Rogue’s Gallery

In my previous post, we examined a particular example of a sextortion scam, showing several indications that it was not a threat to be taken seriously.  But that kind of analysis – point-by-point deconstruction – is relatively hard work, and perhaps not an exercise the reader would care to take when actually under fire.  Whether or not – while it can be fun to detect all the “tells” in the attacker’s attempted scam – we can use more general tools, which are both easier and lead to a quicker answer.  Let’s look at several of them: After the fact First, “Google.Is.Your.Friend™”, at least for our purposes here.

Read full news article on We Live Security

 


Date:

Categorie(s):

Tag(s):