Criminals use global brands to scam and in Costa Rica they even masquerade as Intel

QCOSTARICA – Intel Costa Rica has issued a new alert alleging false information is circulating on social media regarding the company’s staffing process in the country.

Phishing or deception with fake emails and websites to obtain account information and passwords used for internet fraud. (Image file)

The company pointed out that the official website for people interested in a job with the company is www.intel.com/jobs, which doesn’t ask – whether through websites, phone calls, or anything other way – sensitive information and that any information is false. requesting data information through fraudulent emails.

– Publicity –

The use of recognized global brands to mislead people into providing their personal information is very common. According to a report by Vade, a threat detection and response company, hackers used 25 brands for phishing scams.

Phishing uses a fake email or bogus website with the appearance of the official website or emails to make it appear as genuine and redirect to scam pages where people enter their data, their accounts and passwords.

Intel Recruitment has warned that people should not ignore these types of communications where criminals are trying to get data from people to scam them.

The brand of the French financial group, Crédit Agricole, was the most used by phishing attacks (17,755) in the first half of 2021, followed by Facebook (17,338), Microsoft (12,777), WhatsApp (8,727), Amazon (3,501), Comcast (3,116), PayPal (2,601) and Chase Bank (2,537).

The report points out that financial brands are the favorites of criminals (36% of phishing attacks) of entities such as Crédit Agricole, La Banque Postale, PayPal, Chase, Wells Fargo, Square, HSBC and Banque Populaire.

The other most used brand groups are those of social networks (Facebook, Instagram, LinkedIn and WhatsApp), cloud services (Microsoft, Netflix, Adobe and DocuSign) and e-commerce and logistics (Amazon, DHL, Rakuten , Apple and eBay).

– Publicity –

Globally, 10% of counterfeit brands in phishing attacks were Internet and telecommunications companies, such as Orange, Comcast, Yahoo, SFR (9%), as well as government agencies (1%).

Companies stress that users should be vigilant and take several actions:

1. Keep your browser up to date. Cybercriminals often launch attacks to exploit known security vulnerabilities.

2. Inspect the website URL. Carefully review the website URL or email address before taking any action.

– Publicity –

3. Find the SSL certificate. Make sure the portal address starts with HTTPS (not HTTP) and has a green padlock symbol before the web address, as this implies that the website has an SSL certificate and the connection is encrypted. Notice the URL in the address line of the page, it starts with https: // …

4. Beware of grammar mistakes. Scammers rarely hire professional copywriters to check the content of their copy website for errors.

5. Check if the website has been bookmarked. You can use URL checkers to see if the website has already been bookmarked; You can find many tools for this purpose by searching for Check URL Security on Google.

6. Do not provide personal data. Remember that no company or bank will ask you for your personal data and bank passwords; do not provide data to people you do not know over the phone or by entering their accounts and passwords via email, social media, or websites.

7. Use two-factor authentication and a biometric security mechanisms for all your email accounts, social networks, electronic shopping accounts and banks, among others.

Mistakes to never make on the Internet

Online scams are not the fault of the victims, but they are facilitated by a lack of digital preparation and literacy, a lack of common sense, and the mistakes or incorrect practices that we keep telling users:

1. Use a cell phone to memorize passwords. People store most of their photos, videos, data, bank accounts, keys or passwords on their mobile phones and the rest on their computers, which also lack security systems.

2. Use discontinued devices. Users should see the information on how to leverage and protect their devices. A common mistake is to buy the cell phone or computer and not verify the manufacturer or carrier information.

3. Have outdated operating systems. Regular operating system updates include security fixes for newly identified vulnerabilities. Computers and cellphones should see updates as part of basic protection measures. Updates also extend the lifecycle of devices.

4. Open all the files there. Users tend to open all files they receive in emails, text messages, messaging chats (Messenger or WhatsApp) without any prior review or confirmation from the sender (is it known or not? ) Or wonder if it may include malware or a compromised file.

5. Have passwords that are easy to guess or find. Would you leave the keys to your house stuck on the door? Well, the same is done when the passwords or keys are saved on the cell phone or the computer. The right thing to do is to use two-factor authentication systems, thanks to which the mechanism for receiving a notification or a code on your mobile phone (by SMS or e-mail) is activated if someone tries to ” enter your social network, your bank account or your e-mail account.

6. Connect to any Wi-Fi network found. Whenever possible, people should use mobile data from their postpaid plan or prepaid top-up when in public places. When using public or commercial Wi-Fi networks, you run the risk of connecting to networks that have been hacked or spoofed by cybercriminals. At best, they open the door to spam.

7. Post everything on social media (including posting what you’re going to post). Even if you have few social media contacts, know that there is always someone watching everything you post about your personal or family life, work or business.

8. Answer all calls and give your contact details innocently. If you are called, do not provide information. Criminals will first discover your information on social media, Google or public sites (such as vital statistics) and use this data to trick you into believing that it is the bank, a public entity or a bank. ‘a company.

– Publicity –

Source link

About Matthew Berkey

Check Also

Could investing in faucets and toilets be the key to unlocking developing economies?

* This article was originally published by the Financial Times as part of its Partner …

Leave a Reply

Your email address will not be published. Required fields are marked *