Loading...

20 Mar 2026 06:55

Mobile & Digital

Cisco Talos Reveals Top Cybercrime Tactics and Tips for Safe Online Engagement This Holiday Season

As shoppers face short supplies and shipping delays, the final days of the holiday season can often be the most dangerous. In an effort to purchase gifts in time, many consumers are willing to compromise and interact with untrusted sources.

With experience in identifying and analyzing the entire cyberthreat landscape, Cisco Talos shares its advice for consumers to stay secure during the remainder of the festive period and beyond.

Common Tactics by Cybercriminals and Recommendations from Cisco Talos

Emails, URLs and Pop-ups

Internet users should avoid clicking on links in unsolicited emails, considering whether they previously subscribed to any marketing emails from retailers before opening them. Many cybercriminals masquerade themselves via emails seeming to come from common local and international retailers. Users should watch out for different use of language, hover over the sender to read the full email address and manually type the website name into a browser rather than just clicking a link.

As a standard practice, ad blockers should be installed on any Internet browser across all devices. These will help deflect malware advertising campaigns which aim to capitalize on shoppers looking for deals.

Promotions, Giveaways and Acting on Impulse

Phishing scams via email typically advertise a brand name and merchandise, offering unheard of, bargain prices. In some cases, they sell counterfeit goods, while in others, the consequences can be more serious.

Cybercriminals prey on people looking for a good deal during the festive season, often promoting ‘one-day only’ and ‘last minute’ sales. Fraudsters use this approach to encourage browsers to act impulsively, so as to not miss out on an opportunity. Increasingly, this tactic is also being deployed via social media advertisements.

Users may also receive emails and direct messages regarding giveaways and contests they never entered, but are now somehow the winner of. Internet users must always evaluate the likelihood of a situation, and whether there is potential that they are being led astray.

Popular Applications

Some malicious apps will try to masquerade as a legitimate version of the one that the user is searching for. Signs of these apps include poor spelling and grammar in app descriptions and interfaces, lack of high-quality performance and a developer contact that uses a free email service (such as @gmail.com).

Users should only download apps from trusted and official app stores like the Google Play store and iOS App Store. They should also look out for apps which ask for suspicious permissions, such as access to text messages, contacts, stored passwords and administrative features.

Additional Layers of Protections

Where possible, users should try to use payment services such as Google Pay, Samsung Pay and Apple Pay. These services use tokenization instead of the “Primary Account Number” (credit card number), making transactions more secure.

Although seemingly obvious, users must also deploy complex passwords that are unique, per site. In many instances, the same passwords are used across multiple platforms – increasing the likelihood of cyberthreats. Attackers commonly reuse passwords to compromise multiple accounts with the same username.

Consumers can also benefit from utilizing multi-factor authentication tools, such as Cisco Duo, to log into their email accounts securely and avoid unauthorized access.

NULL
(Visited 7 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandAWSBETkincir88ABC1131ABC1131 LOGINhttps://abc1131.hartanzah.com/aws infrastruktur server mahjongways stabilaws tren rtp mahjongways strategiaws atensi pembaca mahjongways statistikaws stratifikasi statistik mahjongways3aws dinamika struktur mahjongways2 observasideskripsi perilaku rise of giza platform digitalnavigasi keberhasilan caishen wins game viralregulasi ritme ganesha fortune sesi digitalkarakteristik fase awal double fortune navigasiimplementasi taktik leprechaun riches 95 persenpeta industri genies wishes analisis algoritmaaws fluktuasi rtp mahjong komunitasaws grid bergerak mahjongways2 observasiaws kombinasi simbol mahjongways panduanaws transisi warna scatter mahjongways2aws variasi hasil mahjong wins3aws fraktal heuristik mahjongways3 dataaws pengalaman scatter mahjongwins3 dinamisaws pengelolaan saldo mahjongways2 terencanaaws struktur simbol scatter mahjongwins3aws unit presisi mahjongwins3 stabilitasaws eksplorasi tren game modernaws fokus emosi mahjongways2 strategiaws manajemen waktu mahjongways2 sesiaws mekanika mahjongways2 sistemik rtpaws visual data mahjongways trenkombinasi strategi dan taktik mahjong wild deluxe dadu sicbo gates of olympus untuk optimalkan rtp live perihokicara cerdas menggunakan strategi pola dan teknik mahjong ways 2 pgsoft baccarat starlight princess perihokianalisa pro pola dan strategi mahjong wins 3 pragmatic blackjack sweet bonanza untuk pemain serius perihokimetode cerdas analisa pola mahjong ways 2 pgsoft roulette dan wild bounty showdown perihokiteknik efektif analisa dan teknik mahjong wins 3 pragmatic blackjack sugar rush sv388 raih peluang terbaik perihokipanduan pro teknik dan pola mahjong wild deluxe dadu sicbo gates of olympus paling mudah jepe duta76analisa pola dan teknik mahjong ways 2 pgsoft baccarat starlight princess optimalkan rtp live duta76kombinasi peluang pola dan teknik mahjong wins 3 pragmatic blackjack sweet bonanza untuk kemenangan duta76formula analisa pro mahjong ways 2 pgsoft roulette dan wild west gold untuk raih jackpot duta76taktik rahasia dan teknik pro mahjong wins 3 pragmatic blackjack sbobet88 sv388 untuk maksimalkan kemenangan duta76arah permainan mahjong fokus pemain mulaimahjong memanfaatkan arah perkalian luasmahjong mengalir tenang perlahan scatterputaran datar menipu mahjong wins scattersaat permainan aman mahjong memberi ruangdisaat perhatian pemain mahjong ways agresifscatter hitam datang tiba mahjong transisifokus permainan banyak arah mahjong waysmahjong wins wajah tenang scatter hitamtanpa gejolak mahjong mengizinkan scattermengkaji cognitive load pemain mahjong wild deluxe di balik setiap keputusan dadu sicbo gates of olympus perihokifenomena baru yang membuat mahjong ways 2 pgsoft kembali muncul dalam percakapan pembaca online baccarat starlight princess perihokicara menang mahjong wins 3 pragmatic berdasarkan analisis data scatter player blackjack sweet bonanza perihokimahjong ways 2 pgsoft perihoki telah memperlihatkan akselerasi free spin yang tidak umum roulette wild west gold perihokirahasia pola scatter mahjong wins 3 pragmatic rtp live terakurat blackjack wild bandito sv388 perihokianalisis terbaru mahjong wild deluxe tentang pola bermain dan strategi spin yang ramai dibahas komunitas slot online baccarat starlight princess duta76dekonstruksi isyarat animasi mikro mahjong ways 2 pgsoft dalam momen symbol drift anomaly baccarat starlight princess duta76observasi slot mahjong 3 pragmatic dari catatan aktivitas player blackjack sweet bonanza duta76strategi mudah menang mahjong ways 2 pgsoft dari data rtp real time roulette wild bounty showdownanalisis data mahjong wins 3 pragmatic berdasarkan frekuensi scatter game blackjack sugar rush sv388 duta76aws rtp pgsoft pragmatic mahjongaws super scatter vs hitamaws transformasi modal receh naga emasaws waktu malam rtp tertinggiaws wild bandito pgsoft teratasaws data variable mahjong ways2aws lucky neko malam teratasaws mahjong wins3 profit optimalaws momentum pinata wins scatteraws waktu emas starlight pola Top