{"id":82390,"date":"2020-02-07T14:56:28","date_gmt":"2020-02-07T22:56:28","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=82390"},"modified":"2022-07-26T04:31:52","modified_gmt":"2022-07-26T11:31:52","slug":"how-to-tell-if-an-online-article-is-real-fake-or-a-scam","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/","title":{"rendered":"How to tell if an online article is real, fake or a scam"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/how-do-you-know-if-story-is-real-or-fake\/\" rel=\"attachment wp-att-82732\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-82732\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/how-do-you-know-if-story-is-real-or-fake.png\" alt=\"How to Tell if an Online Article is Real, Fake or a Scam\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/how-do-you-know-if-story-is-real-or-fake.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/how-do-you-know-if-story-is-real-or-fake-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/how-do-you-know-if-story-is-real-or-fake-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>Fake news, scams, and phishing are the plague of our times. It&#8217;s getting increasingly difficult to determine which websites are presenting truthful information.\u00a0I&#8217;m not just talking about political views; people can disagree about those, and while you may not like what you read on certain sites, that doesn&#8217;t mean, as some like to say, &#8220;it&#8217;s fake news.&#8221;<\/p>\n<p>A\u00a0Stanford University\u00a0<a href=\"https:\/\/www.wsj.com\/articles\/most-students-dont-know-when-news-is-fake-stanford-study-finds-1479752576\" target=\"_blank\" rel=\"noopener nofollow\">study<\/a>\u00a0of 7,804 students from middle school through college found that some 82\u00a0percent\u00a0of them\u00a0cannot distinguish between an ad labeled &#8220;sponsored content&#8221; and a real news story on a website.\u00a0These findings present a real risk when visiting\u00a0websites you&#8217;re not familiar with; and, not just for students, for everyone. How can you know if\u00a0what you&#8217;re reading online is telling the truth or trying to scam you either directly\u2014such as by trying to sell you something, or get your personal information\u2014or indirectly, by spreading lies, or by sowing doubt?<\/p>\n<p>In this article, we offer\u00a0a few tips to help you sort the wheat from the chaff on the Internet. These tips will\u00a0help you determine\u00a0if an online article is real, fake or a scam.<\/p>\n<h3 id=\"thename\">Do you recognize the publication name?<\/h3>\n<p>There are publication names you may recognize, and that you can trust \u2014 they may be the major news organizations, such as the New York Times, Forbes or The Wall Street Journal, or even familiar household brands that you know.<\/p>\n<p>However,\u00a0there may be some websites that try to suggest that they belong to a brand. For example, apple-hot-deals.com (this site does not exist, right now) might try to pretend that it&#8217;s an Apple website, but it&#8217;s most likely not. Most brands don&#8217;t use compound domain names in this way, which anyone can register; instead,\u00a0they use URLs such as apple.com\/hotdeals (this also doesn&#8217;t exist).<\/p>\n<p>Here at\u00a0<strong>The\u00a0Mac Security Blog<\/strong>, we use the intego.com domain, and the blog is hosted at www.intego.com\/mac-security-blog\/, proving that it belongs to Intego&#8217;s\u00a0domain.<\/p>\n<p>You can check how long a domain has existed by using a command called &#8220;whois.&#8221;<\/p>\n<p>On older versions of macOS, if you were to go to the top level of your Mac&#8217;s disk, then navigate to \/System\/Library\/CoreServices\/Applications (or on even older macOS versions, \/Applications\/Utilities), you would find an app called Network Utility. If you then launched the app, you could paste a domain copied from your browser&#8217;s address bar, such as intego.com, into the Whois tab:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-82393 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/whois.png\" alt=\"Whois\" width=\"1512\" height=\"994\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/whois.png 1512w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/whois-150x99.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/whois-300x197.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/whois-768x505.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/whois-1024x673.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/whois-305x200.png 305w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/whois-657x432.png 657w\" sizes=\"(max-width: 1512px) 100vw, 1512px\" \/><\/p>\n<p>Starting with macOS Big Sur, the Network Utility has been deprecated, so you&#8217;ll now have to open the Terminal (in \/Applications\/Utilities) instead, and type &#8220;whois&#8221; followed by a space, then paste the copied domain.<\/p>\n<p>When you run the whois query, you&#8217;ll see when the domain was first registered (in Intego&#8217;s case, the Creation Date is in 1997), which can serve as evidence of how long the company has been around.<\/p>\n<p>This isn&#8217;t a guarantee that a site hasn&#8217;t transferred ownership since it was first registered, nor does it indicate whether a site may have been hacked, but seeing how long ago a domain was registered can be a basic step toward confirming a site&#8217;s possible legitimacy. Scam sites often, though not always, use recently registered domains.<\/p>\n<h3 id=\"checkforasecuredomain\">Is the information from a secure site?<\/h3>\n<p>Most websites should be secure these days. Look in the address bar of your browser, and you should see a padlock. This means that the connection to the intego.com website (for example) is secure, using HTTPS. The intego.com domain has a TLS\/SSL certificate, which helps ensure that when you type intego.com, your browser is showing you information served by Intego (as opposed to a theoretical man-in-the-middle attacker).<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-82399 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/address-bar.png\" alt=\"www.intego.com\/mac-security-blog\/\" width=\"619\" height=\"73\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/address-bar.png 619w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/address-bar-150x18.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/address-bar-300x35.png 300w\" sizes=\"(max-width: 619px) 100vw, 619px\" \/><\/p>\n<p>This said, anyone can purchase an SSL certificate for any domain they own, but the lack of HTTPS security is something to be wary of. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/6-cyber-security-tips-for-holiday-shopping-online\/\" target=\"_blank\" rel=\"noopener\"><strong>(RELATED: 6 Cyber Security Tips to Ensure a Website is Secure.)<\/strong><\/a><\/p>\n<h3 id=\"gettingintouch\">Are you able to contact the site owner or company?<\/h3>\n<p>Legitimate websites nearly always have a Contact section featuring an email address, a form, or some other way to get in touch with the site&#8217;s maintainers. Most business sites should also have one or more postal addresses of offices, and a phone number. Again, this isn&#8217;t hard and fast proof of legitimacy, but if you try to contact the company and find that a real person replies, this can at least help you confirm that someone is vouching for it.<\/p>\n<p>Businesses in the United States may show up on the <a href=\"https:\/\/www.bbb.org\/\" target=\"_blank\" rel=\"noopener nofollow\">Better Business Bureau<\/a> website. You won&#8217;t find every business there, but you will find reviews for some businesses.<\/p>\n<h3 id=\"usegoogle\">Did you\u00a0run a\u00a0search on it?<\/h3>\n<p>You can check most search engines to find information on just about anything, and you might want to try searching for a company or publication that runs the site you&#8217;re curious about. You should see their own domain near the top of the list, but one way to see how much of a footprint a company has is to search for links to a company from other sites.<\/p>\n<p>Google used to have a link: search operator, so if you searched for link:intego.com you would get more than 400,000 results of links to pages on the Intego website. Unfortunately, <a href=\"https:\/\/searchengineland.com\/google-officially-killed-off-link-command-267454\" target=\"_blank\" rel=\"noopener\">Google killed off the link: operator<\/a> in 2017. Instead, you can try just searching for the domain or company name whose reputation you&#8217;re trying to establish.<\/p>\n<div id=\"attachment_82396\" style=\"width: 1139px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-82396\" loading=\"lazy\" class=\"wp-image-82396 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google.png\" alt=\"link:intego.com\" width=\"1129\" height=\"308\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google.png 1129w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google-150x41.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google-300x82.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google-768x210.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google-1024x279.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google-657x179.png 657w\" sizes=\"(max-width: 1129px) 100vw, 1129px\" \/><p id=\"caption-attachment-82396\" class=\"wp-caption-text\">Google used to have a link: search operator to help identify authoritative sites that linked back to a domain.<\/p><\/div>\n<h3 id=\"checkthespelling\">Have you checked the spelling\u00a0within the article?<\/h3>\n<p>Yes, anyone can make <em>miskates<\/em> and end up with <em>tyops<\/em> on a <em>wesbite<\/em>, and anyone can run a spell checker, but scam sites are often set up by people whose native language is not English (or the language of the site you&#8217;re visiting), and poor language can be a clue that something is amiss. Similarly, you may also find look-alike characters where you would expect to see English alphabet letters.<\/p>\n<p>Some scammy pages generate their content by scraping text from a legitimate site, and using automated methods to swap out some words from the original with synonyms. Scam pages presumably do this in hopes that search engines won&#8217;t punish them with lower search engine rankings for blatantly plagiarizing content from a more popular site. However, this robotic word-swapping often results in awkward sentences that don&#8217;t always make sense. If you&#8217;ve ever used a thesaurus, you&#8217;ll understand why; not every listed synonym for a word is necessarily a perfect fit in every circumstance.<\/p>\n<h3 id=\"thearticlecanbefactchecked\">Did you\u00a0fact-check the story?<\/h3>\n<p>You can generally trust the more authoritative websites to be honest and accurate, especially if they routinely offer corrections to address errors when they find them. The established newspapers, the well-known magazines, and the TV networks that have been around for a long time have traditionally been fairly trustworthy when it comes to reporting facts (at least when it comes to non-partisan, widely agreed-upon topics). That said, don&#8217;t assume that everything you read, even from known sites, is truthful information; fact-check it first.<\/p>\n<p>Fact-checking a story isn&#8217;t always easy, but some topics can be checked on sites like <a href=\"https:\/\/www.snopes.com\" target=\"_blank\" rel=\"noopener nofollow\">Snopes<\/a>. This independent fact-checking website roots out bogus ideas and gives clear evidence for its findings. These days, Snopes covers a lot of politics and policy (with a left-leaning bias), but one recent article asks, <a href=\"https:\/\/www.snopes.com\/fact-check\/snake-in-milk-jug\/\" target=\"_blank\" rel=\"noopener nofollow\">Is This a Picture of a Snake Found in a Milk Jug<\/a>? (Spoiler: it&#8217;s Photoshopped.) Historically, Snopes has been a good way to find out if those forwarded e-mails or memes that spread on social media are true or not.<\/p>\n<p>While fact-checking a story sounds simple enough, a 2016 Rasmussen <a href=\"https:\/\/www.rasmussenreports.com\/public_content\/politics\/general_politics\/september_2016\/voters_don_t_trust_media_fact_checking\" target=\"_blank\" rel=\"noopener nofollow\">poll<\/a> found that 62 percent of American voters believed fact checkers are biased. James Taranto, an editor at the Wall Street Journal, actually tweeted that fact-checking &#8220;is opinion journalism pretending to be some sort of heightened objectivity.&#8221;<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">&quot;Fact checking&quot; is opinion journalism pretending to some sort of heightened objectivity. Very bad for journalism. <a href=\"https:\/\/t.co\/LqojbRrN8Z\">https:\/\/t.co\/LqojbRrN8Z<\/a><\/p>\n<p>&mdash; James Taranto (@jamestaranto) <a href=\"https:\/\/twitter.com\/jamestaranto\/status\/780175473410187264?ref_src=twsrc%5Etfw\">September 25, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>So how do you know who to trust? Can you believe everything you read from just one site?\u00a0<a href=\"https:\/\/www.washingtontimes.com\/news\/2016\/sep\/26\/eight-examples-where-fact-checking-became-opinion-\/\" target=\"_blank\" rel=\"noopener nofollow\">Few publications are wholly balanced<\/a>, and bear in mind that the opinion and editorial sections of websites and publications are not meant to be such; instead, they are meant to present the individual opinions of columnists and authors.<\/p>\n<p>The best way to spot fake news is to read widely, and not just in a silo of websites or publications that echo your beliefs. Of course, it&#8217;s important to find the right sources for your reading. If you&#8217;re a liberal, find conservative websites that aren&#8217;t virulent or sensationalist, and if you&#8217;re a conservative, do the same for liberal-leaning publications. AllSides has a helpful <a href=\"https:\/\/www.allsides.com\/media-bias\/media-bias-chart\" target=\"_blank\" rel=\"noopener nofollow\">Media Bias Chart<\/a> that shows how various news media outlets tend to fall on political issues.<\/p>\n<p>AllSides also publishes a <a href=\"https:\/\/www.allsides.com\/media-bias\/fact-check-bias-chart\" target=\"_blank\" rel=\"noopener nofollow\">Fact Check Bias Chart<\/a> that shows where on the political spectrum many popular fact-checking sites tend to fall (with community votes showing to what degree site visitors concur).<\/p>\n<p>A few sites related to the whole &#8220;fact checking&#8221; genre include:<\/p>\n<p style=\"padding-left: 30px;\"><strong><a href=\"https:\/\/www.realclearpolitics.com\/fact_check_review\/\" target=\"_blank\" rel=\"noopener nofollow\">Fact Check Review<\/a><\/strong>: RealClearPolitics (RCP) is a\u00a0Chicago-based\u00a0media group of\u00a0experienced journalists who aim to deliver\u00a0better, more insightful analysis of the most important news and policy issues of the day. Each week in its Fact Check Review, RCP &#8220;watches the watchdog&#8221; and offers a review of fact-checking outlets that Facebook uses for guidance. This project reviews only those fact checks bearing on civic and public concern.<\/p>\n<p style=\"padding-left: 30px;\"><strong><a href=\"https:\/\/checkyourfact.com\" target=\"_blank\" rel=\"noopener nofollow\">Check Your Fact<\/a><\/strong>: A\u00a0very well sourced\u00a0fact-checking news site produced by the journalists of the Daily Caller, with a non-partisan mission to fact check statements by influencers, as well as reporting by other news outlets.<\/p>\n<p style=\"padding-left: 30px;\"><strong><a href=\"https:\/\/www.factcheck.org\" target=\"_blank\" rel=\"noopener nofollow\">FactCheck.org<\/a><\/strong>: A nonprofit website, funded by the Annenberg Foundation, that identifies\u00a0as a non-partisan &#8220;consumer advocate for voters.&#8221; Its\u00a0mission is to reduce the level of deception and confusion in U.S. politics.<\/p>\n<p style=\"padding-left: 30px;\"><strong><a href=\"https:\/\/www.politifact.com\" target=\"_blank\" rel=\"noopener nofollow\">PolitiFact<\/a><\/strong>: Acquired by the Poynter Institute in 2018, PolitiFact utilizes reporters and editors from the Tampa Bay Times and affiliated media outlets to &#8220;fact check statements by members of Congress, the White House, lobbyists and interest groups.&#8221; They publish original statements and their evaluations on its website, and assign each a &#8220;Truth-O-Meter&#8221; rating. (Note: left-leaning political bias)<\/p>\n<p style=\"padding-left: 30px;\"><strong><a href=\"https:\/\/www.washingtonpost.com\/news\/fact-checker\" target=\"_blank\" rel=\"noopener nofollow\">WaPo Fact Checker<\/a><\/strong>: The Washington Post is a news media organization headquartered in Washington DC, purchased by Amazon CEO Jeff Bezos in 2013. Its editorial team publishes a &#8220;weekly review of what&#8217;s true, false or in-between in politics.&#8221; It&#8217;s known for its &#8220;Pinocchio&#8221; ratings. (Note: left-leaning political bias)<\/p>\n<p style=\"padding-left: 30px;\"><strong><a href=\"https:\/\/www.newsbusters.org\/fact-checkers\" target=\"_blank\" rel=\"noopener nofollow\">Media Research Center<\/a><\/strong>: A research and education organization, and product of NewsBusters, that identifies as a premier media watchdog with a mission to &#8220;expose bias in the news media and popular culture.&#8221; It recently launched a project to fact check the myriad of fact-checking organizations that are relied on by news organizations and social media companies to verify factual claims in news stories. (Note: right-leaning political bias)<\/p>\n<p style=\"padding-left: 30px;\"><strong><a href=\"https:\/\/fullfact.org\" target=\"_blank\" rel=\"noopener nofollow\">Full Fact<\/a><\/strong>: A UK-based, independent fact-checking organization, launched in 2009, which aims to &#8220;promote accuracy in public debate.&#8221; Full Fact is widely considered as a well regulated, strongly sourced, thorough fact-checker.<\/p>\n<p>If you&#8217;re looking up information about health or medical conditions, this is particularly sensitive, and the best way to verify claims is to check <a href=\"https:\/\/www.ncbi.nlm.nih.gov\/pubmed\" target=\"_blank\" rel=\"noopener nofollow\">PubMed<\/a>, a website run by the U.S. National Institutes of Health (NIH) that publishes peer-reviewed medical research articles. You may find some of these articles difficult to read, but you can use them to fact-check claims you see on <a href=\"https:\/\/www.healthline.com\/health\/real-or-fake-medical-information-online#1\" target=\"_blank\" rel=\"noopener nofollow\">wellness and health blogs<\/a>, product descriptions or labels.<\/p>\n<p>Much of the content on PubMed is only available to subscribers, but there are many articles that you can access in their entirety, and that aren&#8217;t written for people only\u00a0in the medical industry.\u00a0Bonus tip: you generally only need to read the Abstract section of an article on PubMed, which presents the question it addresses and conclusions.<\/p>\n<h3>Bottom line<\/h3>\n<p>Always remember there are not necessarily\u00a0&#8220;two sides to every story,&#8221; and that false equivalence\u2014presenting dissenting opinions about an issue just to pretend to be balanced\u2014doesn&#8217;t guarantee balance. On the contrary, often false equivalence is used to bolster ideas that are false or manipulative.<\/p>\n<p>Ultimately the best way to verify information is to do your own research, seek advice from those you trust, and then make up your own mind. What you do with it\u00a0is your own business.<\/p>\n<p><strong>Further reading:<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/\" target=\"_blank\" rel=\"noopener\">Top 10 Online Scams: Watch Out For These Common Red Flags<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-software-and-updates-are-the-real-deal\/\" target=\"_blank\" rel=\"noopener\">How to Determine if Software and Updates Are the Real Deal<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-adobe-flash-player-update-is-valid\/\" target=\"_blank\" rel=\"noopener\">How to Tell if Adobe Flash Player Update is Valid<\/a><\/li>\n<\/ul>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fake news, scams, and phishing are the plague of our times. In this guide, we discuss fact-checkers and tips to help you know if an article is real or fake.<\/p>\n","protected":false},"author":46,"featured_media":82738,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10,151],"tags":[4327,4306,4039,102,4312,4309,116,319],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Fake news, scams, and phishing are the plague of our times. In this guide, we discuss fact-checkers and tips to help you know if an article is real or fake.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to tell if an online article is real, fake or a scam - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Fake news, scams, and phishing are the plague of our times. In this guide, we discuss fact-checkers and tips to help you know if an article is real or fake.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-07T22:56:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-26T11:31:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/how-to-tell-real-vs-fake-news.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/how-to-tell-real-vs-fake-news.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/how-to-tell-real-vs-fake-news.png\",\"width\":400,\"height\":260,\"caption\":\"How to Tell Real vs Fake News\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/\",\"name\":\"How to tell if an online article is real, fake or a scam - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#primaryimage\"},\"datePublished\":\"2020-02-07T22:56:28+00:00\",\"dateModified\":\"2022-07-26T11:31:52+00:00\",\"description\":\"Fake news, scams, and phishing are the plague of our times. In this guide, we discuss fact-checkers and tips to help you know if an article is real or fake.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to tell if an online article is real, fake or a scam\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"How to tell if an online article is real, fake or a scam\",\"datePublished\":\"2020-02-07T22:56:28+00:00\",\"dateModified\":\"2022-07-26T11:31:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#webpage\"},\"wordCount\":2191,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/how-to-tell-real-vs-fake-news.png\",\"keywords\":[\"Fact Check\",\"Fake News\",\"Online Scams\",\"Phishing\",\"Real News\",\"Research Tips\",\"Scam\",\"Security\"],\"articleSection\":[\"How To\",\"Recommended\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Fake news, scams, and phishing are the plague of our times. In this guide, we discuss fact-checkers and tips to help you know if an article is real or fake.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/","og_locale":"en_US","og_type":"article","og_title":"How to tell if an online article is real, fake or a scam - The Mac Security Blog","og_description":"Fake news, scams, and phishing are the plague of our times. In this guide, we discuss fact-checkers and tips to help you know if an article is real or fake.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/","og_site_name":"The Mac Security Blog","article_published_time":"2020-02-07T22:56:28+00:00","article_modified_time":"2022-07-26T11:31:52+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/how-to-tell-real-vs-fake-news.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/how-to-tell-real-vs-fake-news.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/how-to-tell-real-vs-fake-news.png","width":400,"height":260,"caption":"How to Tell Real vs Fake News"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/","name":"How to tell if an online article is real, fake or a scam - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#primaryimage"},"datePublished":"2020-02-07T22:56:28+00:00","dateModified":"2022-07-26T11:31:52+00:00","description":"Fake news, scams, and phishing are the plague of our times. In this guide, we discuss fact-checkers and tips to help you know if an article is real or fake.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How to tell if an online article is real, fake or a scam"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"How to tell if an online article is real, fake or a scam","datePublished":"2020-02-07T22:56:28+00:00","dateModified":"2022-07-26T11:31:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#webpage"},"wordCount":2191,"commentCount":3,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/how-to-tell-real-vs-fake-news.png","keywords":["Fact Check","Fake News","Online Scams","Phishing","Real News","Research Tips","Scam","Security"],"articleSection":["How To","Recommended"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/09\/how-to-tell-real-vs-fake-news.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-lqS","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/82390"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=82390"}],"version-history":[{"count":123,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/82390\/revisions"}],"predecessor-version":[{"id":87157,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/82390\/revisions\/87157"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/82738"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=82390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=82390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=82390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}