Recently, Google customers fell prey of a scam that gave hackers the permission to access contents of online documents, contact lists, and emails of the victims.
The users were asked to click on a link to a Google Doc that seemed to come from someone they knew.
Google's login and permissions page request the user to allow the fake Docs app to read, send, delete and manage the email and contacts of the user as soon as the user clicks on the link to open it.
This was a sophisticated scam which worked through Google's system, unlike the common attacks.
Such phishing scams are run for extracting personal information like usernames, passwords, addresses and financial details from victims by leading them to a fake version of a real web page through an email.
DON'T FALL INTO THIS TRAP
The false practice of sending out emails which seem to be from a source that is well-known, such as a utility provider or a major bank is known as Phishing.
If you click on any such link, then it will take you to a fake site to steal the login details that you enter and can also install malware on your device.
Whereas, on the other hand, there is a more targeted version of the above which is called as Spear Phishing.
Through this, the emails will address you by your name and will appear to come from someone known to you in your organization, or it can also seem to have come from your email provider to warn you for changing your password.
A study has shown that almost 56% of people click on such links that are sent to them and fall prey of spear phishing email attack.
Don't be a scam victim
There is still a chance to revoke the action if you have already given access to the scammers to your account.
These fraudulent practices are taking place regularly these days so be very careful about any suspicious emails inviting you to view Google documents.
Act sensible and double-check with the sender of such an email to make sure that a document is real before you click on any of the links.
Make sure that you should not approve any requests under any circumstances to give a site extra permissions over your email, as the real Google Doc never ask for such kind of permissions.
The damage can be massive, so beware of such scams as it gives access to your most personal details and data.
Why Your Employer Seek Cisco Certified Professionals
Know Your Career Scope in Cybersecurity [Infographics]
How to Secure Your Company’s Hybrid Cloud Environment?
Why Does Your Industry Need A ECSA? [PPT]
Confronting The Major Security Risk Your Business May Face [PPT]
How to Find the Best Hybrid Cloud Talent for Your Company?
Profitable Skills You Can Earn with These 7 VMware Certifications 2018
Why Cloud-Strategy Stands First in Your IT Business Environment?
Why Should An Employer Hire A Certified Ethical Hacker? [PPT]
Top 9 Benefits of Office 365 for Your Business [PPT]
Mercury Solutions Ltd. is rated 4.6 stars by www.facebook.com/mercurysol based on 18 reviews.