SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
Dear Customer,
You are receiving this email because of a newly found internet threat. As our antivirus customer, we notify you with when a
new threat arises. We tell you how to identify the threat, and the proper precautions to avoid it. Details of the current threat
are outlined below:
This is a threat that is received through email message.
This threat is sent via email, disguised as a trusted source, such as your insurance company or banking service. Contained
within the email is a link to an alleged legitimate file (such as bank documents or payment reports), that instead initiates a
download onto the machine. This download contains Malware.
What the threat might look like:
How to identify the threat:
1. The email requests you to access or download a file or report.
2. The sender claims to be a legitimate source, but the email is unexpected.
3. The email links via shortened URL (such as goog.le or bit.ly) to an external site, such as Dropbox.
How to avoid the threat:
1. Do not download any files sent via email, or click or any links that take outside of your email
service.
2. Be precautious of emails. If you receive an email from a bank service or payroll service, was it
expected? If you have any doubt whatsoever, do not click the link or download.
3. Learn to recognize their appearance, they generally look very similar.
4. Move the suspicious emails into your SPAM folder.
If you follow the above procedures, you will greatly increase your safety from this threat. Your eSet Antivirus will
help you stay safe from this threat, but blocking it involves a preventative effort

Weitere ähnliche Inhalte

Was ist angesagt?

Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computingMukul Kumar
 
Understanding SaaS Concepts
Understanding SaaS ConceptsUnderstanding SaaS Concepts
Understanding SaaS Conceptsguest0e7119
 
Don't Let Phishing Emails Hook Your Empolyees
Don't Let Phishing Emails Hook Your EmpolyeesDon't Let Phishing Emails Hook Your Empolyees
Don't Let Phishing Emails Hook Your EmpolyeesSecurityMetrics
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethicsSyed Zeeshan Ali
 
Preventions of Email Hacking
Preventions of Email HackingPreventions of Email Hacking
Preventions of Email HackingUsman Khan
 
Viruses, Biometrics And Encryption
Viruses, Biometrics And EncryptionViruses, Biometrics And Encryption
Viruses, Biometrics And Encryptionsmithj12
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
"Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees...
"Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees..."Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees...
"Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees...David McHale
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Naga Rohit
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
How and Why to Make Email Everyone's Business
How and Why to Make Email Everyone's BusinessHow and Why to Make Email Everyone's Business
How and Why to Make Email Everyone's BusinessSendio
 

Was ist angesagt? (19)

Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Understanding SaaS Concepts
Understanding SaaS ConceptsUnderstanding SaaS Concepts
Understanding SaaS Concepts
 
Don't Let Phishing Emails Hook Your Empolyees
Don't Let Phishing Emails Hook Your EmpolyeesDon't Let Phishing Emails Hook Your Empolyees
Don't Let Phishing Emails Hook Your Empolyees
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethics
 
Preventions of Email Hacking
Preventions of Email HackingPreventions of Email Hacking
Preventions of Email Hacking
 
Email hacking
Email hackingEmail hacking
Email hacking
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Ass6
Ass6Ass6
Ass6
 
Viruses, Biometrics And Encryption
Viruses, Biometrics And EncryptionViruses, Biometrics And Encryption
Viruses, Biometrics And Encryption
 
Security provisions
Security provisions Security provisions
Security provisions
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
"Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees...
"Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees..."Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees...
"Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees...
 
Cybersecurity tips
Cybersecurity tipsCybersecurity tips
Cybersecurity tips
 
Wanna cry ransomware cyber security awareness
Wanna cry ransomware cyber security awarenessWanna cry ransomware cyber security awareness
Wanna cry ransomware cyber security awareness
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
How and Why to Make Email Everyone's Business
How and Why to Make Email Everyone's BusinessHow and Why to Make Email Everyone's Business
How and Why to Make Email Everyone's Business
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 

Andere mochten auch

LDT100 how to make digital content quickly
LDT100 how to make digital content quicklyLDT100 how to make digital content quickly
LDT100 how to make digital content quicklyLiberteks
 
Artic Homeland Threats
Artic Homeland ThreatsArtic Homeland Threats
Artic Homeland ThreatsLiberteks
 
smAlbany july 17 2014 work life balance b4b innovation suny cnse suny it
smAlbany july 17 2014 work life balance b4b innovation suny cnse suny itsmAlbany july 17 2014 work life balance b4b innovation suny cnse suny it
smAlbany july 17 2014 work life balance b4b innovation suny cnse suny itLiberteks
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks
 
smAlbany july 17 2014 work life balance b4b innovation suny cnse suny it sch...
smAlbany july 17 2014 work life balance b4b innovation suny cnse  suny it sch...smAlbany july 17 2014 work life balance b4b innovation suny cnse  suny it sch...
smAlbany july 17 2014 work life balance b4b innovation suny cnse suny it sch...Liberteks
 
smAlbany July 17 2014 work life balance b4b innovation suny cnse suny it
smAlbany July 17 2014 work life balance b4b innovation suny cnse  suny itsmAlbany July 17 2014 work life balance b4b innovation suny cnse  suny it
smAlbany July 17 2014 work life balance b4b innovation suny cnse suny itLiberteks
 
PWC CIS Sharing Economy
PWC CIS Sharing EconomyPWC CIS Sharing Economy
PWC CIS Sharing EconomyLiberteks
 

Andere mochten auch (7)

LDT100 how to make digital content quickly
LDT100 how to make digital content quicklyLDT100 how to make digital content quickly
LDT100 how to make digital content quickly
 
Artic Homeland Threats
Artic Homeland ThreatsArtic Homeland Threats
Artic Homeland Threats
 
smAlbany july 17 2014 work life balance b4b innovation suny cnse suny it
smAlbany july 17 2014 work life balance b4b innovation suny cnse suny itsmAlbany july 17 2014 work life balance b4b innovation suny cnse suny it
smAlbany july 17 2014 work life balance b4b innovation suny cnse suny it
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT network
 
smAlbany july 17 2014 work life balance b4b innovation suny cnse suny it sch...
smAlbany july 17 2014 work life balance b4b innovation suny cnse  suny it sch...smAlbany july 17 2014 work life balance b4b innovation suny cnse  suny it sch...
smAlbany july 17 2014 work life balance b4b innovation suny cnse suny it sch...
 
smAlbany July 17 2014 work life balance b4b innovation suny cnse suny it
smAlbany July 17 2014 work life balance b4b innovation suny cnse  suny itsmAlbany July 17 2014 work life balance b4b innovation suny cnse  suny it
smAlbany July 17 2014 work life balance b4b innovation suny cnse suny it
 
PWC CIS Sharing Economy
PWC CIS Sharing EconomyPWC CIS Sharing Economy
PWC CIS Sharing Economy
 

Ähnlich wie Liberteks Security Advisory002

Security awareness
Security awarenessSecurity awareness
Security awarenessSanoop Nair
 
Phishing: Training Your Help Desk
Phishing: Training Your Help DeskPhishing: Training Your Help Desk
Phishing: Training Your Help DeskBeth Sallay
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...Liberteks
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Email security netwroking
Email security  netwrokingEmail security  netwroking
Email security netwrokingSalman Memon
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentationWan Solo
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptxAbdulHaseebKhan34
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
CISA Issues Emotet Warning!
CISA Issues Emotet Warning!CISA Issues Emotet Warning!
CISA Issues Emotet Warning!Nicole Payne
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxQuiMo3
 

Ähnlich wie Liberteks Security Advisory002 (20)

Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Safe Email Practices
Safe Email PracticesSafe Email Practices
Safe Email Practices
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Phishing: Training Your Help Desk
Phishing: Training Your Help DeskPhishing: Training Your Help Desk
Phishing: Training Your Help Desk
 
E‑mail
E‑mailE‑mail
E‑mail
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
How to Detect Email Fraud
How to Detect Email FraudHow to Detect Email Fraud
How to Detect Email Fraud
 
Email security netwroking
Email security  netwrokingEmail security  netwroking
Email security netwroking
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
internet security
internet securityinternet security
internet security
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
CISA Issues Emotet Warning!
CISA Issues Emotet Warning!CISA Issues Emotet Warning!
CISA Issues Emotet Warning!
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
 

Mehr von Liberteks

Testing SAP Solutions for Dummies
Testing SAP Solutions for DummiesTesting SAP Solutions for Dummies
Testing SAP Solutions for DummiesLiberteks
 
System Engineering for Dummies
System Engineering for DummiesSystem Engineering for Dummies
System Engineering for DummiesLiberteks
 
Sales and use tax compliance for dummies
Sales and use tax compliance for dummiesSales and use tax compliance for dummies
Sales and use tax compliance for dummiesLiberteks
 
QuestionPro for dummies
QuestionPro for dummiesQuestionPro for dummies
QuestionPro for dummiesLiberteks
 
IT Policy Compliance for Dummies
IT Policy Compliance for DummiesIT Policy Compliance for Dummies
IT Policy Compliance for DummiesLiberteks
 
Point -of-Sale Security for Dummies
Point -of-Sale Security for DummiesPoint -of-Sale Security for Dummies
Point -of-Sale Security for DummiesLiberteks
 
Midmarket Collaboration for Dummies
Midmarket Collaboration for DummiesMidmarket Collaboration for Dummies
Midmarket Collaboration for DummiesLiberteks
 
Email Signatures for Dummies
Email Signatures for DummiesEmail Signatures for Dummies
Email Signatures for DummiesLiberteks
 
Custom Publishing for Dummies
Custom Publishing for DummiesCustom Publishing for Dummies
Custom Publishing for DummiesLiberteks
 
Cloud Service for Dummies
Cloud Service for DummiesCloud Service for Dummies
Cloud Service for DummiesLiberteks
 
B2B Online Display Advertising for Dummies
B2B Online Display Advertising for DummiesB2B Online Display Advertising for Dummies
B2B Online Display Advertising for DummiesLiberteks
 
APIs for dummies
APIs for dummiesAPIs for dummies
APIs for dummiesLiberteks
 
Website Threats for Dummies
Website Threats for DummiesWebsite Threats for Dummies
Website Threats for DummiesLiberteks
 
Software-Defined WAM for Dummies
Software-Defined WAM for DummiesSoftware-Defined WAM for Dummies
Software-Defined WAM for DummiesLiberteks
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for DummiesLiberteks
 
Integrated Marketing For Dummies
Integrated Marketing For DummiesIntegrated Marketing For Dummies
Integrated Marketing For DummiesLiberteks
 
Hyper-Converged Appliances for Dummies
Hyper-Converged Appliances for DummiesHyper-Converged Appliances for Dummies
Hyper-Converged Appliances for DummiesLiberteks
 
Flash Array Deployment for Dummies
Flash Array Deployment for DummiesFlash Array Deployment for Dummies
Flash Array Deployment for DummiesLiberteks
 
Container Storage for Dummies
Container Storage for DummiesContainer Storage for Dummies
Container Storage for DummiesLiberteks
 
Cloud Security for Dumies
Cloud Security for DumiesCloud Security for Dumies
Cloud Security for DumiesLiberteks
 

Mehr von Liberteks (20)

Testing SAP Solutions for Dummies
Testing SAP Solutions for DummiesTesting SAP Solutions for Dummies
Testing SAP Solutions for Dummies
 
System Engineering for Dummies
System Engineering for DummiesSystem Engineering for Dummies
System Engineering for Dummies
 
Sales and use tax compliance for dummies
Sales and use tax compliance for dummiesSales and use tax compliance for dummies
Sales and use tax compliance for dummies
 
QuestionPro for dummies
QuestionPro for dummiesQuestionPro for dummies
QuestionPro for dummies
 
IT Policy Compliance for Dummies
IT Policy Compliance for DummiesIT Policy Compliance for Dummies
IT Policy Compliance for Dummies
 
Point -of-Sale Security for Dummies
Point -of-Sale Security for DummiesPoint -of-Sale Security for Dummies
Point -of-Sale Security for Dummies
 
Midmarket Collaboration for Dummies
Midmarket Collaboration for DummiesMidmarket Collaboration for Dummies
Midmarket Collaboration for Dummies
 
Email Signatures for Dummies
Email Signatures for DummiesEmail Signatures for Dummies
Email Signatures for Dummies
 
Custom Publishing for Dummies
Custom Publishing for DummiesCustom Publishing for Dummies
Custom Publishing for Dummies
 
Cloud Service for Dummies
Cloud Service for DummiesCloud Service for Dummies
Cloud Service for Dummies
 
B2B Online Display Advertising for Dummies
B2B Online Display Advertising for DummiesB2B Online Display Advertising for Dummies
B2B Online Display Advertising for Dummies
 
APIs for dummies
APIs for dummiesAPIs for dummies
APIs for dummies
 
Website Threats for Dummies
Website Threats for DummiesWebsite Threats for Dummies
Website Threats for Dummies
 
Software-Defined WAM for Dummies
Software-Defined WAM for DummiesSoftware-Defined WAM for Dummies
Software-Defined WAM for Dummies
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for Dummies
 
Integrated Marketing For Dummies
Integrated Marketing For DummiesIntegrated Marketing For Dummies
Integrated Marketing For Dummies
 
Hyper-Converged Appliances for Dummies
Hyper-Converged Appliances for DummiesHyper-Converged Appliances for Dummies
Hyper-Converged Appliances for Dummies
 
Flash Array Deployment for Dummies
Flash Array Deployment for DummiesFlash Array Deployment for Dummies
Flash Array Deployment for Dummies
 
Container Storage for Dummies
Container Storage for DummiesContainer Storage for Dummies
Container Storage for Dummies
 
Cloud Security for Dumies
Cloud Security for DumiesCloud Security for Dumies
Cloud Security for Dumies
 

Liberteks Security Advisory002

  • 1. Dear Customer, You are receiving this email because of a newly found internet threat. As our antivirus customer, we notify you with when a new threat arises. We tell you how to identify the threat, and the proper precautions to avoid it. Details of the current threat are outlined below: This is a threat that is received through email message. This threat is sent via email, disguised as a trusted source, such as your insurance company or banking service. Contained within the email is a link to an alleged legitimate file (such as bank documents or payment reports), that instead initiates a download onto the machine. This download contains Malware. What the threat might look like: How to identify the threat: 1. The email requests you to access or download a file or report. 2. The sender claims to be a legitimate source, but the email is unexpected. 3. The email links via shortened URL (such as goog.le or bit.ly) to an external site, such as Dropbox. How to avoid the threat: 1. Do not download any files sent via email, or click or any links that take outside of your email service. 2. Be precautious of emails. If you receive an email from a bank service or payroll service, was it expected? If you have any doubt whatsoever, do not click the link or download. 3. Learn to recognize their appearance, they generally look very similar. 4. Move the suspicious emails into your SPAM folder. If you follow the above procedures, you will greatly increase your safety from this threat. Your eSet Antivirus will help you stay safe from this threat, but blocking it involves a preventative effort