Do this by showing pictures of cool things their broke asses can't afford! We need to establish authority and wealth by showing cool shit we've done. Show them how badass your life is through pictures! Now that we've identified our target audience, we can start getting them to trust us through simple manipulation. Target psychological emotion: Greed and laziness. So let's fill them up with hope, then drain their wallets of cash □ They want to bypass all that hard work, and get straight to the riches! These people are generally on the lower ends of Maslow's Hierarchy of Needs. They want the end result, without the hard work. This kind of crowd doesn't understand that success usually requires years of hard work. These are people who dream of "finding a passive income source that requires no work!"īy the time we apply some fancy copywriting and psychology to these gullible people, they'll be willingly handing over their money. These are people who think internet riches are "a push of a button away!" These are people who subscribe to the idea they "deserve" to live a good life. Make sure you focus on a hopeful yet sort-of-dumb crowd. Let's put our "Evil Hats" on and get started: Our goal here is to deeply exploit human psychology, and get the most vulnerable and needy people to fork over what little cash they have. So let's take the easy way and scam people into giving us money! You can sign up for Google’s dual factor authentication by clicking here.The real key to success is making great products and putting a lot of hard work into them. Although it does take one extra step to confirm the validity of something like a Google Doc, the effort is well worth the time. Unfortunately, two-factor identification isn’t something the average consumer uses. “With dual factor authentication, when you go to access your account a special code is sent to your cell phone if the request to access your account comes from a different computer or device that you generally use.” “Even people who fell for this scam, would be safe if they used dual factor authentication for their Gmail account, which would prevent someone who had your password from accessing your account,” Wiseman stated. Wiseman adds some Google-specific suggestions that consumers would be wise to read:īefore you click on links or download attachments, verify that the email is legitimate, regardless of where they may appear to originate from. With nearly 30 percent of everyone in the world using Google Docs on a daily basis, scammers figure that opening a Doc attachment is something that’s pretty normal for folks who work online.Ībout the only thing that is going to beat a scammer at their game is vigilance. If you’re wondering “why Google Docs,” it’s pretty simple. Scammers are resourceful and continue to leverage anything they can get their hands on into a cyber heist. “A strong indication that this email was a phishing scam was that the address from which it was sent was the email address of an individual who had no connection to Google Docs.” Vigilance continues to be keyīarely a day goes by that ConsumerAffairs doesn’t see a scam rolling across our desks. “It is important to remember that it is very simple for a scammer to include the Google logo and a logo for Norton Security (an Authorized Partner), so you can’t trust an email merely because it carries such logos,” warned Scamicide’s Steven Wiseman, Esq. It also contains this message: “this message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean.” The default verbiage in the phishing email typically says something like, “Alan sent you a Document via Google Docs Apps,” followed by a box containing the Google and Norton Security (an Authorized Partner) logos. When they do, keystroke-logging malware is installed which, in turn, can lead to identity theft or ransomware. But even worse, your contact list is also compromised, which gives the hacker a whole new pond to phish in by sending out emails that look like they’re from you Ģ) When the folks on your contact list get that email, they see a link that “you” say they should click on. If you do, you then give a hacker complete access to all your emails. It works like this:ġ) You, trusting soul that you are, get an email that asks you to click on a link to open up a Google Docs file. Photo (c) Artur - Getty ImagesA new phishing scam riding on the back of Google Docs attachments has put the world on alert.Īs reported by Scamicide, the ruse is a simple two-pronged approach, but it’s deadly.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |