Shopping online is a normal routine for many people.
Trying to steal your info is also normal routine for criminal mind.
Read how you can stay safe when shopping online.
Article provided courtesy of https://www.securingthehuman.org/
These can appear in your mailbox disguised as a legitimate fax from a reputable company, in this case Xerox. . In fact, the link to Xerox is valid and will send you to their website. However, the same cannot be said about the attachment. Although innocent looking, it may contain dangerous zip files. A zip file can be used to get past email filters that will not allow an executable file to be delivered. This can properly be used to send a legitimate file to someone.
What are the clues that indicate that this email may contain dangerous zip files? Continue reading Don’t Unzip Dangerous Zip Files
This is an example of a phishing email. It came with an attached ZIP file which as you see below claims to contain a key change to your credit report, but will no doubt contain malicious code. The usual purpose of this a phishing email is to either get your personal information or install a rogue program on your computer.
A warning from Experian is here. Also note that the attachment may not be picked up by malware or anti-virus scanners, but that doesn’t mean it is safe,SO DON’T OPEN IT!
A phishing email can be very well disguised. The corporate logos can be found and copied and email links can appear to be from the company, but lead to the phishing site.
Always be cautious and realize that legitimate companies will not ask for personal information, nor will they supply a link in an email, but rather ask you to log into their site directly from your browser and check your account.
If you receive an unexpected email with an attachment be very suspicious.
|This email was sent because it contains important information about your account. Please note that if you have previously unsubscribed from Experian.com, you will no longer receive newsletters or special offers. However, you will continue to receive email notifications regarding your account. To ensure that you’ll receive emails from us, please add email@example.com to your address book.|
|*If it has been less than thirty days since you joined Experian.com, your monthly credit statement includes your information for the period of time you have been enrolled.|
How would you feel if your best friend turned on you? If email is your best friend you better know how to deal with it. Otherwise you could end up being betrayed. February Ouch! Newsletter teaches you how to avoid the pitfalls of email phishing attacks.
To view this newsletter in a different language, click here.
Many advancements in computer and internet security have been made. Anti-virus, anti-malware, firewalls, rootkits scanners, spam filters and much more have made it increasingly difficult for the bad guys to get into your computer and steal your information.
So they are the “confidence man” of the 21 century. The confidence man of the past would devise a scheme where he would get you to trust him, sometimes by posing as someone you already trust, like a friend, local official or business person, and then get you to give them what they want, whether it be money, information, or whatever.
Today they are using technology to fool people into giving them what they want, which is usually based on the ultimate desire to take your money.
One of the modern tools is social engineering. Here is a great video of how to avoid some of the snares used by these people.
Thanks to www.securingthehuman.org