Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Scams & Phishing Security Education Videos Mobile Security Your Security Education Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
What You See Is Not What You Get; Phishing Attack Skips Email Security Measures
Facebook   X   LinkedIn   Email

What You See Is Not What You Get; Phishing Attack Skips Email Security Measures

December 24, 2024

It’s no surprise that phishing is still prevalent in the cyber world. In fact, it remains the top way malware gets onto devices, and it still excels at getting people to give up their personal information. Phishing scams, and they are aplenty, aim to deceive individuals into divulging sensitive information such as passwords, payment card details, or all other kinds of personal data; some that you don’t even think is all that useful to someone trying to scam you.

The fact is, any piece of information a cybercriminal has on you can be put to use in some sort of scam. That’s why they are so persistent at attempting to get to all the information possible. And as we are staying on top of the attacks better now, they are also getting better at fooling us.

Most often, we see links in email or in text messages that encourage us to click them. However, in a recent scam, Check Point security is warning about the use of images to get those clicks going. It’s quite clever because we typically can call out phishing by finding errors in grammar, graphics, or use of the language. But if you get an image, those are not a factor. In this particular scam, the image may appear to come from a big retailer, such as Amazon or Target, promising special perks.

Here are some valuable tips to avoid falling victim to phishing scams:

Be Vigilant and Verify

Be skeptical of unsolicited emails, messages, or phone calls asking you to click a link or image or ask for personal information. Legitimate organizations typically do not request sensitive data via email or other insecure channels. Even if they do, log into your accounts to check for these notifications rather than clicking something in a message.

Verify the authenticity of the sender by checking email addresses, domain names, and website URLs. Cross-reference any suspicious requests or offers by contacting the organization directly using their official contact information. Don’t reply directly to any of the messages. The hackers are waiting on the other end.

Strengthen Password Security

Create strong, unique passwords for each of your accounts and change them regularly. Enable two-factor authentication (2FA) whenever available, as it adds an extra layer of protection by requiring a secondary verification method, such as a code sent to your phone. However, if you have the option to use a hardware key, an authenticator app, or key fob that generates random codes, choose one of those over email or text codes.

Educate Yourself

Stay informed about the latest phishing techniques and scams. Be cautious of common phishing red flags, such as poor grammar, urgent requests for personal information, or offers that seem too good to be true. These do still exist and aren’t slowing down.

Three well-known phishing scams

There are numerous phishing scams and endless versions of many of them. Following are a few that come around on a regular basis, albeit in various forms.

  • "Nigerian Prince" or Advance Fee Fraud: This scam typically involves an email from someone claiming to be a wealthy individual or a government representative seeking assistance in transferring funds. The victim is enticed to provide their personal information or financial details in exchange for a promised share of the money.

  • PayPal or Financial Institution Impersonation: Scammers send emails impersonating well-known payment processors or banks, requesting users to update their account information or confirm suspicious transactions. Victims are directed to fraudulent websites that collect their login credentials and sensitive data.

  • Phishing Emails from Tech Companies: Cybercriminals send emails pretending to be from tech giants like Google or Microsoft, informing users of compromised accounts or the need to verify their information. These emails often contain links to fake login pages designed to harvest login credentials.

Never get in a rush. It’s never so urgent that you can’t take a bit of time to verify if it’s a real request. Actual urgent situations require a phone call to you or 911, not an email message.  If it’s really that important, they won’t take time to wait on an email reply. Take the time you need to make sure you’re not getting snagged by a phishing hook.


Shimming Right Along To Skim Your Payment Card Number

Education

Shimming Right Along To Skim Your Payment Card Number

By now, most of us have at least one or two EMV (Europay, MasterCard, Visa) cards. These are the payment cards that were touted as far more secure than the ones with the magnetic strips on the backs. And indeed, if you ask Visa these cards have resulted in a 75% decrease in fraud in the three years since they were introduced. Cybercriminals are of course finding ways to take advantage of the EMV cards too. Now, there are reports of a new way to skim. READ FULL STORY

WhatsApp Worm Spreads To Other Apps, Malware Hides in .BMP Images

Scams & Phishing

WhatsApp Worm Spreads To Other Apps, Malware Hides in .BMP Images

It’s a cyber jungle out there. It’s a sort of “survival of the fittest” and those in-the-know can help keep themselves from becoming a casualty of these cybercrimes. An investigation by Malwarebytes found that cybercriminals are now circulating malware via bitmap (.bmp) images to add to the ever increasing list of file types that can no longer be trusted, such as .doc, .xls, and .exe. Now, even clicking that funny cat picture may leave our devices infested with dangerous worms, Trojans, and perhaps ransomware. READ FULL STORY

BOLO for These Most Dangerous Email Attachments

Scams & Phishing

BOLO for These Most Dangerous Email Attachments

Keeping a lookout for suspicious emails has become a daily consequence of our cyber lives. Phishing emails are notorious for having malicious attachments and opening them is a sure way to compromise your device and its data. These attachments are full of malware, ready and waiting to infect your system with a simple click. Make no mistake, any attachment in a questionable email can be dangerous. However, researchers at F-Secure found that some of this year’s biggest email spam campaigns used particular types of malicious attachments more than others. READ FULL STORY

Unforgiving Scammers Seek Your Credentials When Applying For Student Loan Debt Forgiveness

Scams & Phishing

Unforgiving Scammers Seek Your Credentials When Applying For Student Loan Debt Forgiveness

We can all use a little financial help from time to time; especially those saddled with student loan debt. So, there’s no surprise that after the Student Loan Debt Relief Plan was announced and neared reality, an immediate uptick in fraud schemes surrounding this program started to appear. The FBI states scammers are working over time looking to take advantage of those individuals seeking this student forgiveness. Even if you are not looking for loan forgiveness with this program, you still may see phishing email about the program. READ FULL STORY

Top Phishing Scams Continue To Improve And Grow

Education

Top Phishing Scams Continue To Improve And Grow

Much to our dismay, cybercrooks keep finding ways to better the phishing tools they have and find other ways to include new and sneakier methods of thievery. Organizations and individuals are targets and money, identities, credentials, and more are stolen from both every day. Even cyber-savvy users can get caught in phishing scams if they don’t pay close attention to the signs and signals that something isn’t quite right. Reviewing the most pervasive phishing scams is always recommended. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...