<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">


The Anatomy of an Email Attack

Posted by Lauren Hanlon on May 15, 2017 8:30:00 AM

Now that you know ransomware attacks are on the rise we thought it would be useful to share some real world examples of just how sneaky these email threats can be. Below are three suprisingly common examples of how a cybercriminal can use your own email against you. Even Yahoo! wasn't safe from an email attack.

Cyber Security, Computer Security

• A CFO gets an email from the CEO authorizing an emergency fund transfer. But the email is actually from a cybercriminal

• An employee with administrative rights to key systems receives an urgent email from IT to update their network password. They actually disclose their password to cybercriminals.

• An employee receives an email to read an important attachment about their benefits provider. When they open the attachment, they unknowingly activate hidden Trojan malware.


Scared? We get it. Luckily, we have summarized everything you need to know and do to protect you and your data from email threats.


4 Ways to Stop Ransomware  New Call-to-action

 Related Articles:

How to Identify a Phishing Email

Another Day Another Breach. Uber, Fitbit, OKCupid



Topics: Cyber Security