Security Tip of the Week – Active Scams on Inactive Accounts
Cybercriminals are taking advantage of Google’s new policies and may send phishing emails asking you to take immediate action.0
.*–
Each month, Keller Schroeder’s subject matter experts provide content about the latest tools, services, and technologies to help you understand how you can better grow, protect, and optimize your technical environments. We also share weekly cybersecurity tips and you can find business cultural and leadership knowledge from our President.
Cybercriminals are taking advantage of Google’s new policies and may send phishing emails asking you to take immediate action.0
.*–
Cybercriminals are using .zip domains as a phishing scam to get you to visit a malicious website to retrieve personal information.
Cybercriminals are creating look-alike domains to deceive and lure users into downloading fake versions of Threads.
Cybercriminals are impersonating process servers to trick people into providing sensitive information, as warned by the Better Business Bureau.
Cybercriminals use official logos and promotional materials in phishing emails to impersonate real organizations, such as the recent scam targeting Delta Airlines, which aims to steal sensitive information by luring users to a malicious website.
Cybercriminals are using Soda PDF to send malicious PDF files and trick users into sharing their phone number and payment information, making it essential to be vigilant and learn how to protect yourself.
Cybercriminals can impersonate your friends or family members by using information from social media to scam you emotionally into wiring money for transportation while pretending to be in need.
Cybercriminals impersonate HR departments and send fake emails with malicious links that prompt employees to enter their workplace email and password, providing the fraudster with access to the organization’s email system.
Business Email Compromise (BEC) is a rising threat to many organizations in which cybercriminals impersonate individuals to exploit trust.
Cybercriminals are now using obfuscated links to steal information by hiding IP addresses instead of URLs, making it difficult for users to verify the legitimacy of links sent in urgent emails.
Want to receive our monthly newsletter? Send us your contact info below to join our mailing list.