iVenture : 20 Years of Business Friendly IT

COVID-19 Isn’t The Only Virus To Avoid

As COVID-19 spreads so does panic, fear and fraud. The internet is now a minefield of coronavirus misinformation and malware. How can you protect yourself? The best protection is education.

As COVID-19 spreads so does panic, fear and fraud. The internet is now a minefield of coronavirus misinformation and malware. How can you protect yourself?

The best protection is education (along with a robust anti-virus software).

Learn what tricks hackers are using so you can identify them and avoid falling prey.

1.University Email Scam

Attackers used student concerns about COVID-19 to steal information via email.

Coming from the university “health team”, attackers designed emails to look university-official. These emails prompted students to click a fake URL. Once clicked, students were asked for their log-in credentials.

If inputted, hackers gained access to everything the students used with those credentials.

2.Text Message Virus

Sent through text, a fake coronavirus tracker unleashes malware without you knowing.

There are plenty of fake text chains going around. One recently about a government friend with insider knowledge.

This particular malware disguises itself as a coronavirus heat map (spoofing off the actual John Hopkins one). Once downloaded, hackers can read your text messages, watch you through your camera and listen to calls.

3.WHO Imposters

WHO imposters are scamming people out of money and PII (personally identifiable information).

The World Health Organization (WHO) had to address the rise of imposters. The bad players are using fake emails, phone calls, texts and even faxes to trick you.

4.RAT Malware Attachments

A phishing campaign disguised as a helpful guide reads your keystrokes instead.

This malware hides behind email attachments marked “coronavirus safety guides”. Once the attachments are clicked, malware begins reading your key strokes and sending the information to a database.

Hackers then use the information to infiltrate your accounts.

5.Coronavirus Credit Card

People looking for debt relief fall victim to a credit card scam instead.

With many people facing reduced work hours or even unemployment, credit card relief programs are a godsend. 

This scam sets up a fake landing page advertising just that. The fake landing page looks like a real financial institution. All you have to do is input your credit card information and they’ll take care of the rest. 

Not so fast. Once they’ve got your information, you’re left in the dust. Your bills remain and now your credit card is stolen.

These COVID-19 tricks are just a handful of what’s out there. To really protect yourself, someone’s got to have your back. We specialize in security measures to monitor and defend against anything on the internet.

Make internet viruses one less thing to worry about.

iVenture Solutions is an award-winning managed service provider delivering superior IT solutions to clients across Florida.

As a leading-edge IT firm for small and medium-sized businesses, we provide a diverse range of services covering the entire scope of IT including maintenance, support, hosting and more.

Through rapid response time, reduction of chaos and the right people, our expert team of IT professionals will fulfill your technology needs. At iVenture, we give you more time to do what matters most.

New call-to-action

Back to Blog

Recommended For You

Latest Article

PRESS RELEASE: iVenture Solutions Forms Strategic Partnership With Gwanda

Gwanda clients will get more in-depth services and iVenture will add 22 experienced IT professionals as the two Florida IT service and solution firms form strategic partnership.

Cybersecurity Threats: Make Hackers Hate The Holidays

December is high-risk for cybersecurity threats. Too many businesses leave the office with no cyber defense in place. Here’s what to do.

Are You A Risky User?

Managed Security Services: Are You A Risky User?

Is your Microsoft Office 365 account compromised? Find out if you or your team are risky users. And what your IT provider should do about it.

Am I Still At Risk? 20 Recommended Cybersecurity & Risk Management Services

While businesses adjust to this new normal, cybersecurity has taken a backseat. It’s time to get back on track. Here’s 20 recommended cybersecurity and risk management services.