Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Spam Can Be Tricky, So Keep an Eye Out for These Warning Signs

Spam Can Be Tricky, So Keep an Eye Out for These Warning Signs

Sometimes, I kind of miss the oh-too-obvious spam emails that were once the norm. You know, the kind that were supposedly from some usurped royal who needed your assistance to reclaim their rightful place on the throne, or from some absurdly attractive individual who seemed to be coming on to you. Sure, at the time it was annoying, but compared to today’s spam…

Well, it was a simpler time.

Unfortunately, the reason those old scams were common enough to become semi-fond memories is that, on occasion, they worked.

People fell for these kinds of scams all the time, sending money out with the expectation that huge sums would come flowing back. Hopeful singles would reach out in the hope that they’d stumbled across true love (and all the perks that implied).

Success is what makes spammers continue today. For them, it’s all a big numbers game: some percentage of users will fall for different types of spam campaigns, and scammers now know the tricks to improve their conversion rates. Spam is a formula: x-number of emails equals y percent of successful victims—they just need to solve for x.

If you’re going to protect your business from these attacks and scams, you need to know the kind of tactics to keep an eye out for.

Email Spoofing

Some unknown sender is one thing, but surely a dangerous email wouldn’t come from Amazon, PayPal, Google, your mother, the bank, your employer, or someone like that…would it?

Unfortunately, spam can now be spread that is designed to mimic what you’d expect to see from a trusted email address. Posing as a legitimate business has been part of the spam and phishing playbook for quite some time, as they are highly scalable and applicable to most people. Chances are pretty good that any given person will have an Amazon or Google account nowadays, after all.

Otherwise, these attacks can be far more targeted. Let’s say your bank had its member contact list stolen in a data breach. That list gives a scammer all they need to target your bank’s members with a convincing and effective scam, customized to them.

Social media is also a useful tool. A scammer could find a potential target, their contact information, the people in their life whom the target would be most likely to help, and their contact information. At that point, a little technical knowledge is all that a scammer needs to run extremely personalized campaigns.

Homograph and Punycode Attacks

“Tear.”

Now, what did you read that word as? Did you read “tear,” as in the act of ripping something, or “tear,” the thing that comes out of your eyes when you’re hurt or sad?

This is what is known as a homograph, the phenomenon where two different words are spelled the same but have different meanings. In terms of scams, homograph attacks are used to trick a user into trusting an email or website URL by making it look like a different one. Basically, non-traditional keyboard characters are translated to look like familiar ones, which makes it easier for an attacker to spoof a well-known domain or legitimate-looking email address without actually owning it.

Homograph and Punycode attacks aren’t exclusive to email, as we alluded to above. Fake websites that look legitimate can be built to steal information, and links can be shared through messaging apps and social media. Unfortunately, this means you effectively need to be on your guard when it comes to any activity or correspondence.

Email Compromise

An entire email inbox can be leveraged by a cybercriminal as a weapon—and it’s actually one of the oldest means used to distribute malware and spam, even to this day. If your password is stolen or too weak, or malware happens to sneak in, your email can be compromised and used to propagate the threat by sending emails out to your contact lists.

Since these emails come from your account, most recipients will see them to be legitimate and open them. Once they do, the process repeats, exponentially spreading.

If someone isn’t as focused on their cybersecurity hygiene as they should be, a hacker can have a very easy time accessing their email.

For instance, let’s say that Jason uses the same password on his work email and his Amazon Prime account. His kids use his password to access Amazon Video to watch The Boys and The Rings of Power, but one day, malware infects his son’s tablet and steals the password. As a result, Jason’s user credentials are up for sale on the Dark Web, along with the tens of thousands of other credentials this malware has stolen. On sale for pennies on the dollar, scammers and cybercriminals from all over are able to access and utilize it. It doesn’t take long for them to start trying these username and password combinations in other places, and before long, Jason’s work email is breached.

From there, an attacker can email contacts, of course, read messages, change any passwords to the accounts that tie to that email address, reset passwords, and more. Jason’s friends, family, coworkers, and clients are all scammed, expanding the attacker’s web of influence.

This goes the other way, too—your friends, family, and colleagues could cut corners with their cybersecurity, resulting in you being victimized as a result.

Skepticism and Awareness are Key to Preventing Cyberattacks and Scams

This should all go to show that scams and phishing attacks are increasingly difficult to spot, meaning that the most effective defense is an abundance of caution. We recommend what is called a zero-trust approach—if you didn’t specifically request an email attachment and did not expect one to accompany a message, don’t click on it or download it.

If your bank messages you regarding an unauthorized purchase, don’t panic. Instead, log into your bank account separately to check, not using any link received through the message.

Make sure you cultivate this kind of cautious culture in your business, too. If you send someone an email with an attachment, shoot them a quick phone call or instant message to let them know it’s on its way. Even internally, acting with security coming first in your correspondence is a wise policy.

Encourage your team to act safely concerning their email, and it will pay off—period.
Our technicians are here to help your team members, including with your email security. If a team member receives a suspicious email, we can check it out for you. Give us a call today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 28 June 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Computer Email Workplace Tips Phishing IT Services Hosted Solutions Collaboration Users Mobile Device Workplace Strategy Ransomware Small Business Quick Tips Cybersecurity Microsoft Communication Passwords Saving Money Data Backup Smartphone Backup Android Managed Service VoIP Business Management Smartphones Mobile Devices communications Upgrade Disaster Recovery Data Recovery Browser Social Media Microsoft Office Windows Managed IT Services Tech Term Current Events Network Productivity Remote Internet of Things Facebook Automation Artificial Intelligence Gadgets AI Cloud Computing Covid-19 Holiday Miscellaneous Remote Work Server Managed Service Provider Outsourced IT Information Compliance Encryption Spam Training Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Business Technology IT Support Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services Budget Voice over Internet Protocol Gmail Apple Networking App Employer-Employee Relationship BYOD Mobile Device Management Chrome Conferencing WiFi How To BDR HIPAA Computing Applications Information Technology Hacker Avoiding Downtime Access Control Office 365 Marketing Tip of the week Retail Storage Password Healthcare Bring Your Own Device Managed IT Services Big Data Operating System Router Computers Virtual Private Network Risk Management Health Website Help Desk Office Tips Analytics Augmented Reality Firewall Remote Workers Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Windows 7 Social Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime Customer Service Physical Security Display Printer Paperless Office Windows 11 Infrastructure Monitoring 2FA Excel Document Management Managed IT Service Maintenance Antivirus Sports Downloads Mouse Safety iPhone Licensing Vulnerabilities Entertainment Administration Data Privacy Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Printing Customer Relationship Management Wireless Content Filtering IT Management VPN Employees YouTube Meetings Integration Hacking Cryptocurrency Presentation User Tip Modem Computer Repair Mobile Security Processor Wireless Technology Virtual Desktop Holidays Data storage LiFi Data Storage Smart Technology Supply Chain Outlook Video Conferencing Machine Learning Managed Services Provider Word Money Saving Time Virtual Machines Professional Services Humor Hacks Server Management Regulations Compliance Public Speaking Scary Stories Private Cloud Identity Evernote Paperless Superfish Bookmark Lithium-ion battery Identity Theft Smart Tech Memes Fun Co-managed IT Twitter Alerts SQL Server Technology Care Entrepreneur Deep Learning Download Net Neutrality Financial Data Error History Business Communications Browsers Smartwatch Education Connectivity IT Social Engineering Break Fix Scams Upload Procurement Undo Remote Computing Azure Hybrid Work Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Search Dark Web Cables CES Tablet IoT Communitications Best Practice Trends Supply Chain Management Alert Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Legal Data Analysis IT solutions Star Wars IT Assessment Application Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Organization IBM Travel Social Networking Legislation Shortcuts Cortana Ransmoware Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Alt Codes Content Remote Working Wearable Technology Memory Vendors Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Typing Competition Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Knowledge Fraud Meta Google Drive User Error Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Point of Sale eCommerce User 5G Black Friday SSID Experience Virtual Assistant Outsource IT Google Docs Unified Communications Database Surveillance Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment Media Google Wallet Proxy Server Reviews IP Address Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Tactics Development Windows 8 Laptop Websites Mirgation Hypervisor Displays Drones Shopping Nanotechnology Optimization Recovery PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Addiction Hard Drives Management PCI DSS Domains Halloween Chatbots Navigation Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Refrigeration

Blog Archive