Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Sequoia invests in Anthropic, breaking taboo on VCs backing rivals: FT

January 18, 2026

Supreme Court hacker posts stolen government data on Instagram

January 16, 2026

A hacking campaign targeting prominent Gmail and WhatsApp users across the Middle East

January 16, 2026
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Google brings Pixel 6 and new devices to Material3 Expressive, along with other features, to the Pixel 6 and new devices

    September 3, 2025

    Google's NoteBookLM now allows you to customize the tone of your AI podcasts

    September 3, 2025

    Roblox expands the use of age estimation techniques and introduces standardized assessments

    September 3, 2025

    Instagram finally launches the iPad app

    September 3, 2025

    Complete the 2025 Confusion Builder Stage Agenda with the Maximum Scaling Voice

    September 3, 2025
  • Crypto

    Bitfinex hacker Ilya Lichtenstein appreciates President Trump's early release

    January 3, 2026

    According to data, hackers stole over $2.7 billion in cryptocurrencies in 2025

    December 23, 2025

    Coinbase resumes user onboarding in India, plans to introduce fiat currency next year

    December 7, 2025

    New report examines how David Sachs benefits from Trump administration role

    November 30, 2025

    Why Benchmark made a rare crypto bet on trading app Fomo with $17 million Series A

    November 6, 2025
  • Security

    Supreme Court hacker posts stolen government data on Instagram

    January 16, 2026

    A hacking campaign targeting prominent Gmail and WhatsApp users across the Middle East

    January 16, 2026

    Iran's internet shutdown becomes longest in history as protests continue

    January 15, 2026

    Billion-scale AI security issues that enterprises cannot ignore

    January 14, 2026

    AI security company DepthFirst announces $40 million Series A

    January 14, 2026
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Sequoia invests in Anthropic, breaking taboo on VCs backing rivals: FT

    January 18, 2026

    Tiger Global loses Indian tax case related to Walmart-Flipkart deal, dealing blow to offshore strategy

    January 15, 2026

    Blackstone, General Atlantic-backed Liftoff Mobile IPO Files

    January 14, 2026

    Why venture capitalists think consumer AI isn't living up to the hype

    January 13, 2026

    Superorganism raises $25 million to support biodiversity startups

    January 13, 2026
TechBrunchTechBrunch

How to protect your startup from email scams

TechBrunchBy TechBrunchJuly 13, 20244 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Despite years of claims that the “death of email” is fast approaching, this decades-old method of communication still thrives in business – especially in the hacking business.

Emails that appear legitimate but contain malicious links are one of the most dangerous yet effective methods used by cybercriminals and have led to some of the biggest hacks in recent years, including the breach of telecommunications giant Twilio in 2022 and the hack of social media platform Reddit last year.

Sometimes these emails are easy to spot thanks to spelling mistakes or unusual email addresses, but as hackers become more sophisticated, it is becoming increasingly difficult to distinguish fraudulent emails from legitimate ones.

For example, Business Email Compromise (BEC) is a type of email-based attack that targets organizations large and small with the goal of stealing money, sensitive information, or both. In this type of scam, hackers impersonate or compromise someone close to the victim, such as a colleague, boss, or business partner, in order to trick them into unwittingly disclosing confidential information.

The risk this poses to businesses, especially startups, cannot be overstated: US individuals lost nearly $3 billion to BEC scams last year alone, according to the latest data from the FBI, and these attacks show no signs of slowing.

How to spot a business email compromise

Watch out for warning signs

Cybercriminals are getting more and more sophisticated in their email sending methods, but there are some simple warning signs to look out for: emails sent outside of normal business hours, misspelled names, mismatched sender and reply-to addresses, unusual links or attachments, and an unnecessary sense of urgency.

Contact the sender directly

Spear phishing (where hackers use personalized phishing emails to impersonate a senior executive within a company or an outside vendor) makes it nearly impossible to determine if the message came from a trusted source. If an email seems out of the ordinary (or looks unusual), contact the sender directly to verify the request rather than replying to the email or any phone number provided in the email.

Check with your IT person

Tech support scams are becoming more and more common. In 2022, Okta customers were targeted by a highly sophisticated scam in which attackers sent employees text messages with links to phishing sites that mimicked the look and feel of their employer's Okta login page. These login pages were so authentic that over 10,000 people submitted their work credentials. IT departments are unlikely to contact you via SMS, so if you suddenly receive random text messages or unexpected pop-up notifications on your device, it's important to check if they're legitimate.

Be (even) more careful with your phone

Cybercriminals have long used email as a weapon of choice. More recently, they have been using scam phone calls to hack into organizations. Last year, hotel chain MGM Resorts was reportedly hacked after a single phone call, with hackers tricking the company's service desk into granting them access to employee accounts. Always be suspicious of unexpected calls, even if they appear to be from legitimate contacts, and never share sensitive information over the phone.

Multi-factor everything!

Multi-factor authentication, which typically requires you to log in with a regulatory username and password in addition to a code, PIN, or fingerprint, is by no means foolproof. But adding an extra layer of security to easily hacked passwords makes it much harder for cybercriminals to access your email accounts. Deploying passwordless technologies such as hardware security keys and passkeys can add another layer of security to prevent information-stealing malware from stealing your passwords and session tokens.

Implementing stricter payment processes

In any type of cyberattack, the criminal's ultimate goal is to get money, and a successful BEC scam often relies on manipulating a single employee into making a wire transfer. Some financially motivated hackers will pose as a vendor and request payment for services they performed for your company. To reduce the risk of falling victim to this type of email scam, implement strict payment processes. Create payment authorization protocols, require employees to confirm transfers through alternative communication methods, and instruct your finance team to double-check any changed bank account details.

You can also ignore

Ultimately, your risk of falling victim to most BEC scams can be minimized by simply ignoring the attempt and moving on. If you're not sure if your boss really wants you to buy $500 worth of gift cards, ignore them. If you get an unexpected call, hang up. But for the sake of your security team and your colleagues, don't stay silent. Report the attempt to your workplace or IT department and be vigilant.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Supreme Court hacker posts stolen government data on Instagram

January 16, 2026

A hacking campaign targeting prominent Gmail and WhatsApp users across the Middle East

January 16, 2026

Iran's internet shutdown becomes longest in history as protests continue

January 15, 2026

Billion-scale AI security issues that enterprises cannot ignore

January 14, 2026

AI security company DepthFirst announces $40 million Series A

January 14, 2026

US freight technology company puts its shipping system and customer data on the web

January 14, 2026

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Sequoia invests in Anthropic, breaking taboo on VCs backing rivals: FT

January 18, 2026

Supreme Court hacker posts stolen government data on Instagram

January 16, 2026

A hacking campaign targeting prominent Gmail and WhatsApp users across the Middle East

January 16, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2026 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.