{"id":516,"date":"2011-10-10T10:49:45","date_gmt":"2011-10-10T14:49:45","guid":{"rendered":"http:\/\/mikemartinezonline.com\/blog\/2011\/10\/10\/phishing-attacks-getting-more-efficient-for-the-bad-guys\/"},"modified":"2011-10-10T10:49:45","modified_gmt":"2011-10-10T14:49:45","slug":"phishing-attacks-getting-more-efficient-for-the-bad-guys","status":"publish","type":"post","link":"https:\/\/mikemartinezonline.com\/blog\/2011\/10\/10\/phishing-attacks-getting-more-efficient-for-the-bad-guys\/","title":{"rendered":"Phishing attacks getting more efficient for the bad guys"},"content":{"rendered":"<p>Folks, please, please, please be very careful of what you click on and what financial information you provide. Especially in response to an &#8216;alerting&#8217; email!   <br \/>There are a great number of &#8216;phishing&#8217; attacks occurring again and they are getting even more sophisticated. Many almost look and sound legitimate. I have written previously on some of <a href=\"http:\/\/bit.ly\/qgJtNM\">this here<\/a>.<\/p>\n<p>But as a reminder, if you get an email or text telling you you must login to a financial (or any other for that matter) site via a link in an email DO NOT CLICK ON ANY LINK AND MOST IMPORTANTLY DON&#8217;T ENTER ANY INFORMATION IF YOU DO!!   <br \/>If you must visit a bank, credit card or online vendors site for &#8216;verification&#8217; or what ever do so through the &#8216;Front Door&#8217;. By that I mean open a brand new Web Browser window and log in to &#8216;their site&#8217; and proceed from there. i.e. https:\/\/wellsfargo.com etc.<\/p>\n<p>If you click on many of these links a few things are likely to happen. 1st you will probably be silently infected by a Trojan\/backdoor application and 2nd you will probably be brought to a &#8216;bogus&#8217; site that looks very much like the legitimate site. You will be prompted to enter in financial and\/or information such as account\/card numbers passwords and other verification. The MOMENT you do you can be assured that your account will be compromised! Sometimes in as little as a few minutes your account can be emptied!<\/p>\n<p>Here is an example of one of the hundreds of emails that have been hitting my email server this weekend. You can see that it almost looks legitimate; the wording is sufficiently scary and authoritative and there is a &#8216;real logo&#8217;. But the link in the email is to a phishing site. AND the email address on the &#8216;from&#8217; is not correct.<\/p>\n<p><a href=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2011\/10\/Security.jpg\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-bottom: 0px; border-left: 0px; padding-left: 0px; padding-right: 0px; display: inline; border-top: 0px; border-right: 0px; padding-top: 0px\" title=\"Security\" border=\"0\" alt=\"Security\" src=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2011\/10\/Security_thumb.jpg\" width=\"455\" height=\"438\" \/><\/a><\/p>\n<p>This looks very \u2018scary\u2019 and it is \u2013 but for the reason that you <em><strong><u>WILL<\/u><\/strong><\/em> be screwed, not that you are yet.<\/p>\n<p>Please use some caution in the digital world. You would not give a perfect stranger your bank card and pin but some will do just that in cyberspace.<\/p>\n<p>Be safe folks!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Folks, please, please, please be very careful of what you click on and what financial information you provide. Especially in response to an &#8216;alerting&#8217; email! There are a great number of &#8216;phishing&#8217; attacks occurring again and they are getting even more sophisticated. Many almost look and sound legitimate. I have written previously on some of &hellip; <a href=\"https:\/\/mikemartinezonline.com\/blog\/2011\/10\/10\/phishing-attacks-getting-more-efficient-for-the-bad-guys\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Phishing attacks getting more efficient for the bad guys&#8221;<\/span><\/a><\/p>\n","protected":false},"author":587,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[49,52,195,21,151,61],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/516"}],"collection":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/users\/587"}],"replies":[{"embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/comments?post=516"}],"version-history":[{"count":0,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/516\/revisions"}],"wp:attachment":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/media?parent=516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/categories?post=516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/tags?post=516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}