Article Body
NEED TO KNOW NEWSLETTER
Unfamiliar websites and commands!
Cybercriminals are scheming to exploit your trust!
But you can stop them by learning to spot their plots. Here are their top six tricks.
1. NEW Watering Hole Attack: Check out the image below! You get prompted on a website to verify that you're a human. But if you do what they ask, the criminals will have control of your computer. STOP! Don't do it!
2. Fake Software Update: You get a pop-up or see a web page warning that your software is outdated. It tells you to run a command to upgrade to the latest version. That command will install malware on your computer. Stop! Don’t do it.
3. Phishing Email: You get an email claiming to be from your IT department. It tells you to visit a website and enter a command to fix a security issue. That command will let criminals secretly take control of your computer. Stop! Don’t do it.
4. Tech Support Scam: You get a pop-up message while browsing. It claims your computer is infected and urges you to call a tech support number. The “technician” on the phone instructs you to run some commands. Those commands will give a criminal full control of your computer. Stop! Don’t do it.
5. Fake Job Application: You see a great job advertised. While filling out the online application, you’re asked to run a command to verify that your system and theirs are compatible. But if you do, you’ll have spyware put on your computer. Stop! Don’t do it.
6. Social Media Links: You click something, and it takes you to a website. The site offers you a command to “unlock premium features” or to give you “access to exclusive content.” If you run the command, criminals can watch everything you do on your computer. Stop! Don’t do it. Stop! Don’t do it.
ACTION STEPS
These examples highlight the importance of being cautious about anyone who asks you to enter commands or take actions. Cybercriminals want to trick and confuse you. If in doubt, contact your IT Support before following instructions from any website or email.
- Be vigilant, verifying the legitimacy of websites and commands, and maintaining a healthy skepticism can prevent these threats.
- Be skeptical of unsolicited instructions
- Double-check with trusted sources if in doubt. Cyber threats are sneaky and can have severe consequences
- Cybersecurity awareness and training will help you recognize and avoid potential dangers, safeguarding your personal and organizational data