How to Keep Yourself Safe from LinkedIn Scam

Please be aware the traps and pitfalls of using LinkedIn if you are one of the users of LinkedIn. As everyone knows that LinkedIn is the most popular professional business-focused social network which is now owned by Microsoft. Just a few days ago, LinkedIn used its official blog to announce that it has now over 500 million registered users in 200 countries on this social platform. As one of Internet users’ top choices for professional communication and finding career opportunities, all of us need to be aware of the risks of phishing scam happening on LinkedIn.

Some malicious links are detected as safe when scanned through inadequate antivirus software, so the suspicious activity on your system might not be picked up by your antivirus program. To block the threats from accessing your computer and keep your personal data safe from malware, we highly recommend that you install the antivirus software with efficient real-time protection:


Beware: Email Phishing Scam Targets LinkedIn Users

Cyber criminals are targeting at LinkedIn users with a sophisticated email phishing scam for tricking users. Basically the ultimate objective of LinkedIn scam is users’ personal information. Users of LinkedIn are easy meat for cyber criminals due to its advantages that are also its drawbacks – anyone can create a profile and build connection with others easily. Unlike other popular social networking sites designed for personal life, most users come to LinkedIn with the motive of looking for the chance of getting hired and business deals, which means that they are open to new opportunities so they have to accept the invitation from someone that they don’t know in private life. Typically, the trap is set up when a user receives a phishing email disguised as a real email from LinkedIn. In the message, the scammers may tell the recipient that a company is “urgently seeking for immediate employment” in their region. They urge the victim to upload the CV quickly to in case he or she would miss the precious offer.


If you are eager to get hired then you likely do not notice that the email is bogus. Once the scammer receives your CV, your personal privacy could be sold or the information could be crafted for a spear-phishing campaign to target current and former employers/colleagues.

Here below are tips about how to spot a LinkedIn scam:

  • Do not come from a real LinkedIn email address;
  • Do not address recipients by name – and do not describe what region the employer is recruiting in, or specify which of qualifications they believe have been matched with the potential employer’s criteria;
  • The message is not written in formal English. In many of the fake LinkedIn profiles, there are some clear presentation errors.

Aside from creating a sense of urgency, there’s plenty of factors that give this email away as a fake. The email should originate from “LinkedIn” at a legitimate “” email address. Instead, it comes from “linkedin messages” at the email address info@serv1[dot]cyber-net[dot]bid. (The top-level domain “.bid” mostly designates websites hosting online auctions.) The email also doesn’t properly incorporate other design elements like a footer or connection suggestions that are found in actual LinkedIn emails.

What You Should Do If You Are Involved in LinkedIn Phishing Email Scam


The fake alarming pop-ups appear on the screen are often caused by the malware/Trojan/virus that hide in your system without being noticed. Many users may not know that fake warnings can be distributed during installation of some freeware. For example, a malicious browser extension is usually added when you install other free software. When you are browsing and landing on insecure websites, a simple click on advertisements or suspicious links can also serve for the distribution of LinkedIn scams.

To remove the malware brought by the scam or annoying pop-ups from your PC, please follow the step-by-step removal instructions given below.

If you are talking with the scammer over the phone, you should just simply hang up and do not give out your personal details.

Once you already gave the scammers access to your computer, disconnect your machine from network immediately to kick the crook out from your system.

Next, you should clean the infected computer by removing the malware from the system.

For Users of Windows 7:

1. Click on the Start icon and then select Control Panel.


2. Click on Uninstall a program when you view Control Panel items by Category.

Windows 7 choose uninstall a program

3. In Programs and Features, locate the recently-installed suspicious programs from the list and click on Uninstall.

Uninstall suspicious programs

4. Restart your PC.

5. Reset your browser:


Open Firefox browser.

Click the Menu button at the top right to access Help menu.

Firefox help

From the there, choose Troubleshooting Information.

Firefox help-troubleshooting information

Click the Refresh Firefox button in the upper-right corner of the Troubleshooting Information page.

Refresh firefox

To continue, click Refresh Firefox in the confirmation window that opens.

Refresh firefox 2

Firefox will close to refresh itself. When finished, a window will list your imported information.

Click Finish and Firefox will open.


Internet Explorer:

Open IE browser.

Click on the Tools button and then select Internet options.

IE- Internet Options

In the Advanced tab select Reset.

Reset IE

Close all other applications before starting resetting the browser or your will receive a message like this:

Reset IE 2


In the Reset Internet Explorer Settings dialog box, select Reset.

Restart your browser to apply changes.



Open Chrome browser. At the top right, click More Settings Chrome morebutton.

Select Settings from the list.

Chrome settings

At the bottom of the page, click Show advanced settings.

Chrome show advanced settings

Under the section “Reset settings“, click Reset settings button.

Chrome reset settings

In the box that appears, click Reset. ​

Chrome reset

Restart the browser at the end.

6. Scan your computer with reliable anti-malware program

Download the free scanner SpyHunter on your PC.


SpyHunter is a powerful anti-malware program which can help prevent and remove most of newly-released malware and virus. It has been tested clean of viruses and malware so is 100% safe to use. It won’t take up too much space on your disk so you don’t need to worry about installing extra security program would slow down your computer speed.

Install it on your computer by following the prompts.

There is no any additional program contained within the installer, but you are still suggested to read the introduction about this software and learn more about it.

Check the End User License Agreement and Privacy Policy carefully to make sure they are within acceptable limits. And then click on Install button to start the installation setup.

SpyHunter installation step 3

Click on Finish and close the installer. The whole process will be complete in about 1 minute.

SpyHunter installation step 5

Once installed, SpyHunter will automatically start and initiate a quick scan on your PC.

When the scan is complete, you will be presented with a long list showing you the computer threats that it has detected.

SpyHunter detects Conduit Search

To remove these threats, click on the Fix Threats.

spyhunter fix threats

Note: The free edition of SpyHunter provides free scan for PC infection. The other benefits including fixes to specific spyware problems, personal technical support, removal of rootkits and malware are available to registered users.

Mac users:

  1. Click GoApplications.
  2. Find all questionable programs, right-click on them and move them to Trash.

Once done, reset Safari’s settings. For this purpose, do the following:

  1. Launch Safari, and then find and click Safari in the menu bar at the top of the screen. Then go to Preferences.
  2. Go to Extensions tab and look for suspicious entries. Uninstall each of them.
  3. Then go to General tab and check what URL is entered into Homepage box. If you see a suspicious link, remove it and replace it with a website that you want to set as a homepage. Remember that you must type in http:// before entering a preferred URL.
  4. Reset Safari. Click Safari, and click on Reset Safari… option.
  5. When Reset Safari pop-up appears, check all checkboxes and click Reset.


Tips on How to Remain Safe and Avoid LinkedIn Scams:

This is not the first time when LinkedIn users have been targeted with such scam. In the past, the users have been under target by spyware, Trojan developed to steal login credentials of job seekers and phishing sites that records users’ input data. Please remember not to click on links in strange emails, and make sure to verify sender addresses in incoming messages to ensure you don’t wind up giving away your login information to scammers. The right thing to do is learn about the most frequent online scams that you could come across on the Internet, and be cautious about variations and new tactics that lure you into divulging private data or installing malware on your devices.

Most malware messes around with important files that halt your computer running properly. If you are unsure whether the program you downloaded is malware or a legitimate program, use cutting-edge technology equipped with our antivirus software to detect all types of malicious software on your computer. It is able to find viruses, spyware, rootkits and Trojans if your system is affected.


Share Button

Share Button