In my previous post, we examined a particular example of a sextortion scam, showing several indications that it was not a threat to be taken seriously. But that kind of analysis – point-by-point deconstruction – is relatively hard work, and perhaps not an exercise the reader would care to take when actually under fire. Whether or not – while it can be fun to detect all the “tells” in the attacker’s attempted scam – we can use more general tools, which are both easier and lead to a quicker answer. Let’s look at several of them: After the fact First, “Google.Is.Your.Friend™”, at least for our purposes here.
Read full news article on We Live Security