How to avoid falling into the trap of fraudulent fake emails

0


An image of the reflection of the user and password fields in a person’s iris. EFE / SASCHA STEINBACH / ARCHIVES

Web security is still a problem that poses a problem for authorities in almost every country in the world, given new methods that appear almost daily with the aim of stealing personal information from Internet users.

However, some, although well known, do not lose their validity in the eyes of cybercriminals, not only because of their ease of implementation but also because of their effectiveness. One of them is plagiarism email, which is nothing more than to create and distribute fake emails that mimic the domain of a recognized company so that their scam can happen as much as possible, and thus the victim can access the requests made by the attacker . Among the most important Download malware, access systems or data, send personal data, or even transfer money.Cybersecurity firm Kaspersky explained, in a press release.

These ‘fake’ emails often seem to come from reputable organizations, This compromises not only the targets, but also the good reputation of the companies His domain was used to deceive. Additionally, fake emails can be part of larger, multistage attacks, such as those used to discredit businesses. It’s a growing reality, the company added.

Of course, these types of attacks are not of a single category, but there are several ways to implement them which always make the victim believe that they are in fact receiving an email from a company. completely existing and that is important to her. And so, for example, he plagiarism law domain “, as the name suggests, in the “from” section of the email, cybercriminals place the domain of a reputable institution, suggesting they are real.

“However, if the target business implements one of the new email authentication methods, attackers must resort to another method. This is where the call comes in. Display a name plagiarism or “display name spoofing”, in which the attackers impersonate the person sending the email, that is, giving the impression that it was sent by a real employee of the company, ”Kaspersky explains in his statement.

An example of an impersonation message. Photo: Kaspersky

If you are a business owner or worker and want to protect the personal information that has been provided to you, simply follow these steps:

1. Pedagogy will always be the most important thing. For this reason, it is necessary to organize a security awareness course, in which you can improve your own knowledge and knowledge of the company, thus providing employees with the necessary tools. Always check the address entered in emails from unknown people.

2. Protect “community” services such as Drive or Microsoft 365 In order to avoid interference from people outside the company who can filter fake emails and thus steal relevant information.

3. Now knowledge is important so that they don’t fall into a web of idiots plagiarismHowever, the help of technology is essential to this goal. It is important to adopt a method of authenticating emails, especially that of companies. SPF, DKIM, or DMARC are some of the best options.

Read on

They discover malware spying on corporate networks in Latin America

Play Store recommends removing eight apps infected with dangerous malware


Leave A Reply

Your email address will not be published.