{"id":878,"date":"2022-07-19T11:38:52","date_gmt":"2022-07-19T11:38:52","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=878"},"modified":"2022-07-19T11:38:52","modified_gmt":"2022-07-19T11:38:52","slug":"the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/","title":{"rendered":"The Nigerian Prince has evolved: email scams now even fool cybersecurity experts"},"content":{"rendered":"<p>We all like to think we\u2019re immune to scams. We scoff at emails from an unknown sender offering us \u00a32 million, in exchange for our bank details. But the game has changed and con artists have developed new, chilling tactics. They are taking the personal approach and scouring the internet for all the details they can find about us.<\/p>\n<p>Scammers are getting so good at it that even\u00a0<a href=\"https:\/\/thenextweb.com\/topic\/cybersecurity\" target=\"_blank\" rel=\"noopener\">cybersecurity<\/a>\u00a0experts are taken in.<\/p>\n<p>One of us (Oliver Buckley) recalls that in 2018 he received an email from the pro-vice chancellor of his university.<\/p>\n<blockquote><p>This is it, I thought. I\u2019m finally getting recognition from the people at the top. Something wasn\u2019t right, though. Why was the pro-vice chancellor using his Gmail address? I asked how I could meet. He needed me to buy \u00a3800 worth of iTunes gift cards for him, and all I needed to do was scratch off the back and send him the code. Not wanting to let him down, I offered to pop down to his PA\u2019s office and lend him the \u00a35 note I had in my wallet. But I never heard back from him.<\/p><\/blockquote>\n<div class=\"inarticle-wrapper channel-cta\">\n<div class=\"ica-text\">\n<h4>Thanks for joining us!<\/h4>\n<p>See the highlights of TNW Conference 2022<\/p>\n<\/div>\n<div class=\"ica-button\"><a class=\"c-button c-button--primary\" href=\"https:\/\/www.thenextweb.com\/conference\/highlights\" target=\"_blank\" rel=\"noopener\" data-event-category=\"Article\" data-event-action=\"In Article Block\" data-event-label=\"Check the video\">Check the video<\/a><\/div>\n<\/div>\n<p>The infamous \u201c<a href=\"https:\/\/bettermarketing.pub\/who-are-all-these-nigerian-princes-97a21a63345c?gi=85c107c60695\" target=\"_blank\" rel=\"nofollow noopener\">prince of Nigeria<\/a>\u201d emails are falling out of fashion. Instead, scammers are scouring\u00a0<a href=\"https:\/\/thenextweb.com\/topic\/social-media\" target=\"_blank\" rel=\"noopener\">social media,<\/a>\u00a0especially business-related ones like LinkedIn, to target people with tailored messages. The strength of a relationship between two people can be measured by inspecting their posts and comments to each other. In the\u00a0<a href=\"https:\/\/www.linkedin.com\/pulse\/phishing-linkedin-accounts-jumped-1st-quarter-2022-don-smith\" target=\"_blank\" rel=\"nofollow noopener\">first quarter of 2022<\/a>, LinkedIn accounted for 52% of all phishing scams globally.<\/p>\n<h2>Human tendencies<\/h2>\n<p>Psychologists who research\u00a0<a href=\"https:\/\/thehrlandscape.com.au\/obedience-to-authority-a-workplace-study\/\" target=\"_blank\" rel=\"nofollow noopener\">obedience to authority<\/a>\u00a0know we are more likely to respond to requests from people higher up in our social and professional hierarchies. And fraudsters know it too.<\/p>\n<p>Scammers don\u2019t need to spend much time researching corporate structures. \u201cI\u2019m at the conference and my phone ran out of credit. Can you ask XXX to send me report XXX?\u201d runs a typical scam message.<\/p>\n<p>Data from\u00a0<a href=\"https:\/\/transparencyreport.google.com\/safe-browsing\/overview?unsafe=dataset:1;series:malware,phishing;start:1579219200000;end:1611791999999&amp;lu=unsafe\" target=\"_blank\" rel=\"nofollow noopener\">Google Safe Browsing<\/a>\u00a0shows there are now nearly 75 times as many phishing sites as there are malware sites on the internet.\u00a0<a href=\"https:\/\/terranovasecurity.com\/2020-gpt-report\/?utm_campaign=En_GPTReport2020&amp;utm_medium=Google&amp;utm_source=Ads&amp;utm_content=NewAd3&amp;gclid=CjwKCAjw6fCCBhBNEiwAem5SO8oIgjFVtVzMA5pg-uSkRAho6S356pspA4bY3FBFk9FXCKW0Ksq-ExoCsHEQAvD_BwE\" target=\"_blank\" rel=\"nofollow noopener\">Almost 20%<\/a>\u00a0of all employees are likely to click on phishing email links, and, of those, a staggering 68% go on to enter their credentials on a phishing website.<\/p>\n<p><a href=\"https:\/\/dataprot.net\/statistics\/spam-statistics\/\" target=\"_blank\" rel=\"nofollow noopener\">Globally<\/a>, email spam cons cost businesses nearly US$20 billion (\u00a317 billion) every year.\u00a0<a href=\"https:\/\/www.bdo.co.uk\/en-gb\/rethink\/business-issues\/strategy-operations\/has-covid-19-made-your-business-more-vulnerable-to-corporate-fraud\" target=\"_blank\" rel=\"nofollow noopener\">Business consultant and tax auditor BDO\u2019s research<\/a>\u00a0found that six out of ten mid-sized businesses in the UK were victims of fraud in 2020, suffering average losses of \u00a3245,000.<\/p>\n<p><a href=\"https:\/\/thenextweb.com\/news\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\">Read the Full Story Here<\/a><\/p>\n<p>Source: TNW<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We all like to think we\u2019re immune to scams. We scoff at emails from an unknown sender offering us \u00a32 million, in exchange for our bank details. But the game has changed and con artists have developed new, chilling tactics. They are taking the personal approach and scouring the internet for all the details they [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":879,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-878","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Nigerian Prince has evolved: email scams now even fool cybersecurity experts - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Nigerian Prince has evolved: email scams now even fool cybersecurity experts - Community\" \/>\n<meta property=\"og:description\" content=\"We all like to think we\u2019re immune to scams. We scoff at emails from an unknown sender offering us \u00a32 million, in exchange for our bank details. But the game has changed and con artists have developed new, chilling tactics. They are taking the personal approach and scouring the internet for all the details they [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-19T11:38:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2022\/07\/pexels-anna-tarazevich-5697260.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/\",\"name\":\"The Nigerian Prince has evolved: email scams now even fool cybersecurity experts - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2022\/07\/pexels-anna-tarazevich-5697260.jpg\",\"datePublished\":\"2022-07-19T11:38:52+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2022\/07\/pexels-anna-tarazevich-5697260.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2022\/07\/pexels-anna-tarazevich-5697260.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Nigerian Prince has evolved: email scams now even fool cybersecurity experts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Nigerian Prince has evolved: email scams now even fool cybersecurity experts - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/","og_locale":"en_US","og_type":"article","og_title":"The Nigerian Prince has evolved: email scams now even fool cybersecurity experts - Community","og_description":"We all like to think we\u2019re immune to scams. We scoff at emails from an unknown sender offering us \u00a32 million, in exchange for our bank details. But the game has changed and con artists have developed new, chilling tactics. They are taking the personal approach and scouring the internet for all the details they [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2022-07-19T11:38:52+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2022\/07\/pexels-anna-tarazevich-5697260.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/","name":"The Nigerian Prince has evolved: email scams now even fool cybersecurity experts - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2022\/07\/pexels-anna-tarazevich-5697260.jpg","datePublished":"2022-07-19T11:38:52+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2022\/07\/pexels-anna-tarazevich-5697260.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2022\/07\/pexels-anna-tarazevich-5697260.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/the-nigerian-prince-has-evolved-email-scams-now-even-fool-cybersecurity-experts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"The Nigerian Prince has evolved: email scams now even fool cybersecurity experts"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=878"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/878\/revisions"}],"predecessor-version":[{"id":880,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/878\/revisions\/880"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/879"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}