At the most basic level, a phishing scam involves sending fraudulent emails that appear to be from a reputable person or company, with the goal of deceiving recipients into either clicking on a malicious link or downloading an infected attachment, usually to steal financial or confidential information.
Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams.
Imagine this: You’re setting up your login information for your email, or maybe it’s your Cloud database account. Upon entering your password, the program prompts you to include a capitalized letter, number and possibly a symbol in your password. You wonder, “Is this really necessary? Who’s going to be THAT determined to break into my accounts?” Well to answer that question: hackers.