiles?

  • They follow you, engage with your posts and profile, then trust, and send a request to connect.
  • They start to use the new association that they have with their account to be able to fool others in their network and thus get them to connect.
  • The next step is to gain trust and in this way, click on a link that has malicious content and in this way; you can expose your passwords and username, and gain control of your mobile phone or computer.
  • They can download your files and your connections.
  • They easily abuse your email and your messages and even worse your reputation as they begin to send messages with malicious links to all your contacts, on your behalf.
  • Finally, they end up blocking your computer or your profile to ask for something in exchange for giving you back your information.

How can you stay protected from these attacks?

  • Always keep Follow first on.
  • Always request your email so that it always sends you a connection request notice.
  • Before accepting a new contact, review their profiles.
  • Read comments and if they are suspicious, delete them immediately.
  • If you think a profile is false, be sure to report it as soon as possible.
  • What can LinkedIn do to eliminate the number of fake profiles that appear?
  • Create verified accounts, always requesting CC on behalf of the user who is requesting to join.
  • Generate an option controlled by users to block the request to connect with someone, from the categories of members.
  • Another option that is controlled by the members to allow them to have previously interacted with the member who is requesting connection for a while.

Sharon Callix
Multi Award Winning Social Media Expert
International Speaker
Platinum Expert Author Ezinesarticles
www.sharoncallix.com