Medium RISK actions
Action | Type | Description |
Friend | Request | Protects trusted social media users from fraudulent friend requests. Bad actors may attempt to establish connections in order to add credibility to fake profiles and synthetic identities or as part of a link farming scheme. |
Post | Blog | Protects against attempts to post blog content from an account that’s been taken over. Bad actors may post blogs to harass individuals or businesses, harm their reputations, or spread misinformation. |
QnA | Protects against attempts to post misleading or inappropriate content to sites that provide crowd-sourced questions and answers. Bad actors, often synthetic identities, may intend to spread misinformation or create links back to a site in order to artificially inflate SEO. Question-and-answer abuse may involve a single account or multiple accounts that both post and comment. | |
Social | Enables trusted users to post to social media sites while safeguarding against posts from accounts that have been taken over or from accounts based on synthetic identities. Bad actors may post to social sites in order to harm the reputations of businesses or consumers, spread misinformation, or as part of a link farming scheme. It may involve a single social account or multiple accounts that both post and comment. | |
Profile | Social | Catches malicious attempts to modify social media profile pages. Bad actors may change a profile in order to damage the public identity of a consumer or business, potentially harming its reputation. |
Review | Product | Protects from attempts to product manipulate reviews. Unscrupulous business owners may abuse review sites by using friends, families, and for-hire reviewers in order to spam a competitor with negative reviews. |
Business | Protects from attempts to manipulate reviews for businesses. Unscrupulous business owners may abuse review sites by using friends, families, and even for-hire review farms in order to spam a competitor with negative reviews. | |
Signup | Free | Protects from bad actors who sign up for free sites and services with the express goal of abusing them. Fraudsters may use social engineering methods to gather sensitive personal information about other members. They may spread misinformation or seek to disrupt otherwise stable communities. Pipl Trust confirms trustworthiness before you grant access, for example by detecting attempts to synthesize fake identities. |
Marketplace.Buyer | Protects from malicious attempts to gain access to marketplace sites as a buyer. Fraudsters may attempt to purchase goods with stolen credit cards or other payment methods. They may also collude with fraudulent seller accounts to artificially influence reviews or manipulate demand and pricing. | |
Social | Protects from bad actors who sign up for social media sites with the express goal of abusing them. Fraudsters may use social engineering methods to gather sensitive personal information about other members. They may spread misinformation, seek to disrupt otherwise stable communities or cyber-stalk individuals. Pipl Trust confirms trustworthiness before you grant access, for example by detecting attempts to synthesize fake identities. |