• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Cyber Security Solutions, Compliance, and Consulting Services - IT Security

We offer It security management, data, network, & Information security services for protecting information & mitigating security risks to your organization.

  • Home
  • About Us
  • Solutions & Services
    • Security Governance
    • NETWORK SECURITY
    • CLOUD SECURITY
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

05 most common ways criminals scam you through social engineering

By kamran | At December 10, 2019

Dec 10 2019

05 most common ways criminals scam you through social engineering

There are various ways a social engineering scammers use to scam their victims. Given below are five basic and common tricks used by social engineering. 

The sender has two email addresses

Using two different email addresses is the common phishers trick. They use one for email arriving which looks legitimate and one for return address which is the real one. It is not guaranteed that the email arriving with two different addresses is malicious because sometimes the legitimate marketing uses two different email addresses. 

It is important to look out for emails that are from someone you don’t know and are from a new address. The cybercriminals sometimes claim that it is the CEO of an organization who is emailing you from their home address. You should not open such emails or trust them and share anything with them. 

Change in banking or wiring instructions

You may receive an invoice, requesting you to send the money to a new bank account or an email to update the existing bank wiring instruction. The criminal breaks the third-party who instructs you for updates; you pay them, send you wiring instruction, etc and ask you to pay the schedule invoice payment. 

The criminals after emailing from the third-party account will change the method of payment so to make sure that it is legitimate to call the third party and confirm it. 

 Uses the wrong nickname or full name

The cybercriminals can be caught by noticing the name of the sender if it is from a new email address just check out the name of the senders on the previous email. When a person ends an email with their full formal name or nick name, the difference can be caught just by noticing these basic details.  

 Can’t accept phone calls

The social engineers usually don’t take calls from their victims. They claim that they can’t get to the phone or they don’t have a useable phone and other excuses. The reason for not picking up a call from the victim is that they may get identified by their accent and language.

 Buyer is too accommodating

The social engineers are also very active on online site to buy and sell things. The criminals usually are the first ones to reply trying to buy your product or sell their products to you. They are willing to pay all the taxes, incidentals, shipping, etc and don’t try to negotiate prices. They make excuses that they can’t meet as they are out of the city or country etc. They offer products at a very low rate. 

Written by kamran · Categorized: Cyber security threats

Primary Sidebar

Recents post

Your Law Firm Could Be Next — Are You Protected?

Cybercriminals are targeting … [Read More...] about Your Law Firm Could Be Next — Are You Protected?

Litigation, Logins, Breach Response & More: A Lawyer’s Cyber Survival Guide

Your clients trust you with … [Read More...] about Litigation, Logins, Breach Response & More: A Lawyer’s Cyber Survival Guide

Massive Surge in Healthcare Cyber Attacks…Ransomware, Radiology Data Breach, and More

The first half of 2025 has … [Read More...] about Massive Surge in Healthcare Cyber Attacks…Ransomware, Radiology Data Breach, and More

Categories

  • AI and cybersecurity (2)
  • blockchain (1)
  • Cloud security (29)
  • Compliance (25)
  • Cyber security news (108)
  • Cyber security threats (376)
  • Cyber security tips (370)
  • Data Security (3)
  • E-Commerce cyber security (3)
  • Education cyber security (1)
  • Enterprise cyber security (7)
  • Financial organizations cyber security (4)
  • General (22)
  • Government cyber security (4)
  • Healthcare cyber security (19)
  • Information Security (2)
  • Law Firms Cyber Security (9)
  • Network security (9)
  • Newsletter (1)
  • Privacy (1)
  • Ransomware (14)
  • remote work (1)
  • Risk assessment and management (6)
  • Security management and governance (9)
  • SME Cybersecurity (2)
  • Software Security (2)
  • Supply Chain Attacks (5)
  • System security (3)
  • Uncategorized (35)
  • Vendor security (14)

Archives

Footer

Infoguard Cyber Security

San Jose Office
333 W. Santa Clara Street
Suite 920
San Jose, CA 95113
Ph: (855) 444-6004

Irvine Office
19800 MacArthur Blvd.
Suite 300
Irvine, CA 92612

Recent Posts

  • Your Law Firm Could Be Next — Are You Protected?
  • Litigation, Logins, Breach Response & More: A Lawyer’s Cyber Survival Guide
  • Massive Surge in Healthcare Cyber Attacks…Ransomware, Radiology Data Breach, and More

Get Social

  • LinkedIn
  • Home
  • About Us
  • Solutions & Services
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

Privacy Policy Terms of Use Acceptable Use

Copyright © 2025 | All right reserved