Recently, Google customers fell prey of a scam that gave hackers the permission to access contents of online documents, contact lists, and emails of the victims.
The users were asked to click on a link to a Google Doc that seemed to come from someone they knew.
Google"s login and permissions page request the user to allow the fake Docs app to read, send, delete and manage the email and contacts of the user as soon as the user clicks on the link to open it.
This was a sophisticated scam which worked through Google"s system, unlike the common attacks.
Such phishing scams are run for extracting personal information like usernames, passwords, addresses and financial details from victims by leading them to a fake version of a real web page through an email.
DON"T FALL INTO THIS TRAP
The false practice of sending out emails which seem to be from a source that is well-known, such as a utility provider or a major bank is known as Phishing.
If you click on any such link, then it will take you to a fake site to steal the login details that you enter and can also install malware on your device.
Whereas, on the other hand, there is a more targeted version of the above which is called as Spear Phishing.
Through this, the emails will address you by your name and will appear to come from someone known to you in your organization, or it can also seem to have come from your email provider to warn you for changing your password.
A study has shown that almost 56% of people click on such links that are sent to them and fall prey of spear phishing email attack.
Don"t be a scam victim
There is still a chance to revoke the action if you have already given access to the scammers to your account.
These fraudulent practices are taking place regularly these days so be very careful about any suspicious emails inviting you to view Google documents.
Act sensible and double-check with the sender of such an email to make sure that a document is real before you click on any of the links.
Make sure that you should not approve any requests under any circumstances to give a site extra permissions over your email, as the real Google Doc never ask for such kind of permissions.
The damage can be massive, so beware of such scams as it gives access to your most personal details and data.
All About the CISA vs CISM Certification
What A PMP Job Interview! [10 Imp Areas of Project Management Interview Q&A]
15 Must-Know Cyber Security Interview Questions and Answers 2019
10 Interesting facts About Software Development Every Geek Must know!
Your All-in-One Guide to CISSP
[FREE EBOOK] Cyber Security Salary Guide: What Does Today’s Cyber Security Workforce Make?
10 Best Big Data Certification To Look For in 2019
9 Jobs You Can Get with an AWS Certification
17 Top IT Certifications In Demand Today 2019
17 Best Computer Programming Language to Learn in 2019