Receive News Alerts, Special Info and other offers!
We Respect your Privacy. Your Information will not be shared.
Recently, Google customers fell prey of a scam that gave hackers the permission to access contents of online documents, contact lists, and emails of the victims.
The users were asked to click on a link to a Google Doc that seemed to come from someone they knew.
Google"s login and permissions page request the user to allow the fake Docs app to read, send, delete and manage the email and contacts of the user as soon as the user clicks on the link to open it.
This was a sophisticated scam which worked through Google"s system, unlike the common attacks.
Such phishing scams are run for extracting personal information like usernames, passwords, addresses and financial details from victims by leading them to a fake version of a real web page through an email.
DON"T FALL INTO THIS TRAP
The false practice of sending out emails which seem to be from a source that is well-known, such as a utility provider or a major bank is known as Phishing.
If you click on any such link, then it will take you to a fake site to steal the login details that you enter and can also install malware on your device.
Whereas, on the other hand, there is a more targeted version of the above which is called as Spear Phishing.
Through this, the emails will address you by your name and will appear to come from someone known to you in your organization, or it can also seem to have come from your email provider to warn you for changing your password.
A study has shown that almost 56% of people click on such links that are sent to them and fall prey of spear phishing email attack.
Don"t be a scam victim
There is still a chance to revoke the action if you have already given access to the scammers to your account.
These fraudulent practices are taking place regularly these days so be very careful about any suspicious emails inviting you to view Google documents.
Act sensible and double-check with the sender of such an email to make sure that a document is real before you click on any of the links.
Make sure that you should not approve any requests under any circumstances to give a site extra permissions over your email, as the real Google Doc never ask for such kind of permissions.
The damage can be massive, so beware of such scams as it gives access to your most personal details and data.
Top 40 Ethical Hacking Tools for your Business
13 Ways to Protect Cloud Applications in an Organization
How much do professionals earn across AWS and Azure certifications in 2022?
5 Reasons of opting for Azure-900 certification
What does a Project Manager do in 2022
So many information security courses, which one do I pursue first?
A decade of re:Invent for AWS Cloud Solutions Architects & Tech Enthusiasts
Is it worth getting CISM training?
How to become a CCISO?
Know About CISA Certification