A New Email Scam Is Shockingly Realistic, Here’s Everything You Need To Know About Protecting Yourself

In your box, which comes from an e -mail, it follows an unknown sender that contains a picture of your home and address, then follows a threat: ın Don’t even try to hide it. You have no idea what I can do….
It sounds like a scene from a horror movie, right? Instead, this The latest identity hunt fraud.
Many other E -Posta and Text fraud, this special usurpation scheme uses certain personal information to deceive people to send money. E -Posta convinces that Hacker has more information about themselves and that they need to pay or exchange Bitcoin to keep their information safe.
“I bought a PDF through an E -Posta, which contains my address and photo of my address and made a lot of claims about my special behavior and claims to have been caught by spyware on my computer” Jamie BecklandTechnology Company Apicontext told HuffPost, the head product manager. “Scammer threatened to publish the video if I do not pay through Bitcoin.”
If you buy a similar E -Post, you can take the steps you can take to see if there is a scam, so you protect yourself:
Confirm home and street images on Google Maps.
Relating to: My father washed me when I was a kid. It helped me understand Maga.
Witthaya Prasongsin / Getty Images
Many identity hunting E -mail is usually full of grammar errors and weak formatting, which facilitates them to define them. However, this deception, which includes images of people’s homes, is a newer, darker twist.
You may be asking yourself, how exactly could the scammer be describing your home address? Accordingly Al IversonCyber experts and industrial research and community participation found your address from a previous data violation that leaked personal data, which was the leader of the software company Valimail, and then used a Google Maps photo to put an e -mail.
Beckland confirmed that his house in the PDF was a scam by comparing his house with Google Maps with street appearance. Most of these frauds are withdrawn from online sources, so it recommends that people check whether the image is copied from the internet. If so, it is not clearly legitimate.
Examine the E -Posta address and check the legitimacy.
Ivan Pantic / Getty Images
Relating to: 20 healthy posts I found on the internet this week are now very urgently necessary.
Iverson suggested that you control the legitimacy of the E -Posta address when you get any correspondence from unknown users.
“Check whether the sender’s E -Post effect area is matched with the website of the official organization,” he said.
“If you are using Gmail, call the ‘Go to the Original Post’ and review SPF, DKIM and DMARC results.” These are essentially methods that confirm the E -Post area to prevent spam, identity hunting attacks and other E -mail safety risks. To do this, click the three-point hamburger menu at the top right of your e-mail and click “Show the Original”.
“All three should ideally exceed authentication controls, Iverson said. In other words, he can say “pass” alongside all three options.
The scammers became very sophisticated when masked the fields. As a result, pay attention to “similar” areas with light spelling variations. According to Iverson, if something seems to be too good to be real, it is probably.
Another thing that needs to be noticeable is that a scammer sends a “message” from your own e -mail address. Most of the time, E -Posta address only the “from” address title.
Iverson, “these scammers E -Posta accounts really do not really hacking or ability. They could not find a treasure that compromises photos. Of course, people are trying to scare people coughing,” he added.
Do not click non -familiar connections, especially for payments.
Peter Dazeley / Getty Images
If an E -Post looks legitimate, you can accidentally click on the links it contains for more information. Zarik MegerdichianThe founder of Loop8, a company that protects personal data and privacy from data violations and computer pirates, fits strongly against it.
“When you want to click a link in an e -mail, Megertichian said. “Bitcoin transactions cannot be reversed like many other common payment methods, including Cash App and Zelle.”
Furthermore, frauds requesting fees should be reported to the Federal Trade Commission by submitting a report online or by telephone. Megerdichian also said that if a pirate of a computer received details about your financials, he closely watched your bank accounts and objected to fraudulent charges with your bank, that he canceled your cards and stopped future wages as preventive.
Update and replace your passwords.
Relating to: A woman became viral after saying that she had “ugly privilege” – what she said about society today and today
USERBA011D64_201 / getty Images
In addition, it is also recommended when faced with a detailed scam to change all your passwords.
Accordingly Yashin ManrajPvotal Technologies CEO, a company that creates secure technology infrastructures for businesses, is important to protect your data immediately if you suspect that it is dangerous.
“Use a new E -Post, if possible, and move critical financial or public services, and then start notifying the local police to the local police, FBI, and make sure that your family is aware of the threat of a public shame in a possible incident in which they have managed to steal some conciliatory data,” he said.
Do not interact with Scammer.
Viktor Cvetkovic / Getty Images
Relating to: 19 The healthy posts I saw this week have made me a happier mood in a very sweet, legitimate way.
It may be attractive to respond to an E -mail (especially those who look very realistic) to negotiate with SCAMMmer. However, Manraj recommends that these E -mails to sepa and ignore it, because responding can actually place you in search diaries and target databases that will make you vulnerable against more attacks.
It is also recommended to isolate your home network by means of a separate Wi-Fi or router using a VPN to connect to the Internet. Most importantly, do not ask for certain help in public forums, especially when installing diaries or error messages.
“Be particularly careful when using virtual numbers and password managers on non -popular websites to avoid using personal defined information that can be used to access your important financial services,” Manraj said.
Finally, pay attention to which data you share in the future.
Catherine Falls Commercial / Getty Images
Users should remember that data is a commodity and that businesses collect a lot of information today (usually more than they need to complete the process at hand). Megertichian recommends avoid excessive sharing when signing or downloading applications when registering or downloading applications.
Megerdichian, “always ask yourself, do they really need to know this? To be proactive when it comes to personal data depends on consumers,” he said.This article emerged at the beginning HuffPost.
Also good: 25 women shared “Fake Pass” and decided to embrace proudly