{"id":79793,"date":"2016-04-07T19:28:12","date_gmt":"2016-04-07T23:28:12","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-08-23T14:55:12","modified_gmt":"2021-08-23T18:55:12","slug":"9-emails-you-should-never-open","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/9-emails-you-should-never-open\/","title":{"rendered":"9 Emails You Should Never Open"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20230428201927\/https:\/\/mysecurityawareness.com\/article.php?article=384&amp;title=what-is-impersonation-in-social-engineering\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-105255\" title=\"9 Emails You Should Never Open\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/imposter-1-e1569090865128-150x127.png?resize=101%2C85&#038;ssl=1\" alt=\"9 Emails You Should Never Open\" width=\"101\" height=\"85\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/imposter-1-e1569090865128.png?resize=150%2C127&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/imposter-1-e1569090865128.png?resize=75%2C63&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/imposter-1-e1569090865128.png?w=512&amp;ssl=1 512w\" sizes=\"auto, (max-width: 101px) 100vw, 101px\" \/><\/a>The increasing pace of life coupled with mobile computing which bombards us with emails and messages, from more sources, and across more devices than ever before has created what <a href=\"https:\/\/proofpoint.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Proofpoint<\/a> <a href=\"https:\/\/www.helpnetsecurity.com\/2014\/07\/23\/the-psychology-of-phishing\/\" target=\"_blank\" rel=\"noopener noreferrer\">calls<\/a> a generation of <strong>trigger-happy clickers<\/strong>.<\/p>\n<p><a href=\"https:\/\/www.digitalnewsasia.com\/digital-economy\/scammers-in-malaysia-up-their-game-with-social-engineering\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105258\" title=\"fake emails from cyber criminals.\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_thief_female.jpg?resize=98%2C95&#038;ssl=1\" alt=\"fake emails from cyber criminals.\" width=\"98\" height=\"95\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_thief_female.jpg?resize=150%2C146&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_thief_female.jpg?resize=75%2C73&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_thief_female.jpg?w=703&amp;ssl=1 703w\" sizes=\"auto, (max-width: 98px) 100vw, 98px\" \/><\/a>Trigger-happy clickers are falling more and more for <strong>fake emails from cybercriminals<\/strong>. These fake emails are so convincing and compelling that they fool 10% of recipients into clicking on the <strong>malicious link<\/strong> according to the article. To put that into context a legitimate marketing department typically expects &lt;2% click rate on their advertising campaigns.<\/p>\n<p>So, despite the best efforts of security professionals, too many people are still falling prey to email scams at home and work. Whether it\u2019s a <strong>get-rich-quick<\/strong> scheme or a sophisticated <strong>spearphishing<\/strong> attack, here are some emails to steer clear of:<\/p>\n<h3>1. The government scam<\/h3>\n<p>These emails look as if they come from government agencies, such as the IRS, FBI, or CIA. If these TLA&#8217;s want to get a hold of you, it won\u2019t be through email.<\/p>\n<h3>2. The \u201clong-lost friend\u201d<\/h3>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105260\" title=\"tries to make you think you know them\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fb_friends.jpg?resize=125%2C63&#038;ssl=1\" alt=\"tries to make you think you know them\" width=\"125\" height=\"63\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fb_friends.jpg?resize=150%2C76&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fb_friends.jpg?resize=75%2C38&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fb_friends.jpg?w=554&amp;ssl=1 554w\" sizes=\"auto, (max-width: 125px) 100vw, 125px\" \/>This scammer tries to make you think you know them, but it might also be a contact of yours that was hacked.<\/p>\n<h3>3. The billing issue<\/h3>\n<p>These emails typically come in the form of legitimate-looking communications. If you catch one of these, log into your member account on the website or call the call center.<\/p>\n<h3>4. The expiration date<\/h3>\n<p>A company claims your account is about to expire, and you must sign in to keep your data. Again, sign in directly to the member website instead of clicking a link in the email.<\/p>\n<h3>5. You\u2019re infected<\/h3>\n<p><a href=\"https:\/\/web.archive.org\/web\/20170312194441\/http:\/\/www.cso.com.au\/article\/555843\/security-threats-through-cloud\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105265\" title=\"you\u2019re infected with a virus\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware4.jpg?resize=104%2C100&#038;ssl=1\" alt=\"you\u2019re infected with a virus\" width=\"104\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware4.jpg?resize=150%2C144&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware4.jpg?resize=75%2C72&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware4.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 104px) 100vw, 104px\" \/><\/a>A message claims you\u2019re infected with a virus. Simple fix: Just run your antivirus and check. In a recent twist, scammers claiming to be computer techs associated with well-known companies like Microsoft. They say that they\u2019ve detected viruses or other malware on your computer to trick you into giving them remote access or paying for software you don\u2019t need.<\/p>\n<p>Scammers have been peddling bogus security software for years. They set up fake websites, offer <strong>free \u201csecurity\u201d scans<\/strong>, and send alarming messages to try to convince you that your computer is infected with malware. Then, they try to sell you software to fix the problem. At best, the software is worthless or available elsewhere for free. At worst, it could be malware \u2014 software designed to give criminals access to your computer and your personal information.<\/p>\n<p>But wait it gets worse &#8211; If you paid for their &#8220;tech support&#8221; you could later get a call about a refund. The <a href=\"https:\/\/web.archive.org\/web\/20210425093144\/https:\/\/www.consumer.ftc.gov\/articles\/0102-refund-and-recovery-scams\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>refund scam<\/strong><\/a> works like this: Several months after the purchase, someone might call to ask if you were happy with the service. When you say you weren\u2019t, the scammer offers a refund.<\/p>\n<p>Or the caller may say that the company is going out of business and providing refunds for \u201cwarranties\u201d and other services.<\/p>\n<p>The scammers eventually ask for a bank or credit card account number. Or they ask you to create a <strong><a href=\"https:\/\/www.westernunion.com\/us\/en\/fraudawareness\/fraud-types.html\" target=\"_blank\" rel=\"noopener noreferrer\">Western Union account<\/a><\/strong>. They might even ask for remote access to your computer to help you fill out the necessary forms. But instead of putting money <strong>in<\/strong> your account, the scammers withdraw money <strong>from<\/strong> your account.<\/p>\n<h3>6. You\u2019ve won<\/h3>\n<p><a href=\"http:\/\/blog.aarp.org\/2013\/03\/04\/fighting-foreign-lottery-fraud-and-more\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105267\" title=\"you won a contest you never entered\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/money_down-the-drain.jpg?resize=95%2C90&#038;ssl=1\" alt=\"you won a contest you never entered\" width=\"95\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/money_down-the-drain.jpg?resize=150%2C143&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/money_down-the-drain.jpg?resize=75%2C71&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/money_down-the-drain.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 95px) 100vw, 95px\" \/><\/a>Claims you won a contest you never entered. You\u2019re not that lucky; delete it. It\u2019s illegal to play a <strong><a href=\"http:\/\/www.scambusters.org\/foreignlottery.html\" target=\"_blank\" rel=\"noopener noreferrer\">foreign lottery<\/a><\/strong>. Any letter or email from a lottery or sweepstakes that ask you to pay taxes, fees, shipping, or insurance to claim your prize is a scam.<\/p>\n<p>Some scammers ask you to send the money through a <strong><a href=\"https:\/\/web.archive.org\/web\/20160421025654\/https:\/\/www.onguardonline.gov\/articles\/0007-money-transfer-scams\">wire transfer<\/a><\/strong>. That\u2019s because wire transfers are efficient: your money is transferred and available for pick up very quickly. Once it\u2019s transferred, <strong>it\u2019s gone<\/strong>. Others ask you to send a check or pay for your supposed winnings with a credit card. The reason: they use your bank account numbers to withdraw funds without your approval, or your credit card numbers to run up charges.<\/p>\n<h3>7. The bank notification<\/h3>\n<p>An email claiming some type of deposit or withdrawal. Give the bank a call to be safe.<\/p>\n<h3>8. Playing the victim<\/h3>\n<p><a href=\"https:\/\/web.archive.org\/web\/20160310082153\/http:\/\/manchesterinklink.com\/scam-alert-nh-ag-warns-of-utility-bill-collection-scam-phone-calls\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105269 size-thumbnail\" title=\"emails make you out to be the bad guy\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/scam.png?resize=75%2C44&#038;ssl=1\" alt=\"emails make you out to be the bad guy\" width=\"75\" height=\"44\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/scam.png?resize=75%2C44&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/scam.png?resize=150%2C88&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/scam.png?resize=768%2C448&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/scam.png?w=771&amp;ssl=1 771w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>These emails make you out to be the bad guy and claim you hurt them in some way. Ignore.<\/p>\n<h3>9. The security check<\/h3>\n<p>A very common phishing scam where a company just wants you to \u201cverify your account.\u201d Companies almost never ask you to do this via email.<\/p>\n<h3>What To Do Instead of Clicking Links<\/h3>\n<p>In the case of your bank or other institution, just <strong>go to the website yourself and log in<\/strong>. Type in the address manually in the browser or click your bookmark. That way you can see if there\u2019s something that needs taken care of without the risk of ending up on a phishing site.<\/p>\n<p>In the case of your friend\u2019s email, chances are that they copied\/pasted the link into the message. That means you can see the full address. You can just <strong>copy\/paste the address into the browser yourself without clicking anything<\/strong>. Of course, before doing that make sure you recognize the website and that it\u2019s not misspelled.<\/p>\n<p>Proofpoint&#8217;s bottom line is that unless you explicitly know and trust it, <strong>avoid it<\/strong>. That\u2019s all there is to it. Make this a habit and you can avoid one of the biggest mistakes in internet safety.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/wishtv.com\/2016\/03\/24\/hcso-warns-of-jury-duty-scam\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">HCSO warns of jury duty scam<\/a> (wishtv.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber scammers will try to scare you into opening their tainted emails do not open unknown emails. Here are 9 examples of emails you should not open.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2686,857,1209,874,171,1041,164,608,130,2655,23,951,2657,1507,2656,4,1217,95,2654,2653,2651],"class_list":["post-79793","post","type-post","status-publish","format-standard","hentry","category-security","tag-2686","tag-bitcoin","tag-cia","tag-confidence-trick","tag-email","tag-fbi","tag-fraud","tag-identity-theft","tag-irs","tag-lottery","tag-malware","tag-pii","tag-proofpoint","tag-ransomware","tag-scam","tag-security","tag-social-security-number","tag-spam","tag-tech-support","tag-western-union","tag-wire-transfer"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/79793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=79793"}],"version-history":[{"count":14,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/79793\/revisions"}],"predecessor-version":[{"id":128268,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/79793\/revisions\/128268"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=79793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=79793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=79793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}