Beware: Top Cyber Scams To Avoid This Summer

The summer months hold a treasure trove for cybercriminals wanting to take advantage of unsuspecting victims.

The number of events that occur over the season provide the perfect opportunity for cybercriminals to target online users. Consumers are no longer just at risk of being scammed into handing over personal details – this year, there is also a higher risk of being hit by threats like ransomware.

With scams seemingly lurking behind every corner of the Internet, this can be a challenging time for both brands and consumers. As summer draws near, these are the top online scams that consumers need to watch out for:

The Olympics

The Rio Olympics will be one of the year’s largest sporting events and it’s anticipated that crafty cybercriminals will be capitalising on weaknesses in sporting fanatics’ online activity. With many Brits unable to make the journey to Rio de Janeiro to experience the Olympics first hand, they will be on the hunt for links to live stream the games and look to purchase official merchandise. Consumers therefore need to watch out for any kind of ‘special offers’ related to the Olympics and ensure they aren’t clicking any malicious links or handing over money for souvenirs from non-existent retailers.

FA EURO 2016

Sports events and phishing scams tend to go hand in hand. As the nation gears up for this year’s biggest footballing events, so will the cybercriminals that employ social engineering to exploit fans. With tickets to the biggest sporting fixtures usually being snapped up within days of release, dedicated football fans will be scouring the Internet for last minute or cheap tickets to ‘sold out’ games. Ticket scams are a scammer favorite, cybercriminals use this time to advertise ‘unmissable deals’ and exclusive tickets and demand payments without ever producing the goods. Consumers need to be mindful that it’s not always just discounted tickets, but things like VIP viewing packages, opportunities to meet the players can also be scams.

Lottery tickets

As our world is becoming more digital by the day, the traditional paper lottery ticket has also turned technical. For example, this summer all National Lottery tickets will now have QR codes to make it easier for lottery players to check whether they have won the jackpot on their smartphones. Cunning cybercriminals can take advantage of the increasingly digital processes, sending spoofed lottery emails in order to trick people into clicking malicious links or handing over financial details. It’s also expected that hopeful winners will be turning to email to check the results when they are out and about, providing yet another opportunity for a hacker to intercept with a phishing email.

Summer holidays

The travel industry is a prime target for cybercriminals, especially during the summer months. Travelers in particular need to protect themselves against email cyberattacks, these criminals are not just after financial details, but are also interested in the theft of consumers’ airline miles and hotel points. While these are trickier to monetise than direct financial information, it’s much easier for criminals to get their hands on and are still worth something on the black market – especially if the hacking process can be automated. Just because a ‘travel deal’ doesn’t ask for financial details, it doesn’t mean it’s not a scam. Holidaymakers also need to be aware of opening emails on smart phones from suspicious sources as it is often easier to be fooled when less sender data is displayed and it is easy to click on links by mistake.

ITProportal

« Insurers Want A Comprehensive Cyber Attack Database
British Companies Buy Bitcoins As Ransom Money »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Hotlava Systems

Hotlava Systems

HotLava network adapters enable today's powerful servers and workstations to deliver more productivity by reducing congestion at the network interface.

Galois

Galois

Galois specializes in the research and development of new technologies that solve the most difficult problems in computer science.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Digital Transformation EXPO (DTX)

Digital Transformation EXPO (DTX)

Digital Transformation EXPO showcases the latest technology and insight from the world’s leading brands and experts in DX.

ISEC7 Group

ISEC7 Group

ISEC7 Group is a global provider of mobile business services and software solutions. The company was one of the first movers in mobilising company and business processes.

CIRISK

CIRISK

CIRISK offers a wide range of services from consulting to audit or project management to help you develop your cyber security or information security strategy.

International Accreditation Forum (IAF)

International Accreditation Forum (IAF)

The IAF is the world association of Conformity Assessment Accreditation Bodies. Its primary function is to develop a single worldwide programme of conformity assessment.

Norsk Akkreditering

Norsk Akkreditering

Norsk Akkreditering is the national accreditation body for Norway. The directory of members provides details of organisations offering certification services for ISO 27001.

Capsule8

Capsule8

Capsule8 is the only company providing high-performance attack protection for Linux production environments.

Curtail

Curtail

Curtail keeps businesses running by using live traffic analysis to identify defects before software goes live, and detect and isolate security threats before they impact systems.

Defensity

Defensity

Defensity offer bespoke & pre packaged IT Security Solutions for Small business to help companies reduce overall IT related risk.

PhishProtection

PhishProtection

We created Phish Protection to prevent all types of phishing including spear phishing protection and office 365 email protection for your small business.

Sterling Information Technologies

Sterling Information Technologies

Sterling is an information security, operational risk consulting and advisory group. Our Advisory services help to safeguard information assets while supporting business operations.

Hushmesh

Hushmesh

Hushmesh is a start-up aimed at securing the world’s digital infrastructure by developing develop the Mesh, a global information space with automated security built in.

Methods

Methods

Methods is the leading digital transformation partner for the UK public sector. We care deeply about making our public services better and have been doing this for over 28 years.

RapidFort

RapidFort

RapidFort’s Software Attack Surface Optimization Platform remediates 95% of software vulnerabilities in minutes without code changes.