<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Scam Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/scam/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/scam/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 06 Apr 2023 09:53:42 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Scam Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/scam/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>An Post Scam Email Gaeilge Edition</title>
		<link>https://www.l2cybersecurity.com/an-post-scam-email-gaeilge-edition/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 29 Mar 2023 11:11:48 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[An post]]></category>
		<category><![CDATA[An post scam email]]></category>
		<category><![CDATA[Email scam]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2704</guid>

					<description><![CDATA[<p>I know many people I talk to mention they have received An Post scam messages. These have increased dramatically in the last couple of years. Thank you Brexit! Over the weekend I received a new twist on it. An An Post scam email that was as Gaeilge (in Irish). The email itself ended up in&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/an-post-scam-email-gaeilge-edition/">An Post Scam Email Gaeilge Edition</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I know many people I talk to mention they have received <a href="https://www.anpost.com/" target="_blank" rel="noopener"><em>An Post</em></a> scam messages. These have increased dramatically in the last couple of years. Thank you Brexit! Over the weekend I received a new twist on it. An <em>An Post</em> scam email that was as Gaeilge (in Irish).</p>
<p><span id="more-2704"></span></p>
<p>The email itself ended up in my spam/junk folder. However, not everybody uses the same email platform that I do. Chances are, because it is in Irish, it might bypass such protective systems.</p>
<h3>What did the <em>An post</em> scam email look like?</h3>
<p>Here is the email that I received:</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-2706" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-1.jpg" alt="A scam email from An Post (the Irish postal service) that is written in Irish." width="684" height="663" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-1.jpg 684w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-1-300x291.jpg 300w" sizes="(max-width: 684px) 100vw, 684px" /></p>
<p>For those of you who haven&#8217;t got the cúpla focail, it translates as:</p>
<blockquote><p><strong>An error occurred in the delivery process</strong></p>
<p>Dear customer,<br />
You have a package that needs to be delivered, but it has been put on hold due to an incorrect delivery address.<br />
Edit your personal information and add a valid shipping address to complete the delivery process.</p>
<p>• Tracking number: DA053884562IE<br />
• Re-delivery fee: €1.99.<br />
• Date: 25/03/2023</p>
<p><span style="text-decoration: underline;"><strong><span style="color: #339966; text-decoration: underline;">Redelivery</span></strong></span></p>
<p><em>This is an automated message, please do not reply.</em></p>
<p>Attention : If you do not update your details and enter a valid shipping address within 3 days of receiving this message, we will return this package.<br />
The job.</p></blockquote>
<p>I had to laugh at the last line there &#8211; An post translates to &#8220;The job&#8221;. 🤣</p>
<h3>What happens if I made a mistake and clicked the button?</h3>
<p>You would be brought to a website, that looks remarkably like an <em>An Post</em> website. In keeping with the theme of the email, it will all be in Irish. On this page you would be asked to enter lots of personal data, including payment card information. I&#8217;ve translated the various input fields in <span style="color: #ff0000;"><strong>red</strong></span> in the image below:</p>
<p><img decoding="async" class="aligncenter size-large wp-image-2707" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-2-535x1024.jpg" alt="An post scam website, which is in Irish, looking for personal data and payment card information." width="535" height="1024" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-2-535x1024.jpg 535w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-2-157x300.jpg 157w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-2-768x1469.jpg 768w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-2-803x1536.jpg 803w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-2.jpg 806w" sizes="(max-width: 535px) 100vw, 535px" /></p>
<p>One interesting thing here is that the links at the bottom of the page are all genuine <em>An post</em> website links and will take you to the genuine site and social media channels.</p>
<h3>I can&#8217;t read Irish. Sure how would I know what I&#8217;m being asked for?</h3>
<p>You mightn&#8217;t be able to translate that website. Your browser probably can and so it can be easy to potentially fall victim, particularly where you are waiting for a package to be delivered.</p>
<h3>Is there anything that gives this away as a scam?</h3>
<p>If this was for a genuine shipment, with some missing address data, they should show you what address information they do have and allow you to correct it. So that is the main giveaway to me.</p>
<p>People like me (a security nerd) will examine the address bar of a website. I know some trainers tell people they need to examine this themselves. However, that&#8217;s terrible advice, as most normal people will never do that on a consistent basis. Not only that, how can I be completely sure that this address is not correct? &#8220;anpost&#8221; is mentioned a couple of times, as well as the .com portion. Website addresses are hard sometimes:</p>
<p><img decoding="async" class="aligncenter size-full wp-image-2708" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-21.jpg" alt="The address bar of the An post scam website. The main give away is that it says &quot;Not secure&quot;." width="736" height="66" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-21.jpg 736w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/An-Post-21-300x27.jpg 300w" sizes="(max-width: 736px) 100vw, 736px" /></p>
<p>Another big giveaway here is the &#8220;Not secure&#8221; warning. If you EVER come across that on a website, DO NOT enter any data on that website, no matter whether you think it&#8217;s a genuine site or not. Anything you type will not be transmitted in a secure manner.</p>
<p>HOWEVER, the scammers could easily set the website up so that the &#8220;Not secure&#8221; is not shown, so don&#8217;t be completely dependent on that as a way to avoid being scammed.</p>
<h3>Well what would you do so mister smarty pants?</h3>
<p>If I had something on order, I would refer back to the original shipping email and click the tracking link from that.</p>
<p>If that wasn&#8217;t available, then I would copy the tracking number from the <em>An post</em> scam email, go to the <a href="https://www.anpost.com/" target="_blank" rel="noopener"><em>An post</em> website</a> and paste it into the tracking facility. It should spit out a message saying that the package can&#8217;t be found.</p>
<p>Let’s be careful out there.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/an-post-scam-email-gaeilge-edition/">An Post Scam Email Gaeilge Edition</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ESB text message scam.</title>
		<link>https://www.l2cybersecurity.com/esb-text-message-scam/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 10 Mar 2023 13:31:57 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[ESB Text Message Scam]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[SMS Scam]]></category>
		<category><![CDATA[Text Message Scam]]></category>
		<category><![CDATA[Text Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2680</guid>

					<description><![CDATA[<p>My good friend Philipa Jane Farley shared a text message with me, which she received this morning. Her phone had classed it as Spam, but not all smartphones are created equal, so this ESB text message scam might get through. The ESB text message The message appears to have come from &#8220;ESB&#8221; and it cannot&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/esb-text-message-scam/">ESB text message scam.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>My good friend <a href="https://www.linkedin.com/in/philipafarley/" target="_blank" rel="noopener">Philipa Jane Farley</a> shared a text message with me, which she received this morning. Her phone had classed it as Spam, but not all smartphones are created equal, so this ESB text message scam might get through.<span id="more-2680"></span></p>
<h2>The ESB text message</h2>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-2682 alignleft" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-0-229x300.jpeg" alt="" width="229" height="300" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-0-229x300.jpeg 229w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-0-781x1024.jpeg 781w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-0-768x1007.jpeg 768w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-0.jpeg 1042w" sizes="auto, (max-width: 229px) 100vw, 229px" />The message appears to have come from &#8220;ESB&#8221; and it cannot be replied to, which gives it a certain degree of legitimacy. If you have taken my training you will know that you simply cannot trust what number is calling you or texting you, as <a href="https://en.wikipedia.org/wiki/SMS_spoofing" target="_blank" rel="noopener">spoofing</a> is so common.</p>
<p>The message says:</p>
<blockquote><p>You are eligible for a discounted electricity bill under the Energy support scheme.</p>
<p>You can apply here: https[:]//register-electric-refund[.]com</p></blockquote>
<p>I have &#8220;defanged&#8221; that link so you cannot go to the site accidentally.</p>
<p>If you go ahead and click the link, you will be taken to the following web site:</p>
<h2>The &#8220;Government&#8221; information page</h2>
<p><img loading="lazy" decoding="async" class="size-large wp-image-2683 aligncenter" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-1-735x1024.jpg" alt="" width="735" height="1024" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-1-735x1024.jpg 735w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-1-215x300.jpg 215w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-1-768x1071.jpg 768w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-1.jpg 1094w" sizes="auto, (max-width: 735px) 100vw, 735px" /></p>
<p>That looks remarkably like the <strong>ACTUAL</strong> Irish Government Website which is here:</p>
<p><a href="https://www.gov.ie/en/publication/4ae14-electricity-costs-emergency-benefit-scheme/" target="_blank" rel="noopener">https://www.gov.ie/en/publication/4ae14-electricity-costs-emergency-benefit-scheme/</a></p>
<p>That is, all except for the &#8220;Verify now&#8221; button at the bottom. The criminals have effectively cloned the majority of the government&#8217;s page on this scheme. None of the links work on the page that I tested &#8230; EXCEPT for that &#8220;Verify Now&#8221; button. 🤔</p>
<h2>The &#8220;Registration&#8221; pages</h2>
<p>Well, if you click that, the &#8220;government&#8221; now seems to want you to register for the scheme (which is automatically dealt with by the power supply companies), so you are first asked for some personal details:<img loading="lazy" decoding="async" class="size-full wp-image-2684 aligncenter" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-4.jpg" alt="" width="647" height="787" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-4.jpg 647w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-4-247x300.jpg 247w" sizes="auto, (max-width: 647px) 100vw, 647px" /></p>
<p>When you hit &#8220;Continue, you will then be asked to provide some billing details.</p>
<p>Billing details?!??!!? I thought they were giving us money, not billing us?</p>
<p>Well, they are probably hoping that you are used to divulging your payment card details onto website.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-2685 aligncenter" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-6.jpg" alt="" width="644" height="701" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-6.jpg 644w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/Electric-Refund-scam-6-276x300.jpg 276w" sizes="auto, (max-width: 644px) 100vw, 644px" /></p>
<p>They do validation on the card number and the page crashed on me as I was attempting to enter a potentially valid number, so I wasn&#8217;t able to find out what happened next, but presumably they will start buying stuff on your account!</p>
<p>So there it is &#8230; an ESB text message scam, that could just as easily be for any of the other providers, but it&#8217;s likely only going to be the ESB as they have the most customers in the country.</p>
<p>Let&#8217;s be careful out there.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/esb-text-message-scam/">ESB text message scam.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>eFlow text message scam.</title>
		<link>https://www.l2cybersecurity.com/eflow-text-message-scam/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Jan 2023 14:54:29 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[eFlow Text Message Scam]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[SMS Scam]]></category>
		<category><![CDATA[Text Message Scam]]></category>
		<category><![CDATA[Text Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2695</guid>

					<description><![CDATA[<p>My good friend Philipa Jane Farley shared a text message with me, which she received this morning. This eFlow text message scam might get through to your phone, so read on for more information. The eFlow Text Message The text message she received from &#8220;eFlow&#8221; was about an unpaid toll. eFlow is an Irish motorway toll&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/eflow-text-message-scam/">eFlow text message scam.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>My good friend <a href="https://www.linkedin.com/in/philipafarley/" target="_blank" rel="noopener">Philipa Jane Farley</a> shared a text message with me, which she received this morning. This eFlow text message scam might get through to your phone, so read on for more information.<span id="more-2695"></span></p>
<h3>The eFlow Text Message</h3>
<p>The text message she received from &#8220;eFlow&#8221; was about an unpaid toll. <a href="https://www.eflow.ie/" target="_blank" rel="noopener">eFlow</a> is an Irish motorway toll operator. (narrator&#8217;s voice: It was not from eFlow 🙄).</p>
<p>The message reads:</p>
<blockquote><p>eFlow: You have an outstanding fee of 6.32 EUR due from a journey made in 2022. Please pay now to avoid incurring any penalty charges via <span style="text-decoration: underline;">eflow-online-services[.]com</span></p></blockquote>
<p>That link has been defanged, so you cannot click on it accidentally.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-2696 aligncenter" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-1.jpg" alt="Scam eFlow text message with malicious link" width="774" height="448" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-1.jpg 774w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-1-300x174.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-1-768x445.jpg 768w" sizes="auto, (max-width: 774px) 100vw, 774px" /><br />
If you click on the link, you will get taken to a very realistic and similar looking website, to the real eFlow one. This though, seems to have nothing to do with the unpaid toll. 🤔</p>
<h3><img loading="lazy" decoding="async" class="size-large wp-image-2697 aligncenter" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-2-646x1024.jpg" alt="eFlow scam website looking for you to change details." width="646" height="1024" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-2-646x1024.jpg 646w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-2-189x300.jpg 189w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-2-768x1217.jpg 768w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-2-969x1536.jpg 969w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-2.jpg 1292w" sizes="auto, (max-width: 646px) 100vw, 646px" />What do they want you to do?</h3>
<p>They want you to update your details with them, including payment card. This is the type of thing that you can look out for. A site asking you for lots of personal data when you&#8217;ve clicked a link. eFlow already has your data, if you are a customer. They do not need you to go and type it all in again. No matter what excuse they make up. If this was really eFlow, they would have provided the details they already held on you!</p>
<p><img loading="lazy" decoding="async" class="size-large wp-image-2698 aligncenter" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-3-647x1024.jpg" alt="eFlow scam website asking you to enter lots of personal details on the site." width="647" height="1024" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-3-647x1024.jpg 647w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-3-189x300.jpg 189w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-3-768x1216.jpg 768w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-3-970x1536.jpg 970w, https://www.l2cybersecurity.com/wp-content/uploads/2023/03/eFlow-3.jpg 1293w" sizes="auto, (max-width: 647px) 100vw, 647px" /></p>
<h3>What should I do?</h3>
<p>I hope I say this enough. We really need to stop clicking on any link that might be included in text messages. There is just no decent reason to have links sent by text message. The criminals use them, because they tend to get passed a lot of spam filters. If this was sent by email or WhatsApp it would probably get thrown into the junk folder.</p>
<p>I think most of you that have seen previous posts from me, won&#8217;t fall victim to such a scam, but please do share this, so others will be aware of it.</p>
<p>If anybody has gone through with this update, please contact your bank&#8217;s fraud number immediately.</p>
<p>So there it is. An eFlow text message scam. Please don&#8217;t fall for it.</p>
<p>Let’s be careful out there.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/eflow-text-message-scam/">eFlow text message scam.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bank account has changed &#8211; Scam alert!</title>
		<link>https://www.l2cybersecurity.com/bank-account-has-changed-scam-alert/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 06 May 2022 09:18:10 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[Bank account has changed]]></category>
		<category><![CDATA[Bank account scam]]></category>
		<category><![CDATA[Payment details scam]]></category>
		<category><![CDATA[Payment redirect fraud]]></category>
		<category><![CDATA[Salary fraud]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Wages fraud]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2716</guid>

					<description><![CDATA[<p>If you hear or read the words &#8220;My bank account has changed.&#8221; you need to be on your guard. This is a massive red flag and is a fairly good indication that somebody is about to try to scam you. What&#8217;s so dodgy about &#8220;My bank account has changed&#8221;? You see Irish people don&#8217;t change&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/bank-account-has-changed-scam-alert/">Bank account has changed &#8211; Scam alert!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you hear or read the words &#8220;My bank account has changed.&#8221; you need to be on your guard. This is a massive red flag and is a fairly good indication that somebody is about to try to scam you.<span id="more-2716"></span></p>
<h3>What&#8217;s so dodgy about &#8220;My bank account has changed&#8221;?</h3>
<p>You see Irish people don&#8217;t change bank accounts at all. If it does occur, it is a rare event, which is why there is a greater chance that it&#8217;s a scam.</p>
<p>Do you remember when Ulster Bank had massive IT failures <a href="https://www.irishtimes.com/business/financial-services/ulster-bank-counts-the-cost-of-catastrophic-it-meltdown-1.530340" target="_blank" rel="noopener">in 2012</a> and <a href="https://www.irishexaminer.com/business/arid-20337660.html" target="_blank" rel="noopener">2015</a>? People were unable to receive wages/salaries, pay bills, mortgages, etc. FOR WEEKS! Yet, when the dust had eventually settled, only a tiny percentage of people switched bank accounts away from them.</p>
<p>So even after a bank has performed terribly at customer service, people still are reluctant to change from them. So it is a very rare event here. Apparently it is quite frequent in Europe, but their banks are likely more focussed on customers than our lot.</p>
<p>So if somebody, who appears to be a client or supplier, contacts your business and says that they have changed bank account, then you need to be on alert and go through some steps to verify the new account (below).</p>
<p>By the way, this can also happen with salaries and wages. A scammer might impersonate an employee and give new bank account details to the payroll people.</p>
<h3>Wait a minute, aren&#8217;t there some bank closures happening?</h3>
<p>Indeed yes. For the next six months or so, there is going to be a MASSIVE number of bank accounts being changed in this country, with over 1 million accounts affected by the Ulster Bank and KBC bank closures. So there are a lot of legitimate accounts being changed.</p>
<p>This doesn&#8217;t mean you should drop your guard. You need to vigilant. My normal advice still stands on this. It is more important now though, as you can be sure that the criminals are going to take advantage of the confusion caused by this huge volume of change.</p>
<h3>How do I protect myself from being scammed?</h3>
<p>So, if someone contacts you and says the magic words &#8220;Our bank account has changed.&#8221;, do the following:</p>
<ul>
<li>Get them to send you a scan of the top part of bank statement with bank address, account name, customer address and IBAN.</li>
<li>Make an outgoing phone call to the finance or admin person at that company, using a trusted telephone number (perhaps from their website).</li>
<li>Ask them to tell you their IBAN &#8211; don&#8217;t provide it to them.</li>
<li>Only then change your payment system.</li>
</ul>
<p>Let’s be careful out there.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/bank-account-has-changed-scam-alert/">Bank account has changed &#8211; Scam alert!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>#WeekendWisdom 080 Romance Scams</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-080-romance-scams/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 28 May 2021 01:15:16 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Dating Apps]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Romance]]></category>
		<category><![CDATA[Romance Fraud]]></category>
		<category><![CDATA[Romance Scams]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2531</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 80. This week we&#8217;re going to talk about Romance Scams. How do Romance Scams start? Romance scams usually will start on online dating platforms or it could be social media or other kind of messaging sites, where a stranger will connect with their victim. They&#8217;ll establish a kind of a relationship&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-080-romance-scams/">#WeekendWisdom 080 Romance Scams</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 80. This week we&#8217;re going to talk about Romance Scams.<span id="more-2531"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2531-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-080-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-080-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-080-lo.mp4</a></video></div>
<h3>How do Romance Scams start?</h3>
<p>Romance scams usually will start on online dating platforms or it could be social media or other kind of messaging sites, where a stranger will connect with their victim. They&#8217;ll establish a kind of a relationship with that person. Usually fairly quickly they will try to move off those online platforms and move over to communicating solely through email.</p>
<h3>What do they do then?</h3>
<p>They will spend a lot of time developing a relationship with their victim, including getting romantic and telling them they love them and such like. The reason they spend so much time at this is because they make a lot of money from it.</p>
<h3>How would you know it is a scam?</h3>
<p>The way you know it&#8217;s going to be a romance scam is they try to get you to wire them money for various reasons:</p>
<ul>
<li>They may be trying to plan a trip to come and visit you.</li>
<li>They might have got mugged and they suddenly need some money.</li>
<li>Over a period time they might have a &#8220;sick relative&#8221; that needs medical attention and they need money.</li>
</ul>
<p>But they always want you to wire them money.</p>
<h3>Bottom line:</h3>
<p>So the thing here is folks &#8230; if somebody you have <span style="color: #ff0000;"><em><span style="text-decoration: underline;"><strong>never met</strong></span></em></span> wants you to <span style="color: #ff0000;"><em><span style="text-decoration: underline;"><strong>wire</strong></span></em></span> them money, don&#8217;t do it, it is a <span style="text-decoration: underline; color: #ff0000;"><strong>scam</strong></span>. Trust me on this. It is absolutely always a scam.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-080-romance-scams/">#WeekendWisdom 080 Romance Scams</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-080-lo.mp4" length="29619774" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 072 Remote Control Scammers</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-072-remote-control-scammers/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 02 Apr 2021 01:15:32 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Remote Control]]></category>
		<category><![CDATA[Remote Control Scam]]></category>
		<category><![CDATA[Remote Control Scammers]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Scammers]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2487</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 72. This week we&#8217;re going to talk about Remote Control Scammers. Where is this coming from? Last weekend I was reading online some stories about people being scammed and also looking at some YouTube clips showing how some of these scams can operate. They had a very common theme with something&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-072-remote-control-scammers/">#WeekendWisdom 072 Remote Control Scammers</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 72. This week we&#8217;re going to talk about Remote Control Scammers.<span id="more-2487"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2487-2" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-072-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-072-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-072-lo.mp4</a></video></div>
<h3>Where is this coming from?</h3>
<p>Last weekend I was reading online some stories about people being scammed and also looking at some YouTube clips showing how some of these scams can operate. They had a very common theme with something that happened to a friend of mine on Monday who was very lucky and very nearly got scammed by a similar tactic.</p>
<h3>What happened to my friend</h3>
<p>My friend had been in contact with a company that apparently was doing some kind of investment opportunity and that there was an app available to be able to manage this investment. To set this thing up, the person from the company needed my friend to download a remote control application onto their phone, in order to assist with setting things up.</p>
<h3>This is what remote control scammers want</h3>
<p>Now this was the common theme with the other scams that I was reading about. People downloaded remote control software to their laptops or their phones.</p>
<p>Now no genuine, legitimate company is ever going to ask you to install remote control software to be able to set up an app. It just doesn&#8217;t happen. If somebody says to you &#8220;I want to install remote control software&#8221; end the conversation. Hang up. Don&#8217;t engage.</p>
<h3>Maybe your IT support people use remote control for support</h3>
<p>Now if you are in a corporate environment or maybe your company uses an outsourced IT managed service provider who gives you external support, they already might have remote control software on your machine. They won&#8217;t need to install it.</p>
<p>If anybody ever asks you to install remote control software, end the call. Do not engage. Do not install that software.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-072-remote-control-scammers/">#WeekendWisdom 072 Remote Control Scammers</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-072-lo.mp4" length="33911963" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 054 Online Shopping Scam</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-054-online-shopping-scam/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 13 Nov 2020 02:15:39 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cloned Website]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Delivery]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Online Shopping]]></category>
		<category><![CDATA[Online Shopping Scam]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Too Good To Be True]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2369</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 54. This week we&#8217;re going to talk about an online shopping scam. Why is this an issue now? I was speaking with my post man the other day and he was telling me that they are gone really, really busy with delivering packages and parcels to people all along their route.&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-054-online-shopping-scam/">#WeekendWisdom 054 Online Shopping Scam</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 54. This week we&#8217;re going to talk about an online shopping scam.<span id="more-2369"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2369-3" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-054-lo.mp4?_=3" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-054-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-054-lo.mp4</a></video></div>
<h3>Why is this an issue now?</h3>
<p>I was speaking with my post man the other day and he was telling me that they are gone really, really busy with delivering packages and parcels to people all along their route. So obviously the Christmas shopping season is in full swing and with us being in lockdown, people are ordering online much more.</p>
<h3>What is this Online Shopping Scam?</h3>
<p>But I became aware of a new online shopping scam there late last week. What happened was that the person was on Facebook. They saw an advertisement for a product that is associated with their hobby and the price was really really good. So they clicked on the link. They were brought to a website of a well-known retailer and the price was there. The product was there. They placed an order and sometime later they got delivered something like a magazine. Something that had no real value and wasn&#8217;t the product they ordered.</p>
<p>So they disputed the transaction but because the fraudsters had actually gone ahead and delivered something, the bank was reluctant to reject the transaction because there had been something delivered. So it was difficult to resolve that issue for that person.</p>
<h3>How did they manage that?</h3>
<p>What had happened was the fraudsters had set up a clone of the genuine retailer&#8217;s website, which is something that&#8217;s really simple to do. They looked exactly the same, just those prices were ridiculously low.</p>
<h3>How can I not fall for that?</h3>
<p>So the tip here folks is that if you see something online that the price is just too good to be true, it probably is. So don&#8217;t fall for it. Don&#8217;t go and purchase anything like that.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-054-online-shopping-scam/">#WeekendWisdom 054 Online Shopping Scam</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-054-lo.mp4" length="29590803" type="video/mp4" />

			</item>
		<item>
		<title>Not GDPR Compliant &#8211; Really?</title>
		<link>https://www.l2cybersecurity.com/not-gdpr-compliant-really/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 18 Jan 2019 15:36:10 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1573</guid>

					<description><![CDATA[<p>A colleague at another company forwarded me an email he&#8217;d received knowing that I&#8217;d get a kick out of it. It claimed to be from the UK GDPR Compliance Directory and that his company was not GDPR compliant. Of course no such directory exists and this was nothing but a ruse. In fairness it does&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/not-gdpr-compliant-really/">Not GDPR Compliant &#8211; Really?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1574" src="https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Not-GDPR-Compliant-150x150.jpg" alt="Not GDPR compliant" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Not-GDPR-Compliant-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Not-GDPR-Compliant.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />A colleague at another company forwarded me an email he&#8217;d received knowing that I&#8217;d get a kick out of it. It claimed to be from the UK GDPR Compliance Directory and that his company was not GDPR compliant. Of course no such directory exists and this was nothing but a ruse. <span id="more-1573"></span>In fairness it does look like a professional email. There&#8217;s no spelling mistakes or poor grammar. There&#8217;s no sense of urgency included (e.g.- &#8220;You must fix this by tomorrow or else puppies will be harmed.&#8221;). The only link would create an email with the subject line of &#8220;please send me the GDPR non compliance report&#8221; to a &#8220;@europe.com&#8221; email address. So there is a whiff of legitimacy to this e-mail.</p>
<p>So here it is. I&#8217;ve removed the identifying bits from my colleague&#8217;s company, but it was his domain name where shown.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1575" src="https://www.l2cybersecurity.com/wp-content/uploads/2019/01/GDPR-compliance.jpg" alt="Not GDPR compliant email" width="826" height="668" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2019/01/GDPR-compliance.jpg 826w, https://www.l2cybersecurity.com/wp-content/uploads/2019/01/GDPR-compliance-300x243.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2019/01/GDPR-compliance-768x621.jpg 768w" sizes="auto, (max-width: 826px) 100vw, 826px" /></p>
<p>The only <span style="color: #ff0000;">red flag</span> in this email was the From address. That was a peculiar looking domain name.</p>
<p>While there was no sense of urgency in the email, obviously the thought of your business having a negative listing isn&#8217;t good. Also this service is apparently &#8220;a <strong>FREE</strong> public service&#8221;, so surely it won&#8217;t cost anything to be able to make the listing positive. Right?</p>
<p>I&#8217;m sure if you clicked that link and sent an email looking for the report, an offer would be made to help you get a positive listing &#8230; for a small fee of a few hundred or thousand pounds (this is a UK site after all).</p>
<p>Even without the red flag on the from address, this whole email stank to me. It was simply trying to use a ruse to shame the domain owner into getting in contact to supposedly make their company GDPR compliant. As always treat any <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/" target="_blank" rel="noopener">unsolicited email with the contempt</a> it deserves.</p>
<p>If you received anything like this, you can always get in touch with us at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a> and we will be happy to clarify for free. If you&#8217;d prefer an official response, you could contact the Data Protection Commission at <a href="https://www.dataprotection.ie/en/contact/how-contact-us" target="_blank" rel="noopener">https://www.dataprotection.ie/en/contact/how-contact-us</a></p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified</p>
<p>#GDPR #SimpleGDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/not-gdpr-compliant-really/">Not GDPR Compliant &#8211; Really?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hoax Bomb Extortion Emails Are Latest Scam</title>
		<link>https://www.l2cybersecurity.com/hoax-bomb-extortion-emails/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 14 Dec 2018 15:36:32 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Extortion]]></category>
		<category><![CDATA[Hoax Bomb]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Sextortion]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1500</guid>

					<description><![CDATA[<p>In the last couple of days there are reports of hoax bomb threats being sent by e-mail. They&#8217;ve been particularly prevalent in the USA, but there is nothing to stop them spreading. They&#8217;ve targeted schools, government facilities and some businesses.The e-mail claims that there is a bomb planted on the premises. This &#8220;bomb&#8221; will detonate&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/hoax-bomb-extortion-emails/">Hoax Bomb Extortion Emails Are Latest Scam</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1501" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/hoax-bomb-150x150.jpg" alt="hoax bomb" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/hoax-bomb-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/12/hoax-bomb.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />In the last couple of days there are <a href="https://isc.sans.edu/forums/diary/Bombstortion+Boomstortion/24414/" target="_blank" rel="noopener">reports of hoax bomb threats</a> being sent by e-mail. They&#8217;ve been particularly prevalent in the USA, but there is nothing to stop them spreading. They&#8217;ve targeted schools, government facilities and some businesses.<span id="more-1500"></span>The e-mail claims that there is a bomb planted on the premises. This &#8220;bomb&#8221; will detonate at the end of the day if a ransom is not paid. The premises is said to be under surveillance and if an evacuation or arrival of the authorities occurs, the bomb will be detonated.</p>
<h3>Hoax bomb e-mail</h3>
<blockquote><p>Subject: Think twice<br />
There is the bomb (tronitrotoluene) in the building where your business is located. My recruited person constructed an explosive device under my direction. It has small dimensions and it is hidden very well, it is impossible to damage the supporting building structure by my bomb, but there will be many wounded people if it detonates.<br />
My man is controlling the situation around the building. If any unnatural behavior, panic or emergency is noticed he will power the device.<br />
I want to suggest you a deal. You send me $20&#8217;000 in Bitcoin and the bomb will not detonate, but do not try to fool me -I warrant you that I have to call off my man solely after 3 confirmations in blockchain network.<br />
My payment details (Bitcoin address)- XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX <span style="color: #ff0000;"><em><strong>&lt;redacted&gt;</strong></em></span><br />
You must pay me by the end of the workday. If the working day is over and people start leaving the building explosive will explode.<br />
This is just a business, if I do not see the money and the bomb detonates, next time other commercial enterprises will send me a lot more, because this is not a single incident.<br />
I wont enter this email. I check my Bitcoin wallet every 40 min and after seeing the payment I will order my mercenary to leave your district.<br />
If an explosion occurred and the authorities see this letter:<br />
We arent a terrorist society and do not assume responsibility for explosions in other places.</p></blockquote>
<p>Needless to say it is a hoax bomb threat. It is similar to <a href="https://www.l2cybersecurity.com/a-sextortion-scam/" target="_blank" rel="noopener">the sextortion scam</a> that I warned about last July.</p>
<p>I love the last line. &#8220;We arent (sic) a terrorist society &#8230;&#8221; I think the evil doers are a little bit scared that the anti-terror units will come after them. They should be scared &#8230; but of all law enforcement. They will come down hard on these guys. In fact the US Computer Emergency Readiness Team (US-CERT) <a href="https://www.us-cert.gov/ncas/current-activity/2018/12/13/Bomb-Threats-Emailed-Around-World" target="_blank" rel="noopener">have advised people to</a>:</p>
<ul>
<li>Do not respond or try to contact the sender.</li>
<li>Do not pay the ransom.</li>
<li>Report the email to the Federal Bureau of Investigation (FBI)</li>
</ul>
<p>The concern about the volume of these types of threats though, is that they will tie up first responder resources while the hoax bomb is being investigated.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/hoax-bomb-extortion-emails/">Hoax Bomb Extortion Emails Are Latest Scam</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sextortion Scam Volume 3</title>
		<link>https://www.l2cybersecurity.com/sextortion-scam-volume-3/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 10 Dec 2018 12:37:05 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Sextortion]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1506</guid>

					<description><![CDATA[<p>Remember the original Sextortion scam back in July? The one where they used an old password to make it look like the e-mail was plausible. This then evolved in August to add the use of partial mobile numbers. Well, it&#8217;s BAAAACKK!!!  And this time it is really, really nasty. So it&#8217;s similar in nature to the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sextortion-scam-volume-3/">Sextortion Scam Volume 3</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1507" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Sextortion-150x150.jpg" alt="sextortion scam updated" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Sextortion-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Sextortion.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Remember the original Sextortion scam back in July? The one where they <a href="https://www.l2cybersecurity.com/a-sextortion-scam/" target="_blank" rel="noopener">used an old password</a> to make it look like the e-mail was plausible. This then <a href="https://www.l2cybersecurity.com/sextortion-scam-a-follow-up/" target="_blank" rel="noopener">evolved in August</a> to add the use of partial mobile numbers. Well, it&#8217;s BAAAACKK!!! <span id="more-1506"></span> And this time it is <a href="https://www.proofpoint.com/us/threat-insight/post/sextortion-side-ransomware" target="_blank" rel="noopener">really, really nasty</a>.</p>
<p>So it&#8217;s similar in nature to the earlier sextortion scam where it shows an old password. However this one includes a link to a &#8220;video presentation&#8221; as proof that they have a video recording of you up to fun and games while watching pornography. The recording also includes a view of the alleged pornography that you were watching. If you click on the link, it will lead to Ransomware becoming installed on your computer. This will then scramble all of your files and demand $500 ransom to unscramble them. Here is an example of the dodgy e-mail:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1503" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/ssf1.png" alt="sextortion ransomware email" width="549" height="619" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/ssf1.png 549w, https://www.l2cybersecurity.com/wp-content/uploads/2018/12/ssf1-266x300.png 266w" sizes="auto, (max-width: 549px) 100vw, 549px" /></p>
<p>The evil doers are using multiple social engineering techniques to fool nervous and vulnerable people. This step of providing &#8220;proof&#8221; of the existence of the video evidence is really sneaky. Please don&#8217;t fall for it. Let everyone you know, hear about this. You can point them at some detailed advice in our <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/" target="_blank" rel="noopener">Fifth Commandment</a> which is part of the wildly popular <a href="http://www.l2cybersecurity.com/the-ten-commandments/" target="_blank" rel="noopener">Ten Commandments of Cyber Security</a>.</p>
<p>If you want to find out how our simple, yet comprehensive Security Awareness training can help you spot these scams and avoid falling for them, then please send an e-mail to <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a> or call 087-436-2675 and we can let you know.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/sextortion-scam-volume-3/">Sextortion Scam Volume 3</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
