We have all seen emails that pay the amazing offers that look very good so that they cannot be realistic Warnings that your computer is at riskOr even prison threats Pay your tax immediately.
These are all common stadiums from online fraudsters who are trying to get panic and click on a link that you should not, hand over money or personal information, or download an attachment that turns out to be the computer virus.
But new research indicates that these common stadiums may become very common so that they are not effective, which leads to more electronic magazines to take a different approach.
Kendall Mcai, strategic bullets of the intelligence of the cyber threat in the CISCO section, says that for a long time, Al -Khasha’s emails were characterized by subjects that attract attention that included phrases such as “Urgent Request” or “the payment has been postponed”, but many stored emails discovered by CISCO systems last year included a relative linear term, “says Kendall Mcai, strategic bullets of the intelligence of the cyber threat in the CISCO department of the CISCO.
“They may know that we have discovered this and that the difficult and fixed email will not work anymore,” McCai said. “So move towards these good words, which are likely to appear in your in the inbox every day.”
The deceptive emailing lines analysis were included as part of the CISCO review report, which was considered by the threats that the company’s customers faced in 2024.
McCai, one of the authors of the report, said that although e -mail hunting may seem historian in the era of artificial intelligence and other advanced technologies, Internet criminals continue to do this because they work.
Whether they are following one of the largest companies in the world or just a daily person, attackers continue to impersonate the well -known personality of consumers, in the hope that they will get the largest possible number of people.
Some of the most suicide brands in deceptive emails that were banned by CICO systems last year include Microsoft Outlook, which in itself represented 25 % of the total, along with LinkedIn, Amazon, PayPal, Apple and Shein, according to the Talos report.
It is recognized that while this is not urgent news these days, Makai says she thinks it is still important to talk about it. She says hunting is still a major threat, especially when they are shipped by artificial intelligence tools that allow attackers to formulate emails for efficiency that are more advanced and more broadly than ever.
“The hunting is still prominent, the hunting is effective, and the hunting is improved only and better, especially with artificial intelligence,” said McCai.
How does the cabinet look like?
Email messages, texts and social media that you did not request. If the person or company is communicating with you and not calling them first, you must likely ignore it. It does not matter whether it is an email that your Windows subscription has ended, or a text from your bank says that your account has been exposed to danger or posharam pushing a lot on the designed sunglasses.
The unemployed fraudsters are targeted. Do not click on any links or download any attachments. Instead, go directly to the bank’s website or the company’s website. If the “recruiter” is communicating with you, then send your personal information only to the company you submit. Any unwanted job offer should be treated so it looks very good so that it cannot be treated in this way.
Payment requests for gift cards or cryptocurrencies are red flags. These are the preferred ways to pay the e -criminal, because they cannot be largely tracked and can be easily filtered. Tax Authority, for exampleThe payment will not pay the alleged taxes in any of these models. In a relevant note, the Tax Authority will also contact you by email, text or phone. They work exclusively by Snail Mail.
Digital ads for love. Romantic frauds formed $ 384 million of reported losses in the first nine months of 2024, which is the latest available numbers, according to the Federal Trade Committee. Email may come from a woman who says she is trying to escape the war in Ukraine or a man working in the army who only thinks you are nice. Regardless, if they cannot meet you in real life for any reason, the universe is very skeptical. The same applies to if they request gift cards or encryption.
Charitable fraud is also something. Like romantic fraud, these fraudsters look forward to Take advantage of people with great hearts. They will say they are looking for donations to help victims of the latest catastrophe or normal war or to support what appears to be a legitimate assistant organization. Only donate to the charitable groups that have been verified and created. Go directly to their websites or call them through a reliable source.
How can I protect myself if I think I have been winning?
Use good antivirus programs and update everything. A large part of the anti -virus program is to filter emails, defraud email and stop malicious programs that may be attached to them. But AV cannot stop the threats it does not know, so be sure to update you constantly to stay at the top of all the following. Meanwhile, updating the operating systems and applications of your devices will fix the errors that the Internet criminals can take advantage of.
Wonderful passwords are a must. If your email account is at risk, it can be used to deceive your contacts from their money or identities. It can also be used to help reset the password for your financial accounts and other allergies. As a rule, passwords should be long (at least 12 characters) and unique (Password123 is always a bad idea). Resist the temptation to reuse, even if you think it’s really good. If a sorcery is that many complex passwords feel extreme challenges, Password managers It can help.
Dual factors are not thinking. Even the best passwords can be cracked. The dual -factor authentication will come a long way to protect you if this happens. It takes a second form of approval such as the biological measurement index, the pressure notification sent to your phone or a real key connection, as well as your password. But avoid a copy of the text of the short messages of this. While it is rare, phones can be SIM switchingAllow Internet criminals to express these textual symbols.
Think of freezing credit. If you think that your social security number or superior details may be at risk, your credit freezing will prevent Internet criminals from obtaining loans in your name or using this information to steal identity. Some security experts recommend freezing children’s credit until they need to use it because stealing the bound identity against them can pass without anyone noticing it.
https://www.cnet.com/a/img/resize/851f9ba56eecf1f1b7f74985ce4db6432dd0280c/hub/2025/03/28/f6a21541-d905-4445-94de-9a3e5b2816bb/gettyimages-496819483.jpg?auto=webp&fit=crop&height=675&width=1200
Source link