google.com, pub-8701563775261122, DIRECT, f08c47fec0942fa0
USA

At least 73% of U.S. adults have fallen for online scams. How you can avoid the latest con

Online scammers continue to deceive the majority of American adults to defend users against the hunting of personal information.

A recent survey of more than 9,000 US adults Pew Research Center He found that about 73% had at least one or more online fraud or attack.

The most common virtual cons of credit card fraud, online shopping fraud and ransom software attacks – Some kind of malware This prevents you from accessing your computer files or system until a ransom is paid.

Approximately 24% of the respondents said that they received a scam e -mail, text message or call that deceived them to give personal information.

32% of the participants said that they were a victim of a scam last year.

It is often said Elderly adults are more vulnerable Online scammers. However, in 2021 Federal Trade Commission reported Gen XERS, Mine years and Gen Z adults are 34% more likely to report that they have lost money for fraud from adults aged 60 and over, between the ages of 18 and 59.

These generation groups are deceived by online programs caused by a social media advertisement, an investment fraud, or fake business opportunities.

The latest identity hunting attacks or attempts to obtain precise data are realized through online calendar (Google or Outlook calendar), multi -factor authentication application and HTML suffixes.

Avoiding online fraud proves that it is a challenge, but cyber security experts say there are steps you can take to protect yourself.

Invites unwanted calendar

Norton Artificial Intelligence and Innovation Director Iskander Sanchez-Rath, scammers find new ways to give up without knowing you, and the calendar of your e-mail account is one of them.

Unlike traditional identity hunting fraud, such as an unwanted text or call requiring your participation, this invitation appears automatically in your calendar without confirmation or rejection.

Sanchez-Roula can be easily deceived because it could be involved in thinking that you accepted the invitation at some point.

Fraud is when you click on the invitation to get more information.

A connection in the invitation may take you to a zoom connection to an ID hunting website or ask you to download malware hidden as a software update.

This conly usually targets work-related e-mail accounts and related calendar applications.

These scam warning signs include:

  • Calendar invitation is not required.
  • There are false articles on the address or sending address associated with the calendar appointment.
  • The invitation is associated with work, but you are the only person to take it.

What can you do: Change the settings in your online calendar to prohibit automatic updates. Microsoft Outlook users can follow These online instructions Change calendar settings; Google users can limit which invitations appear in their programs. Watching these online instructions.

If you have any doubts, do not respond directly to the invitation, Fort Fortinet’s threat intelligence is Global Vice President Derek MANKY.

Mangy said, ın Instead, send an e -mail to your reliable person from this organization asking if they have approved the meeting and ask for more details, ”Mangy said.

Multi -Factor Authentication Deception

A multi -factor authentication application, also known as “two -stage verification, is an application that allows you to request a“ yes or no ”to verify that you have access to an account on your phone on your phone.

Mangy, “Multi -factor authentication attacks have been going on for more than a decade,” he said. “They often take new forms or target new platforms such as the Authenticator application.”

Even if you do not want to verify, a scam occurs when you receive more than one notification from the authentication application.

Sanchez-Roula said, “This scam, about clicking on an unknown notification and accidentally wearing it to the point of providing your personal information, S said Sanchez.

These scam warning signs include:

  • Identity Authority Request Verification or provides a verification code that you do not request to you.
  • The authentication application sends a few notifications in a row, even if you want to apply.

What You be able to To do: If you receive a number of authentication applications, pause before clicking.

Sanchez-Rath, “approved an entrance you do not demand, to deliver your keys to a stranger,” he said. “You just don’t.”

2FA, Aegis Authenticator, Microsoft Authenticator, Stratum, or Google Authenticator is a safer way to use an authentication application, to use someone who provides you with a verification code. Do not use an application that sends a notification, because a scammer can pressure to provide your login information.

Manky said that another step in protecting yourself is to change your passwords frequently because it reduces shelf life for stolen and sold.

E -Posts with unknown HTML attachments

An E -Post with an unknown HTML supplement may direct you to the ID hunt web page or ask you to download malware.

MANKY is the oldest technique in the book, but it is still widely used today.

“HTM/HTML files contain code that can be used in various ways, including executing malicious scripts such as Javascript, such as Javascript, which can leave any information in the system,” he said. “Similarly, they can be used to start an Identity Hunt page to collect identity information.”

Scammers will try to use reliable names or services that are in daily use for you.

Mangy said, “If an e -mail is not requested, the end user should always question the identity of the e -mails sent,” Mangy said.

These scam warning signs include:

  • E -Posting is an unknown person.
  • The additional in E -Post is undesirable and looks suspicious.

What can you do: MANKY always be careful before opening the annexes with an e -mail, Mang Manky said.

Search for a spelling error in Ekin URL. MANKY is that the domain names in URL have a small variation than the legitimate.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button