<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cybercrime attacks &#8211; Bitfinance</title>
	<atom:link href="https://bitfinance.news/en/etiqueta/cybercrime-attacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://bitfinance.news</link>
	<description>Fintech &#38; new economy info</description>
	<lastBuildDate>Mon, 26 Aug 2024 14:15:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://bitfinance.news/wp-content/uploads/2025/01/favicon-64.png</url>
	<title>cybercrime attacks &#8211; Bitfinance</title>
	<link>https://bitfinance.news</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Malicious banking applications: New phishing against Android and iOS users</title>
		<link>https://bitfinance.news/en/malicious-banking-applications-new-phishing-against-android-and-ios-users/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Mon, 26 Aug 2024 12:00:55 +0000</pubDate>
				<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[Android and iOS users]]></category>
		<category><![CDATA[automated voice calls]]></category>
		<category><![CDATA[Camilo Gutiérrez Amaya]]></category>
		<category><![CDATA[criminal technique]]></category>
		<category><![CDATA[cybercrime attacks]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET research team]]></category>
		<category><![CDATA[malicious ads]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[Research Laboratory]]></category>
		<category><![CDATA[SMS messages]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=108610</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1331" height="861" src="https://bitfinance.news/wp-content/uploads/2024/08/Imagen-referencial-Nuevo-metodo-de-phishing-adaptado-a-usuarios-de-Android-e-iOS.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET analizó campañas de phishing que combinan técnicas tradicionales con el uso de tecnologías de iOS y Android para instalar aplicaciones vulnerantes sin el consentimiento del usuario" decoding="async" fetchpriority="high" srcset="https://bitfinance.news/wp-content/uploads/2024/08/Imagen-referencial-Nuevo-metodo-de-phishing-adaptado-a-usuarios-de-Android-e-iOS.jpg 1331w, https://bitfinance.news/wp-content/uploads/2024/08/Imagen-referencial-Nuevo-metodo-de-phishing-adaptado-a-usuarios-de-Android-e-iOS-300x194.jpg 300w, https://bitfinance.news/wp-content/uploads/2024/08/Imagen-referencial-Nuevo-metodo-de-phishing-adaptado-a-usuarios-de-Android-e-iOS-1024x662.jpg 1024w, https://bitfinance.news/wp-content/uploads/2024/08/Imagen-referencial-Nuevo-metodo-de-phishing-adaptado-a-usuarios-de-Android-e-iOS-768x497.jpg 768w, https://bitfinance.news/wp-content/uploads/2024/08/Imagen-referencial-Nuevo-metodo-de-phishing-adaptado-a-usuarios-de-Android-e-iOS-210x136.jpg 210w" sizes="(max-width: 1331px) 100vw, 1331px" /></div><p>ESET, a leading company in proactive threat detection, identified a phishing campaign aimed at mobile users that targeted bank customers. This novel criminal technique installs a phishing application from a third-party website without the user having to allow the installation of applications, it affects both iOS and Android users. Most of the cases known at [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/malicious-banking-applications-new-phishing-against-android-and-ios-users/">Malicious banking applications: New phishing against Android and iOS users</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1331" height="861" src="https://bitfinance.news/wp-content/uploads/2024/08/Imagen-referencial-Nuevo-metodo-de-phishing-adaptado-a-usuarios-de-Android-e-iOS.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET analizó campañas de phishing que combinan técnicas tradicionales con el uso de tecnologías de iOS y Android para instalar aplicaciones vulnerantes sin el consentimiento del usuario" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2024/08/Imagen-referencial-Nuevo-metodo-de-phishing-adaptado-a-usuarios-de-Android-e-iOS.jpg 1331w, https://bitfinance.news/wp-content/uploads/2024/08/Imagen-referencial-Nuevo-metodo-de-phishing-adaptado-a-usuarios-de-Android-e-iOS-300x194.jpg 300w, https://bitfinance.news/wp-content/uploads/2024/08/Imagen-referencial-Nuevo-metodo-de-phishing-adaptado-a-usuarios-de-Android-e-iOS-1024x662.jpg 1024w, https://bitfinance.news/wp-content/uploads/2024/08/Imagen-referencial-Nuevo-metodo-de-phishing-adaptado-a-usuarios-de-Android-e-iOS-768x497.jpg 768w, https://bitfinance.news/wp-content/uploads/2024/08/Imagen-referencial-Nuevo-metodo-de-phishing-adaptado-a-usuarios-de-Android-e-iOS-210x136.jpg 210w" sizes="(max-width: 1331px) 100vw, 1331px" /></div><p style="text-align: justify;"><strong><a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a>,</strong> a leading company in proactive threat detection, identified a phishing campaign aimed at mobile users that targeted bank customers. This novel <strong>criminal technique</strong> installs a phishing application from a third-party website without the user having to allow the installation of applications, it affects both iOS and Android users. Most of the cases known at the moment have occurred in the Czech Republic, and applications were directed to the Hungarian bank OTP Bank and the Georgian bank TBC Bank.</p>
<p style="text-align: justify;"><strong>The ESET research team</strong> identified a series of phishing campaigns targeting mobile users that used three different <strong>URL delivery mechanisms: automated voice calls, SMS messages, and social media malvertising.</strong></p>
<p style="text-align: justify;"><strong>Voice call</strong> delivery was done via an automated call that warned the user about an outdated banking application and asked them to select an option on the keypad. After pressing the correct button, a phishing URL was sent via SMS.</p>
<p style="text-align: justify;">The initial approach by <strong>SMS</strong> was carried out by indiscriminately sending messages to Czech telephone numbers. The message sent included a phishing link and a text for victims to perform social engineering and visit the link.</p>
<p style="text-align: justify;">The spread through<strong> malicious ads</strong> was done by registering ads on Meta platforms such as Instagram and Facebook. These ads included a call to action, such as a limited offer for users to “download an update below.” This technique allowed threat actors to specify the target audience by age, gender, etc. The ads then appeared on the victims&#8217; social networks.</p>
<p style="text-align: justify;">After opening the URL delivered in the first stage, Android victims were faced with a <strong>high-quality phishing page that imitated the official Google Play Store page</strong> for the targeted banking app, or an imitation website of the app.</p>
<figure id="attachment_108607" aria-describedby="caption-attachment-108607" style="width: 899px" class="wp-caption aligncenter"><img decoding="async" class="wp-image-108607 size-full" src="https://bitfinance.news/wp-content/uploads/2024/08/1.png" alt="PWA phishing flow" width="899" height="311" srcset="https://bitfinance.news/wp-content/uploads/2024/08/1.png 899w, https://bitfinance.news/wp-content/uploads/2024/08/1-300x104.png 300w, https://bitfinance.news/wp-content/uploads/2024/08/1-768x266.png 768w" sizes="(max-width: 899px) 100vw, 899px" /><figcaption id="caption-attachment-108607" class="wp-caption-text">PWA phishing flow</figcaption></figure>
<p>&nbsp;</p>
<p style="text-align: justify;">From there, victims are asked to install a “new version” of the banking app. Depending on the campaign, clicking the install/update button initiates the installation of a malicious application from the website, directly on the victim&#8217;s phone, either in the form of a <a href="https://web.dev/articles/webapks" target="_blank" rel="noopener">WebAPK</a> (Android users only), or as a Progressive Web App (PWA)<strong> for iOS and Android users.</strong> The highlight of this instance is that it bypasses traditional browser warnings to &#8220;install unknown apps&#8221;: this is the default behavior of <strong>Chrome&#8217;s WebAPK technology, which is abused by attackers.</strong></p>
<p style="text-align: justify;">The process is a little different for iOS users, as an animated pop-up tells victims how to add the phishing PWA to their home screen. The popup copies the look of native iOS messages. In the<strong> end, iOS users are not warned about adding a potentially harmful app to their phone.</strong></p>
<p style="text-align: justify;">Upon installation, victims are asked to enter their internet banking credentials to access their account through the new mobile banking application. All information provided is sent to the<strong> attackers&#8217; C&amp;C servers.</strong></p>
<p style="text-align: justify;">The malicious ads included a mashup of the bank&#8217;s official mascot (blue chameleon), as well as bank logos and text promising a financial reward for installing the app or warning users that a critical update had been released.</p>
<figure id="attachment_108608" aria-describedby="caption-attachment-108608" style="width: 750px" class="wp-caption aligncenter"><img decoding="async" class="wp-image-108608 " src="https://bitfinance.news/wp-content/uploads/2024/08/2.png" alt="Example of a malicious ad used in these campaigns" width="750" height="694" srcset="https://bitfinance.news/wp-content/uploads/2024/08/2.png 485w, https://bitfinance.news/wp-content/uploads/2024/08/2-300x278.png 300w" sizes="(max-width: 750px) 100vw, 750px" /><figcaption id="caption-attachment-108608" class="wp-caption-text">Example of a malicious ad used in these campaigns</figcaption></figure>
<p>&nbsp;</p>
<p style="text-align: justify;">All stolen login information was recorded through a backend server, which then sent the banking login details entered by the user to a Telegram group chat. HTTP calls to send messages to the threat actor&#8217;s group chat were made through the official Telegram API. <strong>As mentioned by ESET: this technique is not new and is used in several phishing kits.</strong></p>
<h4 style="text-align: left;"><span style="color: #008000;">Warning</span></h4>
<p style="text-align: justify;"><em>“Because two drastically different C&amp;C infrastructures were used, we have determined that two different groups are responsible for the spread of phishing applications. More imitation apps will surely be created, since after installation it is difficult to separate legitimate apps from phishing ones. All sensitive information found during our investigation was quickly sent to the affected banks for processing. We also coordinate the dismantling of multiple phishing domains and C&amp;C servers,” </em>says <strong>Camilo Gutiérrez Amaya</strong>, Head of the<strong> ESET Latin America Research Laboratory.</strong></p>
<p style="text-align: justify;">Contact coordinates with ESET in Venezuela: <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>. Also, their social networks: Instagram <a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook: (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p style="text-align: left;"><em>With information and reference image provided by ESET and Comstat Rowland</em></p>
<p style="text-align: left;">Visit our news channel on <a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener">Google News</a> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on <a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener">Twitter</a> and <a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener">Instagram</a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/malicious-banking-applications-new-phishing-against-android-and-ios-users/">Malicious banking applications: New phishing against Android and iOS users</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Influencers under cyberattack: Ways to protect themselves and good practices to consider</title>
		<link>https://bitfinance.news/en/influencers-under-cyberattack-ways-to-protect-themselves-and-good-practices-to-consider/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Fri, 24 May 2024 14:00:23 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[Other topics]]></category>
		<category><![CDATA[“Finfluencers”]]></category>
		<category><![CDATA[cybercrime attacks]]></category>
		<category><![CDATA[digital world]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[good practices]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[influencers]]></category>
		<category><![CDATA[Instagram]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[social networks]]></category>
		<category><![CDATA[YouTube]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=106175</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1364" height="910" src="https://bitfinance.news/wp-content/uploads/2024/05/Imagen-referencial-¿Por-que-los-influencers-son-blanco-de-los-cibercriminales-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET Latinoamérica analiza las estrategias principales que los cibercriminales emplean contra los influencers y hace recomendaciones preventivas" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2024/05/Imagen-referencial-¿Por-que-los-influencers-son-blanco-de-los-cibercriminales-Suministrada-por-ESET-y-Comstat-R.jpg 1364w, https://bitfinance.news/wp-content/uploads/2024/05/Imagen-referencial-¿Por-que-los-influencers-son-blanco-de-los-cibercriminales-Suministrada-por-ESET-y-Comstat-R-300x200.jpg 300w, https://bitfinance.news/wp-content/uploads/2024/05/Imagen-referencial-¿Por-que-los-influencers-son-blanco-de-los-cibercriminales-Suministrada-por-ESET-y-Comstat-R-1024x683.jpg 1024w, https://bitfinance.news/wp-content/uploads/2024/05/Imagen-referencial-¿Por-que-los-influencers-son-blanco-de-los-cibercriminales-Suministrada-por-ESET-y-Comstat-R-768x512.jpg 768w" sizes="(max-width: 1364px) 100vw, 1364px" /></div><p>Facebook, YouTube and Instagram have become platforms that literally catapulted certain people to stardom, granting them the accolade or recognition of “Influencers.” The number of followers they garner and the money that moves around them is such that cybercriminals have focused their sights on them, implementing strategies and deceptions that allow them to obtain their [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/influencers-under-cyberattack-ways-to-protect-themselves-and-good-practices-to-consider/">Influencers under cyberattack: Ways to protect themselves and good practices to consider</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1364" height="910" src="https://bitfinance.news/wp-content/uploads/2024/05/Imagen-referencial-¿Por-que-los-influencers-son-blanco-de-los-cibercriminales-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET Latinoamérica analiza las estrategias principales que los cibercriminales emplean contra los influencers y hace recomendaciones preventivas" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2024/05/Imagen-referencial-¿Por-que-los-influencers-son-blanco-de-los-cibercriminales-Suministrada-por-ESET-y-Comstat-R.jpg 1364w, https://bitfinance.news/wp-content/uploads/2024/05/Imagen-referencial-¿Por-que-los-influencers-son-blanco-de-los-cibercriminales-Suministrada-por-ESET-y-Comstat-R-300x200.jpg 300w, https://bitfinance.news/wp-content/uploads/2024/05/Imagen-referencial-¿Por-que-los-influencers-son-blanco-de-los-cibercriminales-Suministrada-por-ESET-y-Comstat-R-1024x683.jpg 1024w, https://bitfinance.news/wp-content/uploads/2024/05/Imagen-referencial-¿Por-que-los-influencers-son-blanco-de-los-cibercriminales-Suministrada-por-ESET-y-Comstat-R-768x512.jpg 768w" sizes="(max-width: 1364px) 100vw, 1364px" /></div><p style="text-align: justify;"><strong>Facebook, YouTube and Instagram</strong> have become platforms that literally catapulted certain people to stardom, granting them the accolade or recognition of “Influencers.” The number of followers they garner and the <a href="https://es.statista.com/estadisticas/1038342/instagram-valor-del-mercado-global-del-marketing-de-influencers/#:~:text=La%20evoluci%C3%B3n%20del%20valor%20del,m%C3%A1s%20mayor%20y%20m%C3%A1s%20diversificada." target="_blank" rel="noopener">money that moves around them</a> is such that cybercriminals have focused their sights on them, implementing strategies and deceptions that allow them to obtain their own financial gain. <strong><a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a>, a leading company in proactive threat detection,</strong> warns that it analyzes the most frequent tactics used by cyberattackers to access money and how influencers can be better protected.</p>
<p style="text-align: justify;">The global influencer marketing market, which in 2022 was valued at $33.2 billion, will continue to grow exponentially. In fact, it is expected that <a href="https://www.marketresearchfuture.com/reports/influencer-marketing-market-8408?utm_term=&amp;utm_campaign=&amp;utm_source=adwords&amp;utm_medium=ppc&amp;hsa_acc=2893753364&amp;hsa_cam=20298941735&amp;hsa_grp=151951244833&amp;hsa_ad=663291708226&amp;hsa_src=g&amp;hsa_tgt=dsa-2091100200699&amp;hsa_kw=&amp;hsa_mt=&amp;hsa_net=adwords&amp;hsa_ver=3&amp;gad_source=1" target="_blank" rel="noopener">by 2032 it will reach 200 billion dollars</a>. In turn, according to the <a href="https://blog.hubspot.es/marketing/cuanto-gana-influencer" target="_blank" rel="noopener">HubSpot site</a>, there are several categories of influencers depending on the number of followers and depending on this (among other factors) “a nano influencer earns between 10 and 100 USD, a micro between 100 and 500 USD, and a macro between 5000 and 10,000 USD per publication.” These figures served as bait for cybercriminals to begin looking for (and implementing) strategies to obtain financial gain. In practice, they were tempted and motivated to do so.</p>
<p style="text-align: justify;">Social engineering is one of the favorite tools of cyberattackers to harm influencers, who often do not have the resources or knowledge with which companies usually protect themselves.</p>
<h3 style="text-align: left;"><span style="color: #000080;">ESET shares some examples of related scams, thefts and deceptions</span></h3>
<p style="text-align: justify;"><strong>The Fake Podcast:</strong> Hannah Shaw is popularly known on social media as the “Cat Lady”; His pseudonym is due to the fact that in his videos he teaches people what proper care for newborn cats is. Thanks to his followers (more than one million), he raised significant amounts to help rescue these animals and shelters. Seeing Shaw&#8217;s popularity as a source of financial gain and thanks to a social engineering technique, <a href="https://www.engadget.com/how-a-social-engineering-hack-turned-these-facebook-pages-into-a-dumping-ground-for-spam-143010079.html?guccounter=1" target="_blank" rel="noopener">cybercriminals managed to take over his Meta business account</a>.</p>
<p style="text-align: justify;">They did this by <strong>pretending to be hosts of a podcast.</strong> In advance and to coordinate the details of the interview, the malicious actors invited the victim to a Zoom call. There, they asked Shaw for access to the Facebook Live settings with the excuse of generating income and she agreed, thinking it was a normal part of the process. At that time, the cyber attackers took control of the account as Administrator, leaving the page clean to replace them with fake links that actually directed to sites to generate quick and easy income with advertising.</p>
<p style="text-align: justify;"><strong>Ambassadors, but of the scam:</strong> The <strong>“Finfluencers”</strong> are a subgroup of influencers dedicated especially to the finance industry. In their accounts, they provide economic advice, advice and tips to their large number of followers so that they can get rich quickly, invest in stocks or cryptocurrencies and implement financial planning. In this case, cybercriminals (and also using social engineering to achieve their goal), offered <a href="https://www.malwarebytes.com/blog/news/2024/03/social-media-influencers-targeted-by-identity-thieves" target="_blank" rel="noopener">a false job opportunity</a> for finfluencers to become ambassadors of a brand and promote the brand&#8217;s products.</p>
<p style="text-align: justify;">The truth is that the final objective of the attackers was to obtain the personal and financial information of their victims. With the excuse of needing this data to make payment for the supposed work, what they did once they obtained that information was to empty their bank accounts until they took control of their social networks.</p>
<p style="text-align: justify;"><strong>Malware always present:</strong> Other influencers have been attacked with <strong>malware</strong>, either by downloading a malicious file or clicking on an apocryphal link. Thus, cyberattackers can very easily take control of accounts and manage them. They achieve this by publishing content that has nothing to do with what the influencer normally shares, deleting all the content that was available, and even changing the logo and name of the accounts. It is also <strong>common for malicious actors to ask for exorbitant sums of money so that the victim can recover their social networks.</strong></p>
<p style="text-align: justify;"><strong>Identity theft with suspension included:</strong> Another technique that became known through complaints and investigation, specifically on Instagram, consists of <a href="https://dohanews.co/filtered-privacy-how-hackers-are-targeting-instagram-influencers/" target="_blank" rel="noopener">cyberattackers duplicating the influencer&#8217;s original account and requesting its suspension</a>. To do this, they either acquire a verified account, change the user&#8217;s biography and image, and then file a report alleging that the victim is actually impersonating them. Another option is to carry out a “spam attack” against the account, reporting it, either for showing nudity images or violating copyright. When the attacker manages to have the account suspended, he contacts the victim to offer to unlock the account as long as he pays an amount of money for said ransom.</p>
<p style="text-align: justify;"><strong>Followers, also in the crosshairs:</strong> <strong>Identity theft</strong> is another of the techniques used in the field of social networks, but in this case the victims are the followers. It is normal for influencers to launch giveaways, which generate a high level of interaction. This is where cybercriminals come into play, creating a duplicate account that pretends to be the original, and from there contacts users informing them that they have been winners of a raffle. The goal is to access the personal and financial information of their victims.</p>
<h4 style="text-align: left;"><span style="color: #008000;">Influencers can protect themselves by taking actions to avoid being another victim of the deceptions of cyberattackers</span></h4>
<p>ESET shares some good practices to keep in mind:</p>
<ul style="text-align: justify;">
<li>Be distrustful as a first measure, if a job offer or business possibility <a href="https://www.welivesecurity.com/la-es/2023/06/01/estafa-falsa-oferta-empleo-promete-ganar-dinero-telefono-enviando-pedidos/" target="_blank" rel="noopener">seems too good to be true, it probably is.</a></li>
<li>Do not provide personal or financial information without confirming that there is a real and true possibility on the other side. Good research is your best ally, as is contacting the company to confirm the offer.</li>
<li>Do not let any person, company or application post on your social networks.</li>
<li>Use <a href="https://www.welivesecurity.com/es/contrasenas/contrasenas-5-errores-comunes-que-deberias-evitar/" target="_blank" rel="noopener">unique, strong, long and secure passwords</a> (with capital letters, special characters and numbers) on all accounts, and change them periodically.</li>
<li>Pay attention and analyze carefully and carefully before clicking on any link that arrives unexpectedly.</li>
<li>Lastly and always very important, have a <a href="https://www.eset.com/latam/hogar/prueba-gratuita/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=seguridad-en-redes-sociales&amp;utm_term=es" target="_blank" rel="noopener">security solution</a> that provides comprehensive protection while consuming fewer resources.</li>
</ul>
<p style="text-align: justify;">In summary, ESET recommends, for everything mentioned above, that it is necessary to adopt good security practices, pay attention to signs that an offer may be a scam, and inform yourself about the methodologies that cybercriminals use to perpetrate their attacks. As well as listening to <a href="https://www.eset.com/latam/podcast/" target="_blank" rel="noopener"><strong>Conexión Segura</strong></a>, your podcast with timely verified information to know what is happening in the world of computer security, at: <a href="https://open.spotify.com/show/0Q32tisjNy7eCYwUNHphcw" target="_blank" rel="noopener">https://open.spotify.com/show/0Q32tisjNy7eCYwUNHphcw</a>.</p>
<p style="text-align: left;"><em>With information and image provided by ESET Latin America and Comstat Rowland Comprehensive Strategic Communications</em></p>
<p style="text-align: left;">(Reference image: ESET Latin America and Comstat Rowland)</p>
<p style="text-align: left;"><em>Visit our news channel on </em><a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><em>Google News</em></a><em> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on </em><a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><em>Twitter</em></a><em> and </em><a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><em>Instagram</em></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/influencers-under-cyberattack-ways-to-protect-themselves-and-good-practices-to-consider/">Influencers under cyberattack: Ways to protect themselves and good practices to consider</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
