Archives - Email Scam


Watch the subject lines in suspicious emails

Phishing emails are usually carefully crafted to look like legitimate communications. They still give themselves away in subtle ways, though. For example, check the subject line: If it includes your email address or an all-caps call to action, do not engage.

3 Signs a Midterm Election Call, Text, or Post Might be Risky

During the last days of election season, get-out-the-vote initiatives go into full swing. Most candidates now have multifaceted operations involving phone banking, targeted texting and email campaigns, which seek to engage likely supporters across multiple channels. Modern campaigning still involves significant expenditures on standbys like TV and radio advertising, but it has evolved dramatically in the […]

Recognize common email scams

The “Nigerian prince” scheme is one of the best-known email scams, but it’s hardly the only one. Others to look out for include messages purporting to be from government agencies (which pretty much never communicate with individuals this way) and communications from ISPS and software vendors, if they claim to include software patches/updates that would […]

Watch out for scams related to parcel delivery

If you’re expecting a delivery via mail or private courier (e.g., FedEx, UPS, etc.), you probably track the package online or via text message to see if it’s on time. Check for unexpected emails or SMS updates, especially if they ask you to make additional arrangements by supplying personally identifiable information – they’re probably scams.

A new ransomware is spreading rapidly!

Have you got a “Fax e-mail” lately? Be very careful, this could be a dangerous heretic virus! A new ransom malware (Ransomware) called ‘CTB-Locker’ is now spreading all around the world through e-mails disguised as a “Fax e-mail” message. The malware is stored in a Zip file attached to the e-mail. Once opened, the ransomware […]

The source of infection

Anti-Virus researchers analyze lots of code (malicious and non-malicious). We create various ‘detection and cure’ mechanisms in order to provide best defense to our customers from malicious software. Our goal is not only to handle existing threats, but to try catching new threats that we haven’t even see. Sometimes, our customers would like to understand […]