The royalty who wants to send you money is the oldest scam in the book, yet it continues to lure victims. Phishing works by creating false trust to give up log-in credentials, click a bogus URL or download a malware-infected file.
Be aware successful phishing scams can result in stealing your identity, blocking access to your computer, and then demanding a hefty ransom to reinstate access.
With touchscreens popular now, you may find what appears to be a human hair follicle (digitized) or flea on your screen. Swipe it, and malware is downloaded.
We’re impatient people driven by a sense of urgency. Scammers exploit your natural impulse to click and be fooled. Emails may appear to come from someone you trust in your contacts.
Scammers build bogus proxies of known institutions (banks) or payment providers (credit cards), copying logos and modifying the URL to fool you. Their success depends on your too-quick-to-click impulsive behavior.
If you are suspicious of a link, take the smart precaution of validating the source and visit the bona fide site directly. Scammers are even falsifying HTTPS.
Always verify the person who sent you a file actually did send you a file to download. Sometimes distrust is the best policy.
Trusted sources like your bank or the U.S. Internal Revenue Service will never email you to ask that you reset your password or input personal identification by following a link. Any email asking for private data is most likely fraudulent.
Contacts made by alleged charities are suspect, especially those designed to tug at your heartstrings. Seek out only known, reputable charities when making donations.
Never ignore requests from Windows or Apple to run updates. Many a million-dollar breach was a result of failing to do simple updates. Set your settings to automatically make these updates.
This article was originally posted in Worcester Business Journal >