• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Cyber Security Solutions, Compliance, and Consulting Services - IT Security

We offer It security management, data, network, & Information security services for protecting information & mitigating security risks to your organization.

  • Home
  • About Us
  • Solutions & Services
    • Security Governance
    • NETWORK SECURITY
    • CLOUD SECURITY
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

LinkedIn Scams: Still the Most Popular Form of Phishing

By kamran | At December 11, 2020

Dec 11 2020

LinkedIn Scams: Still the Most Popular Form of Phishing

Unemployment has always been an issue in the world, but with the way things have been going in 2020, it has gotten even worse. People try whatever they can to be able to find work opportunities or find better opportunities than the ones they already have. One of the most popular places to do this, is online, on LinkedIn. 

LinkedIn is used by professionals all over the world to network and connect with people in their fields all over the world. A lot of people today have found work solely through LinkedIn. 

For people who can’t always scroll around on their LinkedIn feeds, their push emails tend to be the way they keep up with any potential opportunities through their push email notifications. When you’re really hoping to get work, you let your guard down and could end up clicking on emails that may seem like they’re from LinkedIn, but are not.

Phishing is when you receive an email that seems like it’s from a legitimate website, in this case, LinkedIn, but in reality, it’s from a hacker trying to trick you into typing out your website passwords or give them access to other sensitive data. They make the emails and web pages look very convincing, if you aren’t aware of Phishing scams, you might not even notice that you’re not dealing with the real website until it’s too late!

The phishing emails tend to copy the subject lines of the emails you would actually get from LinkedIn like “You appeared in new searches this week!’, ‘People are looking at your LinkedIn profile’, ‘Please add me to your Linkedin network’, and ‘Join my network on LinkedIn’. Since the actual website uses these too, you might not pay that much attention and click on the email so you can be redirected to the LinkedIn site to inspect further, but on the way there, might end up losing your data instead. 

You don’t have to fall for these scams though. There are ways that you can protect yourself from LinkedIn scams like this, all they require is for you to pay a little more attention while opening emails and clicking on any links. 

Ways to Protect Yourself From LinkedIn Scams

Whenever you receive an email from LinkedIn, tap on the address that the email came from to be able to see the entire email address. A legitimate email from the site would have an address that ends with “@linkedin.com” never anything like “@gmail.com”. This is the easiest way to tell the difference between the two types of emails. 

Another way to tell if an email isn’t legitimate is to pay closer attention to the text written in the actual email. See if there are any grammatical errors or weird sentence usage in the text at all. Sometimes the phishing emails are written using Google Translate or are simply typed automatically, a legitimate email would not have the errors.

Finally, a simple way to avoid being scammed is to never type out your email and password unless the website is trusted. Ideally, you should only log in if you visit the website yourself. A phishing email often leads you to a scam website where you type out your email and password and the hacker on the other end just sees you type it and saves your data immediately. 

Hackers that use LinkedIn users for their scams attack you when you least expect it, but if you’re careful and attentive, you can spot the scam and trash that email as soon as you see it so you don’t end up falling victim to one of these emails.

Written by kamran · Categorized: Cyber security threats

Primary Sidebar

Recents post

Healthcare Cybersecurity Roundup: Hospitals, Labs, and RCM Firms Targeted

Ransomware groups continue to … [Read More...] about Healthcare Cybersecurity Roundup: Hospitals, Labs, and RCM Firms Targeted

New Cyber Threats for Law Firms: ICC Attack, Firm Breaches, and AI-Driven Risks

With confidential client … [Read More...] about New Cyber Threats for Law Firms: ICC Attack, Firm Breaches, and AI-Driven Risks

Healthcare Under Siege: 3 Major Data Breaches + the Rise of Bert Ransomware

From ransomware attacks … [Read More...] about Healthcare Under Siege: 3 Major Data Breaches + the Rise of Bert Ransomware

Categories

  • AI and cybersecurity (2)
  • blockchain (1)
  • Cloud security (29)
  • Compliance (25)
  • Cyber security news (108)
  • Cyber security threats (376)
  • Cyber security tips (370)
  • Data Security (3)
  • E-Commerce cyber security (3)
  • Education cyber security (1)
  • Enterprise cyber security (7)
  • Financial organizations cyber security (4)
  • General (22)
  • Government cyber security (4)
  • Healthcare cyber security (19)
  • Information Security (2)
  • Law Firms Cyber Security (9)
  • Network security (9)
  • Newsletter (1)
  • Privacy (1)
  • Ransomware (14)
  • remote work (1)
  • Risk assessment and management (6)
  • Security management and governance (9)
  • SME Cybersecurity (2)
  • Software Security (2)
  • Supply Chain Attacks (5)
  • System security (3)
  • Uncategorized (29)
  • Vendor security (14)

Archives

Footer

Infoguard Cyber Security

San Jose Office
333 W. Santa Clara Street
Suite 920
San Jose, CA 95113
Ph: (855) 444-6004

Irvine Office
19800 MacArthur Blvd.
Suite 300
Irvine, CA 92612

Recent Posts

  • Healthcare Cybersecurity Roundup: Hospitals, Labs, and RCM Firms Targeted
  • New Cyber Threats for Law Firms: ICC Attack, Firm Breaches, and AI-Driven Risks
  • Healthcare Under Siege: 3 Major Data Breaches + the Rise of Bert Ransomware

Get Social

  • LinkedIn
  • Home
  • About Us
  • Solutions & Services
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

Privacy Policy Terms of Use Acceptable Use

Copyright © 2025 | All right reserved