Top Tips for Avoiding Phishing and Email Scams

Email scams and phishing attacks are among the most common cybersecurity threats facing businesses and individuals today. These deceptive messages are designed to trick you into clicking on malicious links, revealing sensitive information, or even wiring money. Fortunately, you don’t have to fall for them—if you know what to look for.

Here are some practical tips to help you identify and avoid phishing emails:


📌 1. Check the Sender’s Email Address

Always inspect the sender’s email address closely. Scammers often spoof addresses that look legitimate at a glance. For example, support@paypa1.com (with a number “1”) instead of support@paypal.com.


📌 2. Hover Over Links Before Clicking

Before you click on any link, hover your mouse over it to preview the URL. If it looks suspicious, contains strange domain names, or doesn’t match the brand it claims to be from—don’t click.


📌 3. Watch for Urgent or Threatening Language

Phishing emails often try to scare you into acting quickly with lines like:

  • “Your account has been suspended.”

  • “You must act now to avoid penalties.”

Take a deep breath—scammers use urgency as a tactic. Legitimate organizations don’t pressure you this way.


📌 4. Be Wary of Attachments

Never open unexpected attachments, especially from unknown senders. They may contain malware or ransomware. Common dangerous file types include .exe, .zip, and .scr.


📌 5. Don’t Share Personal Information

Legitimate companies will never ask you for passwords, Social Security numbers, or credit card details via email. If you’re unsure, contact the company directly using official channels.  Don’t use contact methods in the email as they may have been altered.


📌 6. Use Multi-Factor Authentication (MFA)

Enabling MFA adds an extra layer of protection—even if a scammer does get your password, they won’t be able to access your accounts without your second factor (like an app code or SMS confirmation).


📌 7. Educate Your Team

If you run a business, provide regular phishing awareness training for your employees. Simulated phishing tests are an excellent way to practice identifying suspicious emails in a safe environment.


📌 8. Use Email Protection Tools

Deploy advanced email filtering solutions like Microsoft Defender for Office 365 or SentinelOne to scan incoming messages and stop threats before they reach your inbox.


📌 9. Report Suspicious Emails

If you receive a phishing attempt, report it to your IT department or email provider. In Outlook, you can use the “Report Phishing” button to alert Microsoft directly.


📌 10. Stay Updated

Cybercriminals are always evolving. Stay informed about the latest phishing techniques by following trusted cybersecurity blogs or subscribing to threat intelligence updates from your IT provider.


Final Thoughts

Phishing scams aren’t going away anytime soon—but with a little caution and the right tools in place, you can avoid falling victim. At TMD Technology , we help businesses stay secure with phishing simulations, email protection services, and ongoing training. Need help securing your inbox? Call us today 561-404-9251.

HOW TO SPOT A PHISHY EMAIL

Security threats come in various forms and from many different directions. You’ve probably heard of viruses, trojans, keyloggers and ransomware. Want to know what many of these threats have in common? They can all be the result of phishing attacks.

Bad actors use bait – usually in the form of a seemingly legitimate email, file attachment or link — to “phish” for victims. These emails can be incredibly hard to tell as they often mimic legitimate emails that you receive on a regular basis.  Because this bait is usually spread via email, it’s hard for security software to filter out. That’s what makes it so scary.

Even if you have security software, phishing is a serious threat, one that can expose you to ransomware. Here's how to avoid these dangerous emails.

Top Scary Computer Hacks That Could Affect YOUR Business This October

Top Scary Computer Hacks That Could Affect YOUR Business This October: 2018 Edition

2017 was a terrible year for the digital world and 2018 ain’t no better. Think your computer is safe from potential hackers? You’re wrong. Ghouls and witches aren’t the only scary thing this October! Vicious Ransomware, Malware, and Viruses are on the loose, and if not taken seriously, could dangerously affect your computer.

1) Gandcrab Ransomware

Gancrab was first discovered January of this year. This pesky bug encrypted users’ files and extorted a ransom in Cryptocurrency (DASH In particular).

Soon, Gancrab v1 was stopped in its tracks at the end of February. A decryptor was created and distributed online. Letting victims re-obtain their files without having to deal with the ransom.

Within one week (March), Gancrab v2 was released in the digital world. Tougher than it’s sibling before. Evolved from ransoming Crypto to attaching itself to personal Email.

Gancrab v3 got personal and changed it’s victim’s desktop wallpaper to a ransom note:

“We are sorry, but your files have been encrypted!

 Don’t Worry, we can help you to return all your files!

Files Decryptor’s Price Is $900 USD

 If Payment isn’t made until (date) the cost of decrypting files will be doubled”

Scary hu? What a way to put pressure on the victim!

Last but not least, Gancrab v4 was created soon after, and unfortunately armed with an abundance of updates, including a brand-new encryption algorithm. Using a microscopic algorithm (TEA) to be undetected, unless you REALLY look or have a program looking out for it specifically, Gancrab v4 is a vicious little bug.

Furthermore all encryptions have .KRAB instead of CRAB. They changed the way the ransomware attack its victims. Now spreading through fake software crack sites, once a user downloads and run a fake “stuffing” crack, the ransomware is then attached to the computer like a leech!

When you finally run this file, your computer is in Gancrab’s clutches.

Steps Gancrab v4 Goes For The Kill:

  •  Using fast (TEA) encryption algorithm to avoid detection, it creates itself a plain file.
  • Once the decryption is complete, Gancrab v4 wastes no time and drop a nasty virus.
  • Checks the list of the following processes obtaining CreateToolhelp32Snapshot API and terminate running programs.
  • Stops any antivirus programs from running.
  • Starts to encrypt victim’s files then delivers a ransom note on the user’s desktop.

How to prevent Gancrab Ransomware:

Computer Support

2) Trojan Glupteba

Not as severe as Gancrab, but this bug is one of the most annoying ones. There are so many variants of Trojan Glupteba, there’s too many to count. We’ll be here all day if we do. So many functionalities this bug entails, its insane.

How can Trojan Glupteba infect your computer? EASY, this bad boy can sneak into your computer data with ease using a file dropped by other malware. It gets away with it too, by pretending to be an authentic software.

Communicating with the user’s IP address, Glupteba gets to know the user pretty well. (whether the user likes it or not). It diverts the traffic towards unknown domains.

If You Have This Happening To You, Contact a Managed IT Service Immediately: Professional Virus Removal

It’s suspicious when you try to visit Facebook but somehow you end up in ostdownload.xyz or sportpics.xyzkinosport.top instead.

How To Prevent Trojan Glupteba:

  • Enable Web and Email filters
  • Browse Safely
  • Regularly Update Your Antivirus Program (Hire an IT professional for a Virus Removal Service)

3) Kuik Adware

Kuik is a simple yet annoying piece of Adware. Some of the worst bugs we’re facing this year. This pesky guy takes the form of a malware & adware. It pretends to be the actual Adobe Flash Player “update”.

Of course when someone notice their Flash Player needing an update, some people don’t think twice and fall victim to Kuik Adware’s clutches.

This obnoxious adware is equip with legimite flash player modules, .exe file named ‘upp.exe’. Once in your computer’s system, it communicates with all established network interface and adds a DNS: 18.219.162.248

Of course, like all the others, starts to collect the user’s data. Then forwards it to it’s hosting domain, kuikdelivery.com.

As soon as the domain reaches the server, it’s game over. It then activates malicious tasks on the system (including Chrome Extension) from unknown sources, crypto miners, etc. etc.

How To Prevent Kuik Adware:

  • Regularly Backup Important Data & Files
  • Update Your Antivirus & Spyware Programs
  • Block Any Spam Email with File Types: exe / pif / url / vb/ vbe/ com/ reg / cer / pst / cmd / bat / dll / dat / hta / js / wsf

4) Magniber Ransomware

Magniber is another vicious ransomware coming your way! Well… mostly in Asia, however, stay on your toes with this one! To be unlucky as to fall victim to Magniber is bad news. Don’t think less about this bug only cause it’s mostly affecting people in Asia, it’s slowly making its way over and the numbers are skyrocketing.

This unique Ransomware is spread through malvertisements.

What’s a Malvertisement? Infected web pages that redirects the user to a Magnitude Exploit kit website. Fun fact, it’s the eldest of most malicious browser toolkits that’s surprisingly still in use today to distribute ransomware. Go figure.

As soon as Magniber Ransomware James Bond’s it’s way into the user’s system, it immediately starts encrypting data. It uses a unique key to crack into your system obtaining what it needs to add further damage.

Once encrypted, it adds .dyaaghemy extension to all the files encrypted.

Towards the bottom on the files, you’ll find a file labeled, “Read Me”. There you’ll find the terrifying ransom note unique to each victim:

“Your documents, photos, database, and other important files have been encrypted!

Warning: Any attempts to restore your files with the 3rd party software will be fatal to your files. WARNING

To decrypt your software you need to buy the special software – “My Decryptor”

All transactions should be performed via Bitcoin network.

Within 5 days you can purchase this product at a special price: BTC 0.35

After 5 days the price of this product will increase up to BTC 0.700”

Creepy right?

The encrypted files are bugged with a unique key. Surprisingly, no patterns visible at first glance. This ransomware is scary as is, however it continues to grow and expand. It’s a major issue in Asia, but, it’s making its way to the US. It’s best to stay on your toes!

If you’re a business experiencing activity like this contact a professional immediately. A Business It Support is something your business need to stay safe as well as stay protected from future danger your computer might undergo.

How To Prevent Magniber Ransomware:

Regularly storing files in a cloud backup is ideal and the perfect backup plan for worse case scenarios. If you have valuable information that needs to be protected by all means, hire a professional managed IT service.

If you’re a business owner, it’s worth while to look into a Server Management service.

5) Thanatos Ransomware

Newer than its counterpart Gancrab, this guy is making its way through the tech world with ease. Remember the ILOVEYOU computer virus some time ago? Very similar.

Some of the most difficult ransomware to decrypt in 2018. It creates a randomly generated key every time for encryption. Which makes this malware hard to catch, and recover.

Soon after, it drops a payload (a.k.a. The all famous ransom note) in the user’s system in the form of the hacker’s favorite: .exe file or .txt file

Which is then set for auto run and opens every time the system is restarted. Thanatos Ransomware will start adding “.thanatos” extensions to infect your files. Soon enough, the user will receive a ransom note on it’s system.

How To Prevent Thanatos Ransomware:

  • Disable macros & Activex when using MS Office products
  • Backup your files & data regularly
  • Update your operating systems & applications

Whether it’s a business computer or a personal computer, running into malicious malware, ransomware or computer virus isn’t on anyone’s to-do list.

When you’ve done all you can, updating your pc’s operating system, updated your current antivirus program, avoid anything suspicious and somehow still fell victim, don’t be ashamed! This could happen to anyone. These malware are designed to trick even the most careful of users.

You won’t be the first victim, nor be the last! Hiring professional Managed IT Service might be something you need this October. It’s towards the end of the year, which is every hacker’s favorite season, right around the holidays.

Keep your PC and business computer safe from malware / ransomware with an antivirus and malware protection plan.

A Virus Removal service will be taken care of by a professional who seen this issue before and will know what to do right away to help save your computer from current / potential danger it might undergo.

IRS Reports Surge in Email, Phishing and Malware Schemes

The IRS has issued several alerts about the fraudulent use of the IRS name or logo by scammers trying to gain access to consumers’ financial information in order to steal their identity and assets. Scammers use the regular mail, telephone, fax or email to set up their victims. When identity theft takes place over the web (email), it is called phishing.

The IRS saw an approximate 400 percent surge in phishing and malware incidents in the 2016 tax season.

Scam emails are designed to trick taxpayers into thinking these are official communications from the IRS or others in the tax industry, including tax software companies. These phishing schemes can ask taxpayers about a wide range of topics. Emails can seek information related to refunds, filing status, confirming personal information, ordering transcripts and verifying PIN information.

Variations of these scams can be seen via text messages, and the communications are being reported in every section of the country. The IRS is aware of email phishing scams that appear to be from the IRS and include a link to a bogus web site intended to mirror the official IRS web site. These emails contain the direction “you are to update your IRS e-file immediately.” The emails mention USA.gov and IRSgov (without a dot between “IRS” and “gov”), though notably, not IRS.gov (with a dot). These emails are not from the IRS.

The sites ask for Social Security numbers and other personal information, which could be used to help file false tax returns. The sites also may carry malware, which can infect people’s computers and allow criminals to access your files or track your keystrokes to gain information.

For more details, see:

The IRS does not initiate taxpayer communications through email. Unsolicited email claiming to be from the IRS, or from an IRS-related component such as EFTPS, should be reported to the IRS at phishing@irs.gov.

For more information, visit the IRS’s Report Phishing web page.

Beware – Microsoft Security Email Scam

OK, so you got an email from “Microsoft” and it reads something like Microsoft Security info We’ve discovered series of attempts on your mail account from new IP locations. This is for your own safety to continue using your account, click the button below.

Without spending more than a few seconds you can see this came from a gmail account and also had grammar issues.  These are quick identifiers to show they are not legit.  Microsoft would never send you a message from gmail.  There are also other clues… if you hover over the “Verify My Account” link without clicking it revels a URL to a foreign server not a Microsoft domain.

Although this type of Phishing is nothing new, we have had a surge in inquiries regarding these messages.  Microsoft will not send you any email like this asking you to logon or provide credentials.  You should always type in the URL manually or use a bookmark and never click a link in an email message you are not sure of.

Refer back to our 8 Ways to protect yourself from Viruses and Malware article for additional information on avoiding malware.