Beware of online coronavirus scams

Hackers have increased their activity during the current pandemic crisis. It’s more important than ever for you to be extremely cautious online.

With the massive number of people working from home, hackers feel they have an opportunity to exploit the pandemic for illegal profit. The level of hacking activity has definitely risen in recent months and everyone needs to be extremely cautious, especially with links and attachments in email messages as well as messages on social media platform and even your smartphone.

There have been reports of smartphone users receiving text messages related to federal stimulus payments and COVID-19 alerts for their area. These are mostly fake messages, generated by hackers trying to get you to click on links and reveal personal information on compromised web sites in an effort to steal your identity or worse. With so many people spending significantly more time online, the target environment is quite rich for these bad actors.

Over the past couple of months there has been a surge in domain names being registered on the Internet related to COVID-19, Coronavirus and just about every related term you can think of. These domains are being used to trick users into providing information that will allow hackers to assume identities or commit outright theft. It is more important than ever that you inspect every email with a link or attachment very carefully.

One of the first scams to emerge was an email that purported to come from the WHO and contained an attachment with information to keep you safe during the pandemic. That attachment was fake and launched software code that installed malware on the recipient’s computer that could track them and steal credentials when the unsuspecting user logged in to their bank or other websites. These are common hacking tactics that you need to remain aware of.

You should always be suspect of any email that you receive with links or attachments. You should verify the sender to be sure they are who they say that are and when in doubt, delete the message without clicking the link or opening the attachment. That is always best.

With the spike in literally thousands of domain names being registered to exploit this crisis, give serious consideration to using a DNS filtering service. The government of Canada recently announced it will be making a free DNS filtering service available to all Canadian citizens in an effort to thwart these fake domains. These domains are being setup for unsuspecting users to land on and think they are legitimate web sites. Their goal, like all of these scams, is to capture credentials, solicit payments or silently install malware on the visiting user’s computer.

The amount of scams is growing so fast that there are nearly daily alerts from the FBI and FTC being issued to warn consumers of the threat. Don’t become an unknowing victim. Be sure you have up to date security software on your computers. Be sure to keep your computers and software updated with the latest versions to be sure any security issues are properly patched. Check to see if your Internet provider of your router provide any type of DNS filtering and if so, enable it. If they don’t, consider using a good DNS filtering service like Cisco Umbrella, Safe DNS, Sophos or others. You can’t be too careful, especially during this pandemic.

Hot this week

The Hidden Dangers of Over Reliance on Security Tools

Adding more security tools can increase complexity and blind spots instead of improving protection, so focus on integration and training over new purchases.

How Poor MFA Setup Increases Your Attack Surface

Multi-factor authentication is essential for security, but flawed implementation can expose your organization to greater risks than having no MFA at all. Learn how to properly configure MFA to avoid common pitfalls and strengthen your defenses.

The Blind Spots in Your Vulnerability Management Program

Automated vulnerability scanning often creates dangerous blind spots by missing nuanced threats that require human analysis, leading to false confidence in security postures.

Multi Factor Authentication Myths That Put Your Data at Risk

Multi-factor authentication creates a false sense of security when implemented without understanding its vulnerabilities, particularly in global contexts where method choices matter more than checkbox compliance.

The Overlooked Flaws in Multi Factor Authentication

Multi factor authentication is often presented as a security panacea, but hidden flaws and implementation gaps can leave organizations vulnerable despite compliance checkboxes.

Topics

The Hidden Dangers of Over Reliance on Security Tools

Adding more security tools can increase complexity and blind spots instead of improving protection, so focus on integration and training over new purchases.

How Poor MFA Setup Increases Your Attack Surface

Multi-factor authentication is essential for security, but flawed implementation can expose your organization to greater risks than having no MFA at all. Learn how to properly configure MFA to avoid common pitfalls and strengthen your defenses.

The Blind Spots in Your Vulnerability Management Program

Automated vulnerability scanning often creates dangerous blind spots by missing nuanced threats that require human analysis, leading to false confidence in security postures.

Multi Factor Authentication Myths That Put Your Data at Risk

Multi-factor authentication creates a false sense of security when implemented without understanding its vulnerabilities, particularly in global contexts where method choices matter more than checkbox compliance.

The Overlooked Flaws in Multi Factor Authentication

Multi factor authentication is often presented as a security panacea, but hidden flaws and implementation gaps can leave organizations vulnerable despite compliance checkboxes.

The Hidden Costs of Security Compliance

Compliance frameworks often create security blind spots by prioritizing checkbox exercises over real threat mitigation, leading to breaches despite passing audits.

The Illusion of AI in Cybersecurity

AI security tools often create alert fatigue instead of protection, but focusing on human oversight and measured deployment can turn them into effective assets.

The Overlooked Risk of Shadow IT

Shadow IT poses a greater risk than many external threats by bypassing security controls, and managing it effectively requires understanding employee needs rather than simply blocking unauthorized tools.
spot_img

Related Articles

Popular Categories