We all saw those emails that were selling amazing quotes that seemed too good to be true and terrible Warn your computer has been compromisedIf you don’t Pay your tax refund immediately.
These are common sales pitches among online scammers, trying to scare you and click links you shouldn’t, hand over money or personal information, or download it turns out to be an attachment to computer viruses.
But new research suggests that these common tones may have been too common to be effective, leading more cybercriminals to take a different approach.
For a long time, phishing emails featured striking topics that included phrases such as “emergency request” or “payment expired,” but many phishing emails showed many of the last year’s phishing emails by Cisco’s many phishing emails, including relatively good topic routes.
“They probably know we’ve caught this and that tricky sensational emails won’t work anymore,” McKay said. “So they’ve moved towards these benign words that are likely to be in your inbox every day.”
An analysis of the subject line of phishing emails is included in part of the Cisco annual review report, which examines the threats the company faces in 2024.
McKay, one of the authors of the report, said that although email phishing appears to be a history in the era of artificial intelligence and other advanced technologies, cybercriminals are still doing so because it works.
Whether they are following one of the largest companies in the world or the people who are every day, attackers continue to impersonate famous consumer brands in the hope that they can bite as many people as possible.
Some of the most important brands in phishing emails blocked by Cisco systems last year include Microsoft Outlook, which itself accounts for 25% of the total, as well as LinkedIn, Amazon, Paypal, Apple, Apple and Shein, according to a report from Talos.
Admittedly, while these days aren’t exactly news, McKay said she thinks the talk is still important. She said phishing remains a significant threat, especially when it is supercharged by AI tools that enable attackers to effectively create scam emails that are more complex and larger than ever before.
“Phing is still prominent, phishing is effective, phishing will only get better and better, especially in AI,” McKay said.
What is phishing like?
You do not request emails, texts, and social media posts. If someone or company contacts you and you don’t contact them first, you may have ignored it. Here is an email saying your Windows subscription has expired, a text from your bank says your account has been compromised, or it has posted a big pitch on Instagram and a lot on designer sunglasses.
Scammers target unemployed people. Do not click on any links or download any attachments. Instead, visit the bank or company’s website directly. If the “recruiter” contacts you, your personal information will only be sent to the company you are applying for. Any offer that looks too good to be offered genuinely and proactively should be treated like this.
Requests for payment in gift cards or cryptocurrencies are red flags. These are the preferred payment methods for cybercriminals, as they are largely untrackable and can be easily liquidated. For example, the IRStax payment will not be deducted in either form. In connection with this, the IRS will not contact you via email, text or phone. They work specifically through snail mail.
Love digital statement. Romantic scams in romance caused $384 million in the first nine months of 2024 (the latest figures). The email may have come from a woman who says she is trying to escape the war in Ukraine, or someone who serves in the army, who just thinks you are cute. Anyway, if they can’t meet you in real life for any reason, then it’s very skeptical. The same goes for whether they request a gift card or cryptocurrency.
Charity scams are the same thing. Like a romantic scam, these scammers are looking for Use people with big hearts. They would say they are looking for donations to help victims of the latest natural disasters or wars, or support something that looks like a legitimate aid organization. Donate only to verified and established charities. Go directly to their website or connect to them through a trusted source.
How can I protect myself if I think I am protected?
Use good antivirus software and update everything. A large part of Antivirus software tasks is to filter spam and scam emails and stop malware that may be attached to it. However, AV can’t stop threats it doesn’t know, so make sure you keep updating to keep all new threats. Meanwhile, updating the device’s operating system and applications will fix bugs that cybercriminals may exploit.
A great password is a must. If your email account is compromised, it can be used to trick your contacts from their money or identity. It can also be used to help reset passwords for your financial and other hypersensitive accounts. Usually, passwords should be long (at least 12 characters) and unique (password 123 is always a bad idea). Even if you think they are really good, resist the temptation to reuse them. If juggling many complicated passwords feels too challenging, Password Manager Can help.
Two-factor authentication is unwise. Even the best passwords can be cracked. If this happens, two-factor authentication will be of great help in protecting you. In addition to the password, it requires a second form of authentication, such as a biometric indicator, which sends notifications to a phone or a connection to a physical key. However, avoid SMS text versions. Although very few Simulation exchangeallowing cybercriminals to intercept these text codes.
Consider credit freezing. If you believe your Social Security number or other super private details have been compromised, freezing your credit will prevent cybercriminals from taking out loans in your name or otherwise using that information for identity theft. Some security experts recommend freezing children’s credit until they need to use it, as identity theft they commit can often attract attention.