With today’s technology, people are becoming more vulnerable to cyber-crime. We’ve all had that suspicious email, that Nigerian Prince who needs money to make you money, or a website that looks real but something about it is off. Here are a few different ways a person might fall victim to a cyber-criminal and how you can prevent it.
Spoofing involves impersonation or copying a trusted brand to fool an unsuspecting recipient, with the intent of gaining access to technology, so criminal activity can occur.
Common Spoofing Types
Caller ID and Messages: delivers calls and texts that look like legitimate business communications, in an attempt to gain personal information. A message might read: “We have detected illegal activity on your account, click here to log in and report it.”
Website (URL): uses copies of a trusted brand’s website to trick a user into logging in and giving away personal information.
Internet Protocol (IP address): hides a computer’s IP address to get network access or carry out a denial-of-service attack.
Address Resolution Protocol (ARP): links an attacker’s media access control (MAC) address to a real IP address to bypass data to steal or modify it.
Domain Name System (DNS): maps URLs and emails to the wrong IP address, taking a user to a site that spreads malware.
Email: hinges on fake accounts used in phishing to deliver ransomware, trojans and DDoS attacks and more.
GPS: hoodwinks a device’s GPS with a false location for nefarious purposes.
File Extension: hides malware files in common files such as .exe or .txt.
Deepfakes/Facial Spoofing: uses 3D models of real people in video and images to create false video content or gain access to devices using facial recognition to unlock.
Any unsolicited digital communication, mainly email, that is sent by an attacker in bulk. Spam takes up bandwidth, time, and resources. Spam can range from annoying marketing emails with real offers to marketing emails with fake offers that can push to dangerous sites. Most annoying marketing is filtered out by your email software and doesn't pose a serious threat. In more serious cases, spammers are attempting to break into your online accounts to steal data, money, and spread malware.
5 Types of Spam
A scam is any fraudulent scheme designed to dupe the user out of something valuable - time, money, access and more. The following scams are often conducted in some part online.
How to Avoid Spoofing, Spamming and Scamming
In all cases, be vigilant. While something might appear to be an obvious scam of some sort, many are very well done. Scammers rely on social engineering - psychological manipulation that plays on human tendencies towards greed, vanity, desperation or empathy.