{"id":3112,"date":"2023-07-05T00:00:00","date_gmt":"2023-07-05T00:00:00","guid":{"rendered":"https:\/\/gatebizglobal.com\/dont-tricked-into-clicking-that-image-that-email-your-inbox\/"},"modified":"2023-07-05T00:00:00","modified_gmt":"2023-07-05T00:00:00","slug":"dont-tricked-into-clicking-that-image-that-email-your-inbox","status":"publish","type":"post","link":"https:\/\/gatebizglobal.com\/dont-tricked-into-clicking-that-image-that-email-your-inbox\/","title":{"rendered":"Don\u2019t be tricked into clicking on that image in that email in your inbox"},"content":{"rendered":"
Cybercriminals are at it again, with the latest popular phishing scam that involves victims clicking on images sent to them via email that are riddled with malware. A report from the Israeli security firm Check Point Harmony Email<\/a> reveals this new technique that hackers are using. Here are all the details we know and how to avoid becoming the next victim of these vicious attacks.<\/p>\n <\/p>\n CLICK TO GET KURT\u2019S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK TIPS, TECH REVIEWS AND EASY HOW-TO\u2019S TO MAKE YOU SMARTER<\/strong><\/a><\/p>\n Typically, when a hacker sends out a phishing email, it will consist of a link that the victim is urged to click on, which will lead them to a phishing website (often disguised as a legit site like Amazon), where they are urged to hand over their personal information. However, this technique has hackers using images instead of links.<\/p>\n <\/p>\n By using only images, hackers can avoid these mistakes and instead urge victims to click on the image that will take them to the phishing website.<\/span> (\u00a0)<\/span><\/p>\n Phishing messages can be spotted more easily if you read carefully, because there are typically spelling and grammar errors in them. By using only images, hackers can avoid these mistakes and instead urge victims to click on the image that will take them to the phishing website. These are stereotypically large promotional images that one might see in an advertising email from a company like Best Buy, Kohl’s or other large retailers,<\/a> so victims may not second guess it right away. However, once the image is clicked on, victims are taken to phishing sites that are designed to steal passwords and other sensitive information.<\/p>\n <\/p>\n If you’re receiving an email that’s claiming to be from a major company like Walmart or Delta, look closely at the sender’s email.<\/span> (\u00a0)<\/span><\/p>\n If you’re receiving an email that’s claiming to be from a major company like Walmart or Delta, look closely at the sender’s email. You can easily use your trusted search engine to look up the real email address for these companies and if the email you got doesn’t match that address, then you’ll know it’s a scam.<\/p>\n THOUSANDS OF IMPOSTER WEBSITES DISCOVERED MIMICKING TOP BRANDS TO STEAL YOUR BANKING INFO<\/strong><\/a><\/p>\n <\/p>\n If you get an email from an unknown sender, and it has links, attachments, or in this case, images that you’re being urged to click on, this is a big red flag. This is one of the main ways that scammers will lead their victims to phishing websites,<\/a> so make sure you’re not just blindly trusting the sender and clicking on whatever they’re offering you.<\/p>\n <\/p>\n See my expert review of the best antivirus protection<\/strong> for your Windows, Mac, Android and iOS devices<\/strong> by heading to CyberGuy.com\/LockUpYourTech.<\/u><\/strong><\/a><\/p>\n Cybercriminals are now using images instead of links in their phishing emails<\/a> to deceive us and lead us to malicious websites. To avoid becoming a victim of these scams, it’s crucial to carefully check the sender’s email address, refrain from clicking on suspicious links or attachments, and stay calm to avoid falling into the hackers’ traps. By staying vigilant and following these steps, you can protect yourself from these vicious attacks and safeguard your personal information.<\/p>\nHow are hackers pursuing this new phishing technique?<\/h2>\n
Check the sender’s address<\/h3>\n
Don’t click links or open attachments<\/h3>\n
Kurt’s key takeaways<\/h2>\n