![]() ![]() But if you don’t personally manage email accounts for your business, this pattern may look innocent enough to you, and that’s what crooks are counting on – that you would trust the email and open the attachment.īut beware! Here is a little trick that may help you: check the headers of the email. Being in charge of our email addresses I know for a fact we don’t have an “administrator” account – and to me, it looks suspicious when I receive an email from a non-existent email address. So if my email address is “ ” – I may receive an email that looks as if was sent directly to “ ” from “ ”. ![]() In this example, an email came to an email address from an “administrator” of that domain. Check your email header properties to spot fraudulent addresses When you are a small business owner, payroll may be on your mind, and if you go through your busy hectic day, you just may open an email to see what is it about. Here is an example of an email that masquerades as a Payroll report the attached file, titled Payroll.xls, contains a variant of Win32/Kryptik.BOHR trojan. You have to take special care opening attachments, even if they look innocent enough. Infection through email may happen when you open an attachment containing the trojan. Infecting your computer via Email Trojan An example of an email containing a Trojan file hidden in an Excel document. CryptoLocker, detected by Sophos as Troj/Ransom-ACP, a malicious program known as ransomware, is making rounds hitting computers via email attachments or via botnets. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |