-
Notifications
You must be signed in to change notification settings - Fork 36
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
#291 not yet fixed - Need to address and fix issues mentioned by pipe #300
Open
Mr-KayZ
wants to merge
6
commits into
r-Techsupport:master
Choose a base branch
from
Mr-KayZ:master
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Changes from all commits
Commits
Show all changes
6 commits
Select commit
Hold shift + click to select a range
2bd5d94
WORK IN PROGRESS - #291 - This is to save current changes and allow o…
Mr-KayZ ff2c814
Created email scams.md as a supplement
Mr-KayZ a3b6844
Added session hijack and how to resolve it
Mr-KayZ da3fe61
Merge branch 'r-Techsupport:master' into master
Mr-KayZ af82fa9
Merge branch 'r-Techsupport:master' into master
Mr-KayZ 7f95b00
Tech/email scams + session hijack completed!
Mr-KayZ File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
Binary file not shown.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change | ||||
---|---|---|---|---|---|---|
@@ -0,0 +1,104 @@ | ||||||
--- | ||||||
layout: default | ||||||
title: Email Scams | ||||||
nav_exclude: false | ||||||
has_children: false | ||||||
parent: Safety & Security | ||||||
search_exclude: false | ||||||
last_modified_date: 2024-06-23 | ||||||
redirect_from: /books/safety-and-security/page/email-scams | ||||||
--- | ||||||
# Email Scams | ||||||
{: .no_toc} | ||||||
|
||||||
{% include toc.md %} | ||||||
|
||||||
The article discusses the evolution and prevalence of email scams. In the past, scammers had limited opportunities and faced significant risks. However, with the advent of the internet and email, they now have a vast, global pool of potential victims and can operate with minimal risk. | ||||||
|
||||||
Email scammers aim to extract money or personal information without providing anything of value in return. These scams are unfortunately common, as they are profitable due to the number of people who fall for them. They are also low-risk for the scammers, as they are inexpensive to set up, quick to execute, and carry minimal chances of being caught and punished. | ||||||
|
||||||
Despite the seeming simplicity of most scams, even tech-savvy individuals can sometimes be deceived. The article aims to educate readers about common scams, how to identify them, and steps to take to avoid falling victim to them. This knowledge is crucial in the digital age to protect oneself from such fraudulent activities. | ||||||
|
||||||
## Avoiding Email scams (The best practices) | ||||||
|
||||||
To minimize the likelihood of falling victim to an email scam, consider the following preventative measures: | ||||||
|
||||||
- Acquaint yourself with prevalent scams (which we discuss in this article). | ||||||
- Implement a reliable antivirus software. (More information can be found here: [What Antivirus applications we recommend.](/docs/recommendations/av.md)) | ||||||
- Refrain from clicking on links embedded in emails. | ||||||
- Exercise caution with unexpected job or interview propositions. | ||||||
- Disregard email attachments received from unfamiliar sources. | ||||||
- Utilize disposable email accounts or aliases when signing up for websites that don't require your primary email address. (More information can be found in the `Precautions to take` section of the [Tech scams wiki article.](/docs/safety-security/tech-scams.md)) | ||||||
- Avoid publicizing your email address on public platforms, including social media. | ||||||
|
||||||
While spam filters can be beneficial, their potential to inadvertently block important messages renders them a less than ideal solution. | ||||||
|
||||||
## Identification of email scams | ||||||
When examining your inbox, every message and its fields can offer hints to identify potential scams. | ||||||
|
||||||
- **To field**: Bulk emails often have multiple recipients, especially if the names or email addresses are in alphabetical order. If the email is addressed to your email address instead of your name, it could be a scam. Scammers may also CC multiple recipients within the same company to appear legitimate. | ||||||
|
||||||
- **From field**: If the sender is unknown or has a foreign name that you don't recognize, it could be a scam. Legitimate businesses usually use their domain name for their email addresses, but some scammers buy similar-looking domains to deceive people. An email address extension other than .com, .org, .gov, or .edu is also suspicious. | ||||||
|
||||||
- **Subject field**: Scam emails often have clickbait subjects designed to scare, entice, or confuse you. They may also appear to be official correspondence requiring action on your part. It's safest to ignore and delete messages with clickbait subjects. If in doubt, research the sender before opening the message. | ||||||
|
||||||
- **Body of the message**: If the salutation uses your email address instead of your name or a generic greeting like "Dear valued customer", it could be a scam. Poor language skills, a sense of urgency, or requests for confidential information are all red flags. | ||||||
|
||||||
- **Attachments**: Be wary of attachments, especially .exe files or compressed archives, as they could contain malware. Even Word, PowerPoint, and Excel documents can include harmful macros, although modern versions of Office will alert you before opening these documents. | ||||||
|
||||||
More information can be found in this [blogpost discussing email scams and how to avoid them](https://www.comparitech.com/blog/information-security/email-scams/). | ||||||
|
||||||
## Scam vs Spam | ||||||
|
||||||
Spam refers to unsolicited and unwanted bulk messages, which can include emails, telemarketing calls, texts, and other digital communications. Despite effective filtering and blocking by ISPs and email providers, the [volume of spam emails increased by 30% in 2021 compared to the previous year](https://www.washingtonpost.com/technology/2022/01/10/email-spam-stop/). | ||||||
|
||||||
While scams can be seen as a type of spam, they differ in intent. Spammers are typically marketing something, whether it's legitimate or counterfeit products, or services. They might be annoying, but many are legitimate sellers. **In contrast, scammers aim solely to steal from their targets.** | ||||||
|
||||||
Phishing is a specific type of scam where the perpetrators trick you into providing sensitive information like credit card details, passwords, or Social Security numbers. | ||||||
|
||||||
## Compromised email accounts | ||||||
|
||||||
Hacked email accounts can serve as effective Trojan horses, a term used to describe deceptive malware attacks and email scams. Here's an example: | ||||||
|
||||||
- A man received an email from a friend who is a software engineer. The email contained a suspicious link, which turned out to be a virus. The man confirmed with his friend that his email account had been hacked. (See my personal example in [the "Example of a compromized account scam" section](/docs/safety-security/tech-scams.md) where I had fallen for one such scam message. While not email per say, the methodology works the same way.) | ||||||
|
||||||
The key takeaway is that even if an email appears to come from someone you know, it could still be a scam. Noticing changes in the sender's usual communication style can help detect a hacked account. The best protection is to verify suspicious emails through a different communication method, such as a phone call or text. This approach not only protects you but also alerts the victim that their account has been compromised. | ||||||
|
||||||
If you are a victim of one such event where your account was compromised, refer to the [What you can do to recover your accounts](/docs/safety-security/tech-scams.md) section. | ||||||
|
||||||
## The different kinds of email scams | ||||||
|
||||||
Scams, some dating back to the early days of the internet, can be recycled or improved upon. Here are some examples. For a more detailed description of them, refer to this [blogpost discussing email scams and how to avoid them](https://www.comparitech.com/blog/information-security/email-scams/). | ||||||
|
||||||
### Phishing Scams | ||||||
Scammers impersonate reputable organizations to trick you into providing sensitive information. If you suspect an email might be legitimate, access your account directly through your web browser to verify. | ||||||
|
||||||
### Advance Fee Scams | ||||||
These scams convince you that you're entitled to money or a free product, but require you to send money in advance. | ||||||
|
||||||
### 419 Scams/Nigerian Check Scams | ||||||
These are early advance fee scams where the sender, often claiming to be a prince, needs your help to access money. If you pay, the sender will find more reasons for you to send money. | ||||||
|
||||||
### Relative in Distress Scams | ||||||
The scammer claims a family member is in trouble and asks for money. If unsure, contact your family member through another method. | ||||||
|
||||||
### Heartstring Scams | ||||||
These scams prey on your compassion, asking you to send money to help victims of various causes. Check CharityWatch to verify unfamiliar charities. | ||||||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
|
||||||
|
||||||
### Business Opportunities and Work-from-Home Scams | ||||||
These scams promise easy money for little effort. They often require you to buy something to get started. Pyramid schemes (nowadays referred to as "Multi-Level Marketing") and Ponzi schemes are subcategories of this scam. | ||||||
|
||||||
### Cryptocurrency Scams | ||||||
If you see cryptocurrency in an email from an unknown sender, it's likely a get-rich-quick scam. | ||||||
|
||||||
### Tech Support Scams | ||||||
These scams claim your computer's security is compromised. Big tech companies will never make unsolicited calls or emails claiming your computer is infected. | ||||||
|
||||||
### Health Scams | ||||||
These scams prey on people's insecurities, promising miracle cures. Do not buy health-related products marketed in unsolicited emails. | ||||||
|
||||||
### Trojan Horse Email Scams | ||||||
These messages claim your computer is locked or infected with malware. Run a scan with your antivirus program or Malwarebytes instead of opening these messages. | ||||||
|
||||||
### Fake job scams | ||||||
Offers of employment or gigs that require personal information, payment, or promise high earnings for minimal effort are likely fraudulent and should be approached with caution. |
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.