• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Uncategorized  /  How do cyber criminals celebrate Valentine’s day
13 February 2018

How do cyber criminals celebrate Valentine’s day

Written by Ankita Ashesh
Ankita Ashesh
Uncategorized
  • 201
    Shares
Estimated reading time: 2 minutes

February 14th, Valentine’s Day, maybe the day of love but there’s no love lost between cybercriminals and their target. In recent years, these criminals are only getting smarter in their ways and ensuring that they time their attacks at times of popular celebration when most users will be at risk. And Valentine’s Day provides a great opportunity.

Valentine’s Day offers a goldmine of information for hackers and other criminals as many users turn to the Internet to buy gifts, find deals and do other kinds of e-commerce activity in the hope of giving their beloved the best Valentine’s Day gift. While that is certainly a noble thought, it is no excuse to loosen one’s guard because you can be sure that cybercriminals won’t. As you celebrate this Valentine’s Day, here are a few tactics to be careful about:

Fraudulent Emails

This tactic relies on human infallibility and can be even more effective on such special occasions. Users may receive an email or an e-greeting from a suspicious source. To view the card, they will be asked to click on a particular link. Clicking on that link can download malware which can have devastating effects on the computer and the network. The computer may get compromised and become part of a Botnet. The only solution to this is to be careful and not get carried away: the mysterious Valentine at the other end of the mail thread is probably a cyber criminal.

Malicious apps that take advantage of the celebrations

Cybercriminals will often create malicious apps that will be close or almost identical to popular dating apps like Tinder. Users can often get fooled by these and download these to their systems, mistaking them for the real one. Once downloaded, these malicious apps can cause havoc by accessing and transferring the personal information of users. A strong mobile antivirus is a must, but organizations must also educate employees about the dangers lurking on App Stories and how to identify fakes.

Special offers that turn out to be a scam

This tactic tries to take advantage of internet shopping. Users may come across banners or emails offering great Valentine’s Day deals which are too hard to believe. They may offer some unbelievable prices or some special items. In a hurry to buy gifts, users may often get attracted to these offers and browse these websites which is a very risky move. Just accessing these websites could open the network to malicious Trojans or other types of malicious software. If users input their key details like financial information or personal address, this could even lead to identity theft.

Hacking dating apps

It’s pretty obvious. Usage of dating apps peak during Valentine’s month and it’s not hard to understand why as most users seek to find a soulmate at this time of love. But cybercriminals are in the game as well and dating apps provide a great opportunity. Apart from the usually fraudulent ones created just to garner information for unknowing targets, a study in 2016 discovered that some of the most popular dating apps are severely lacking in security and can be easily hacked. Users should be very careful about the data they put in dating apps when creating profiles on these platforms and remember that they could always be misused.

While candles and teddy bears have been trademark Valentine’s Day presents, a great gift this year would be to bolster your personal as well as enterprise security by implementing a robust security solution.

 Previous PostMachine Learning: How close we are in Defeating Online Payment Fr...
Next Post  Diving deep into the Business Email Compromise
Ankita Ashesh
About Ankita Ashesh

...

Articles by Ankita Ashesh »

Related Posts

  • Gorgon APT fractures India’s Industrial Backbone

    Gorgon APT targeting MSME sector in India

    August 10, 2020
  • Way Out of The MAZE: A Quick Guide For Defending Against Maze Ransomware

    May 21, 2020
  • The-need-for-businesses-to-empower-the-CISO

    Why do boards need to empower their CISO?

    October 22, 2019

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • Turn the Page: Cybersecurity Predictions for 2021 & beyond Turn the Page: Cybersecurity Predictions for 2021 & beyond February 18, 2021
  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.