2.5 billion Gmail users need to be vigilant and follow these things
A current phishing campaign is targeting around 2.5 billion accounts using Google's email app.
With the help of artificial intelligence (AI), these tactics are said to be particularly dangerous. The threat is dubbed DeepPhish and can create particularly convincing phishing emails that at first glance appear to be from real people users already know.
Advertisement
Advertisement
This is because AI can use a user's personal information to build trust through subject lines and targeting information. To achieve this, AI collects data from various websites and identifies potential victims. Additionally, phishing is used to mimic an email address that resembles a real request.
The Aftermath of DeepPhish
A phishing attack like DeepPhish can range from losing money and stealing identities to completely taking over a user's device and data, which can then be used to launch further hacks. AI algorithms ensure that DeepPhish learns with each new attack and thus becomes increasingly dangerous.
AI can also be used to make attacks more effective. It makes it easier for cybercriminals to send trustworthy requests to many people, thus increasing the chances of a phishing attack being successful.
How to Protect Yourself from DeepPhish
However, there are still ways to protect users from DeepPhish attacks. These include:
- Always question any unknown contacts or unexpected emails. Look for signs that someone is not who they say they are and if in doubt, contact the person directly.
- Look out for typical signs of phishing attacks like unusual requests, urgency, or contradictory statements.
- Be careful when giving out personal information. This applies not only to the person you are emailing, but also to the internet as a whole. If you regularly share information about your private life on social media, you are especially at risk.
- Use strong passwords, two-factor authentication, and passcode locks. Each step that requires additional authentication is an additional layer of protection that an attacker must overcome.
- Stay up to date with the latest security updates and keep your devices up to date. Actively exploited vulnerabilities pose an additional threat.
- Train your eyes to recognize AI-generated content. There are typical signs that can be recognized in both text and images, no matter how sophisticated the AI.
Saved post successfully
You can review saved articles on the Saved Articles page.
Agree
You should read it
- 91% of technology managers believe that AI will be the center of the next technology revolution
- [Infographic] Benefits and hazards from Artificial Intelligence
- Google artificial intelligence will redraw your image in a new, strange way, try it out
- Top 5 programming languages to develop AI
- Watching pictures painted by artificial intelligence, everyone thinks that is the work of a true artist
- Google AI application in detecting eye diseases
- Microsoft, NVIDIA, Google and many other major technology companies form the Coalition for Secure AI (CoSAI)
- Artificial intelligence learns to create another artificial intelligence, replacing people in the future
May be interested
- Instructions to recover hacked Telegram accountif you suspect that your telegram account is being logged in without permission, then quickly handle it by following the instructions below.
- Instructions for deleting groups on Telegramwhen you delete a group on telegram, you will no longer receive messages from that group. and group members will also not be able to access the group on telegram.
- How to Turn Off Copilot in Word, Excel, and PowerPointif you don't like the copilot icon displayed in the office application interface, you can turn it off, following the instructions below.
- How to fix Instagram keeps logging outinstagram keeps logging out is not an uncommon error. depending on the cause, you can fix the instagram keeps logging out error in the article below.
- How to change phone number on Facebook computer, phonethe phone number added to your facebook account can be changed when you change or lose your previous phone number. after changing, the otp verification code will be sent to the new number, convenient for facebook management and security.
- Install DeepSeek on PC, laptopdeepseek on lm studio is only suitable for users with technical knowledge who need to customize the model.