Fool me once shame on you, fool me twice shame on you
- Hits: 588
- 0 Comments
- Subscribe to updates
- Bookmark
It looks as though 2012 is not only gearing up to be the year of cloud computing and healthcare information security concerns but also the year of continued phishing attacks and scams. Here is my most recently received scams (among the many other banking phishing attacks that roll in on a daily basis). It seems I have won the Texas Lottery, again!
These scams are much simpler to spot than some of the most sophisticated phishing scams I have seen. Take a look at a few of the key indicators:
1. In this cyber world I guess it only makes sense that they begin running a lottery based on email addresses, right?
2. I am addressed as Stake Winner – You would think that my winning $800,000.00 would at least warrant a name look up by the Texas Lottery Commission.
3. Google Translate is getting pretty good but not good enough to correct the grammar in this awkward message.
4. Wait a minute this isn’t Texas – I’m not even a resident of Texas, nor have I entered the Texas lottery lately.
5. Oh of course, that makes perfect sense, a Texas lotto claims agent, located in the United Kingdom, with only a Gmail email account.
6. Dr. Roseline Morgan, Director of the Texas Lottery Commission? Yes absolutely, I sure wouldn’t trust my lotto commissioners to hold anything less than a doctorate (hmm odd, she seems to enjoy signing her name “Morgan Lewis”)
Although this is a weak example of an online scam, the excitement of a lotto winning can sometimes cause all logic to go out the window. Check back as I’ll be updating you periodically on this year’s newest phishing attacks and how to avoid being duped.
-
Break out the RAT traps, there is shady business afoot
Forget about LulzSec and Anonymous. Those political hacktivist groups are only amateur script kiddies compared to hackers recently revealed by McAfee.... -
Mobile browser security is a spoof
Since when does innovation call for imitation of security? In todays world users demand portability. This involves designing devices and services to o... -
Trouble keeping up with the industry? IP3 Inc.’s CPE ToGo Program is here to help
The past year has been plagued with a variety of new attacks. The most influential being Operation Shady RAT and its attack on over 70 organizations... -
Security by Insanity
A dear friend found a reason to remind me what Einstein (or somebody important) said was insanity - doing the same thing and expecting something diffe...