Recently, Google customers fell prey of a scam that gave hackers the permission to access contents of online documents, contact lists, and emails of the victims.
The users were asked to click on a link to a Google Doc that seemed to come from someone they knew.
Google"s login and permissions page request the user to allow the fake Docs app to read, send, delete and manage the email and contacts of the user as soon as the user clicks on the link to open it.
This was a sophisticated scam which worked through Google"s system, unlike the common attacks.
Such phishing scams are run for extracting personal information like usernames, passwords, addresses and financial details from victims by leading them to a fake version of a real web page through an email.
DON"T FALL INTO THIS TRAP
The false practice of sending out emails which seem to be from a source that is well-known, such as a utility provider or a major bank is known as Phishing.
If you click on any such link, then it will take you to a fake site to steal the login details that you enter and can also install malware on your device.
Whereas, on the other hand, there is a more targeted version of the above which is called as Spear Phishing.
Through this, the emails will address you by your name and will appear to come from someone known to you in your organization, or it can also seem to have come from your email provider to warn you for changing your password.
A study has shown that almost 56% of people click on such links that are sent to them and fall prey of spear phishing email attack.
Don"t be a scam victim
There is still a chance to revoke the action if you have already given access to the scammers to your account.
These fraudulent practices are taking place regularly these days so be very careful about any suspicious emails inviting you to view Google documents.
Act sensible and double-check with the sender of such an email to make sure that a document is real before you click on any of the links.
Make sure that you should not approve any requests under any circumstances to give a site extra permissions over your email, as the real Google Doc never ask for such kind of permissions.
The damage can be massive, so beware of such scams as it gives access to your most personal details and data.
Ransomware Attacks Targeting Government Bodies
Tips to Crack the AWS Exam in your First Attempt
IT Industry Requires 145% Skilled Professionals in CyberSecurity
Scope of Ethical Hacking
EC Council CEH V10 The Best Hacking Certification
Brand Valuation Through Cyber Security at The Time of Asset Mergers & Acquisition
Financial Benefits of VMware Certification
[Just Announced] PMP Exam Change 2020: All you need to know Before & After
A Guide to Becoming a Project Manager in 2019
10 Reasons Why You Should Do a CISSP Certification