US News

The New Email Prejudify is a shocking mind, here is all you need to know about defense

The e-mail strikes your inbox from an unknown sender that includes a picture of your house and address, followed by threat: “Don’t even try to hide what I know …

It sounds like a shocking film movement, of course? Instead, it is one of the latest details.

As many other e-mail fraud, the shooting program uses some personal information to deceive people from sending money. The email shows the people Hacker know more about them and that they must change pay or bitcoin to keep their details safe.

“I got a PDF over the e-mail that includes my address and photo of the address and made mysterious claims for my private behavior,” Jamie Beckland, Product Officer on Tech Company Approntext, telling Huffopost. “Scammer threatened to free the video if I could pay them with bitcoin.”

If you receive the same email, here are the steps you can take to find out if you are scam to protect yourself:

Verify the house and road photos in Google Maps.

Related: My father killed me with a child. It helped me to understand Maga.

Wiingthayaya Prasongsin / Genyma

Many sensitivity emails are often full of language errors and wrong formatting, making it easier to identify. However, this scam, including images of the homes, is new, dark.

You may wonder, how exactly the scammer can identify your house address? According to Al Ivervon, Cyber scholar and social research and sender in the software vasilail, after your address is available from the previous data, then a photo of Google Maps are used to place an email.

Beckland was able to verify that this is scary by comparing an image to the PDF in Google Google Maps viewing Maps of his house. Many pictures of these deceptives are deducted from internet sources, so recommend that people check to see if the picture is copied on the Internet. If so, it is obviously not legal.

Check the email address and view the authenticity.

A person works on a laptop on a restaurant with an open brochure, Takkut ActoK, and a vessel of oranges near, in the fun room.

Uvan Pantactic / Getty pictures

Related: A couple of 100 I received on the Internet this weekly need for urgency

Iverson Income to look at the email address ” Events whenever possible when you receive any communication from unknown users.

“Check that the email email domain is like the official Web site of the organization,” she said as one example.

“Also, if you are using Gmail, want to ‘show the original message’ and review SPF, DKIM, and DMARC results.” These are the basic ways that confirm the email domain to protect the spam, the stealing of sensitive information and other e-mail security risks. To do this, click on the three Hasberger menu on the top right of your email and click “Display the original.”

“All three should succeed convincing checks,” Ivonon said. In other words, it was like “pass” next to all three ways.

Scammers have done very well when masking menain. As a result, beware of the “good-looking” backgrounds in the variety of spelling of spell. According to Iversson, if something seems to be very good (or very bad) true, it is possible.

Another last thing to eye is when scammer sends a message “from” your email address. Many times, they are just full of your email address to “from” the header header.

“These duties do not have time or ability to enter your email accounts. They have not received some secret photos of the invading pictures.

Do not click the unknown links, especially related to payments.

A person dressed in the types of coats hidden in the laptop on the desk, with blindfolds in the background

Peter Danden / Getty Photos

If the email looks legal, you can click error in links containing more information. Zarik Merdichian, the Founder of Loop8, a company that protects personal data and privacy from the breaking of data and hackers, they steadily warned.

“Recipulate at any time when you are asked to click on the link in the email,” said Merdichian. “Bitcoin transactions are not opposed, as many other methods of regular payment include Zelle program.”

In addition, scams that seek guidance should be reported to the Public Trade Commission by completing the online message or telephone. Mergichian also notes that if the reputation received information about your financial accounts, monitor your bank accounts and contradict your banking charges, cancel your cards and stop the cost of the future.

Update and change your passwords.

Related: The woman walked with a virus after you “have a bad right” – what does it mean and what about the community today

Typing hands on the laptop keyboard with the graphic stage and graphic shield, symbolizing cyberercere matergarties or secure login

User011D644_201 / Getty Photos

It’s very good when you’re facing a descriptor scam to change all your passwords.

According to Jashin Manraj, the CEO of Pvotot Technologies, a company that creates a secure business infrastructure, important to protect your data right away if you suspect the postponed.

“Use a new email address if possible and submit the financial or resources to the local police, FBI and ensure that your family is able to threaten the unfavorable event,” said Manaj.

Do not engage in scammer.

Person in the hood and glasses on a computer screen, suggesting the secret or cyberercere title

Viktor Cvvrovic / Getty photos

Related: Good post 19 I have seen this week that was very good, officially put me in a happy situation

It can feel tempted to answer the email (especially those who seem to be very logical) to negotiate the world. However, Manraj recommends negativity and ignores these emails because the response actually can actually set you in logs and specific information that will make you vulnerable to continue ongoing attacks.

It’s also better to separate your home network with a different Wi-Fi or router, using VPN to connect to the Internet. Most importantly, do not ask some help from public forums, especially when you load logs or error messages.

“Care especially when using visual numbers and password authorities to unpleasant websites to avoid equitable employment that can access your financial services,” explains Manraj.

Finally, be reasonable about what data you share in the future.

Person typing on the laptop on the outer table with a cup of coffee next to them

Catherine Falls for commercial / getty photos

Users should remember that the data is a property, and businesses today collect multiple details (usually less than they need to end existing transactions). When you subscribe to new websites or download apps, the MerDichian is suggesting to avoid skip.

“Ask yourself constantly, what do you need to know that?This article came from scratch Huffpost.

And carefully: “This thinks this is a hostile and true” – women share “negative” microfinism “

And right: “It’s killing them”: Doctors, nurses, and medical professionals share “harmless” practices, harmless

And in beauty: 25 Women share the “Faux Pas” determined proudly to accept

Read it to zzfeed.com

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button