Archives - Email Scam

Don’t ever open unsolicited email attachments

Email attachments are risky. They might contain malware, or be so large that they eat up too much space in your inbox. The best approach is to not open them and delete them, unless they come from a trusted sender. Encourage your contacts to share via cloud links instead.

Use an encrypted email service

Secure email services can encrypt your messages to ensure they’re only accessible to authorized parties – not even the email provider will be able to access them. Some services go one step further and allow you to create aliases that protect your private correspondence and keep your primary address anonymous.

Be aware of common email scams

One of the best-known email scams the “Nigerian prince” scheme is important to recognize, but it’s hardly the only one. Some others to keep an eye out for include emails purporting to be from government agencies (which almost never communicate with individuals in this manner) and communications from Internet service providers (ISPs) and software companies, […]

Be extra wary of email scams around or weekends or holidays

These times are especially busy for bad actors. They’ll often target their attacks around the weekends or holidays, when IT infrastructures are at their most vulnerable. Whether at home or work, be extra cautious when opening emails. Phishing scams are especially deceptive at these times. If you receive a suspicious email offering you a great […]

Beware of scammers that exploit natural disasters

Natural disasters such as Hurricanes, Tornadoes and Floods prompt scammers to solicit contributions supposedly for a charitable organization or a good cause. Definitely it’s best not to respond to unsolicited spam e-mails. Also, be suspicious of individuals representing themselves over e-mail as officials soliciting for donations. Do not click on links within an unsolicited e-mail. […]

Beware of mysterious links and attachments in emails

Ransomware encrypts your files and demands payment for their decryption. It can start with a malicious link or attachment targeting vulnerability in outdated software. Be sure not to click these items if you don’t recognize them and/or if they were flagged by your security software. Also, the FBI says you should never give in and […]