Show
Business Email CompromiseBusiness email compromise (BEC)—also known as email account compromise (EAC)—is one of the most financially damaging online crimes. It exploits the fact that so many of us rely
on email to conduct business—both personal and professional. In a BEC scam, criminals send an email message that appears to come from a known source making a legitimate request, like in these examples:
Versions of these scenarios happened to real victims. All the messages were fake. And in each case, thousands—or even hundreds of thousands—of dollars were sent to criminals instead. How Criminals Carry Out BEC ScamsA scammer might:
How to ReportIf you or your company fall victim to a BEC scam, it’s important to act quickly:
How to Protect Yourself
ResourcesRelated FBI News and Multimedia
What technology is being used when you are sent an email?The message is sent over the Internet, via TCP/IP (Transmission Control Protocol/Internet Protocol).
Is an organization wide network that is closed to public access and uses internet type technology?Intranet: A company-wide network closed to public access, which uses internet-type technology is called intranet. An intranet is a private network that can only be accessed by authorized users.
Is a private network that creates secure connections over regular internet lines?A virtual private network (VPN) allows users to safely connect to another network over the internet by encrypting the connection from their device. A VPN makes an internet connection more secure and offers both privacy and anonymity online.
Is a combination of technologies that add intelligence and change how people interact with the Web?What is Web 3.0? Web 3.0 is technology that adds a level of intelligence to interacting with the Web. It could be described as the Personal Web, whereas Web 1.0 can be thought of as the Static Web and Web 2.0 as the Social Web.
|