
Gmail account holders need to follow 5 rules to avoid potentially losing thousands of pounds & causing ‘weeks of stress'
The summer months are full of ice-cream, outings, staycations and holidays, but it means people are more likely have their guard down.
7
7
IT Security firm FoxTech have warned that some Brits may be at risk of potentially losing thousands of pounds.
With the rise of artificial intelligence, scammers are using more realistic ways to catch people into being scammed.
The team at the company explained: "Scammers are fully aware that summer is a time when many people naturally relax their guard.
"Whether they're caught up in the excitement of booking a last-minute getaway or simply waiting on a steady stream of online orders to arrive.
'Inboxes become crowded with enticing offers and seemingly routine updates, which is precisely what cybercriminals are counting on to slip past our usual caution."
They have provided five ways in which you could avoid a terrible summer and have maximum enjoyment of the delights of summer.
Double-check before clicking
7
You must always hover over links to see where they really lead.
Some links might be phishing emails which aim to steal your data through what looks like an urgent message.
It is advised that you should be as cautious as possible of any message that is trying to rush you into taking action.
The team at FoxTech advised: "Inboxes become crowded with enticing offers and seemingly routine updates, which is precisely what cybercriminals are counting on to slip past our usual caution.
AI tricks to beat scammers as scam texts, calls and emails surge
"Taking just a little extra time to examine the links you're clicking on or to verify who has actually sent a message can ultimately prevent what might otherwise turn into weeks of stress, financial loss and disruption."
Delivery updates
7
It is advised that you should verify delivery updates directly with any provider.
Many users get texts or messages about alleged delivery parcels, but these may be fake.
However, instead of clicking the link you should go to the courier's official website itself to check for updates.
How to spot a dodgy app
Detecting a malicious app before you hit the 'Download' button is easy when you know the signs.
Follow this eight-point checklist when you're downloading an app you're unsure about:
Check the reviews - be wary of both complaints and uniformly positive reviews by fake accounts.
Look out for grammar mistakes - legitimate app developers won't have typos or errors in their app descriptions.
Check the number of downloads - avoid apps with only several thousand downloads, as it could be fake.
Research the developer - do they have a good reputation? Or, are totally fake?
Check the release date - a recent release date paired with a high number of downloads is usually bad news.
Review the permission agreement - this agreement gives permission for the app to take bits of your data, and fake apps often ask for additional data that is not necessary.
Check the update frequency - an app that is updated too frequently is usually indicative of security vulnerabilities.
Check the icon - look closely, and don't be deceived by distorted, lower-quality versions the icons from legitimate apps.
All of this information will available in both Apple's App Store and the Google Play Store.
Foxtech added: "Scams are evolving rapidly, and what might look like a harmless deal or a routine delivery text could end up draining your bank account or exposing your personal data.
"Taking a few extra seconds to verify a message can spare you weeks of stress and financial headaches."
Research travel deals
7
Have you ever thought something is too good to be true? Well that's because maybe it is!
Scammers like to entice you to click onto harmful links, and one of the ways they do so is through fake travel advert deals.
People could find themselves paying hundreds or even thousands of pounds for trips that simply don't exist
The team at FoxTech
You are advised to check independent reviews of providers and to make sure you confirm website contact details before clicking on anything.
Many users are also advised to make sure you are making a booking through an official platform before you pay.
The IT firm warned: "People could find themselves paying hundreds or even thousands of pounds for trips that simply don't exist, only to realise they've handed over sensitive personal and payment details to organised cybercriminals."
Boarding passes.
7
A nightmare scenario, you board a plane and someone is sitting in your seat.
To avoid this, you should never post travel documents online, which includes boarding passes.
Make sure to keep your tickets private because the barcode on the ticket may contain personal information.
What is phishing?
HERE's what you need to know:
Phishing is a type of online fraud
It's typically an attempt to nab some of your data
Phishing generally involves scammers posing as a trustworthy entity
For instance, fraudsters could send you an email claiming to be your bank, asking for details
Scammers can also set up fake websites that look like real ones, simply to hoodwink you
Phishing can take place over email, social media, texts, phone calls and more
The best defence against phishing is to be generally sceptical of weblinks and emails, especially if they were unsolicited
Multi-factor authentication
7
A second step of security can never hurt!
If you use multi-factor authentication, this will add extra protection to your account.
Even if your password does get stolen, this extra layer of verification makes things harder for scammers to access your account.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Guardian
3 hours ago
- The Guardian
Activists in Netherlands protest on roof of Microsoft site storing Israeli military data
Activists have staged a protest on the roof of a Microsoft datacentre in the Netherlands after revelations the Israeli military is storing large volumes of data in the country. Images posted on social media showed some of the activists blocking access to the large Microsoft facility in the north-west of the country on Sunday, while others scaled the building's roof and lit flares. The group, Geef Tegengas (Push Back), said its protest was in response to a recent Guardian investigation that revealed how the Israeli military surveillance agency, Unit 8200, has used Microsoft's Azure cloud platform to store a vast collection of intercepted Palestinian phone calls. The joint investigation with the Israeli-Palestinian publication +972 Magazine and Hebrew-language outlet Local Call found that Microsoft's Azure servers in the Netherlands have held large volumes of Israeli military data. Leaked Microsoft documents suggest that by July this year 11,500 terabytes of Israeli military data, equivalent to approximately 200m hours of audio files, was stored in Azure's servers in the Netherlands. In a statement, the activists said they were 'calling on all employees of the datacentre to lay down their work until all Israeli intelligence has been removed from the servers'. The Microsoft facility, a 14-hectares campus located near Middenmeer in the North Holland province, is part of a global network of datacentres used to store Azure customers' data. Disclosures about the Israeli military's reliance on the Netherlands-based datacentres prompted questions in the Dutch parliament this week at an emergency parliamentary debate about Israel's war on Gaza. During the debate, Christine Teunissen, an MP for the leftwing Party for the Animals, asked the government how it would prevent data held in the country from 'being used to commit genocide' in the besieged Palestinian territory. Caspar Veldkamp, the Dutch foreign minister, said in response he does not know exactly what information is available, but he would 'request further investigation', adding: 'If there are serious indications of criminal offences in that information, legal proceedings can of course be initiated, and that is then up to the public prosecution service.' Responding to the investigation this week, Microsoft said it had 'no information' about the kind of data stored by Unit 8200 in Azure. 'At no time during this engagement [with Unit 8200] has Microsoft been aware of the surveillance of civilians or collection of their cellphone conversations using Microsoft's services,' a spokesperson said. On Saturday, the Guardian reported that senior Microsoft executives are scrambling to assess what data Unit 8200 holds in Azure, amid concerns among the company's leadership that its staff in Israel may have concealed key details about its work with the unit. A spokesperson for the Israeli military previously said its work with Microsoft is based on 'legally supervised agreements' and the military 'operates in accordance with international law, with the aim of countering terrorism and ensuring the security of the state and its citizens'.


The Sun
5 hours ago
- The Sun
I drove across Europe in an EV – it was cost-effective & relaxing… but there were lessons learned along the way
A FOOTBALL fan went on the trip of a lifetime across Europe in an electric vehicle to watch England bring it home at the recent Women's Euros final. Footy-mad Liv Cooper was determined to reach the tournament's showpiece at St. Jakob-Park in Basel, Switzerland, by travelling the 1,602-mile round trip from her home in Manchester - all in an EV. 5 5 In an exclusive chat with Sun Motors, Liv explained she wanted to challenge herself to reach the match as sustainably and cost-effectively as possible, while testing the limits of long-distance EV travel. Taking to the open road in a Volkswagen ID.7, Liv was impressed by the car's comfort and smooth performance, while making use of OVO's Charge app to plan her charging stops with live updates and availability. 'The Volkswagen ID.7 really impressed me - it felt more like gliding than driving,' Liv said. 'It was smooth, silent and seriously comfortable over long distances. The range was solid, and with a bit of planning, it didn't feel limiting at all.' Liv was also surprised by how affordable the trip was in an EV, especially with the costs split between herself and a companion. 'The savings were noticeable,' she said. 'Charging costs split between two people were significantly cheaper than flying, even at the fast-charging rates. 'With the efficiency of the car, we didn't need to stop constantly to recharge, so I was surprised at how little it cost for the full journey.' However, Liv admits the trip wasn't all smooth sailing. Range anxiety - the worry that an EV's battery will run out of charge before reaching a destination or charging station - was an issue at times, particularly in rural areas. 'There were a couple of moments where I was keeping a close eye on the battery, especially in more rural areas,' she said. 'Having a good route plan and using OVO's reliable Charge app made all the difference. 'We made sure to check where we could charge before setting off, which meant we could stay flexible with our journey. We also topped up whenever possible if we knew we had a longer leg ahead.' Liv also encountered slower-than-expected chargers and some European stations that didn't accept UK payment methods or had poor signal for loading the app. 'On the downside, the charging infrastructure in some areas of Europe still needs work,' Liv said. 'We found a lot didn't take UK cards or Apple Pay, although if you're using the OVO Charge app, you don't have this problem. 'Some of the service stations also had bad signal, so it sometimes took a while to get the app to load. 'But overall, the positives far outweighed the negatives - the fast chargers were quick and provided a nice break, it's a more comfortable ride, and it's better for the planet.' Liv says the trip has changed her perspective on EV ownership. 'I used to think EVs were mostly for city driving, but this trip changed that,' she said. 'With the right car and a bit of prep, long-distance EV travel is actually really enjoyable.' She also says it made arriving in Switzerland for the final in such a sustainable way all the more rewarding. Liv said: 'It felt empowering to travel in an EV to the Women's Euros final. 'Football is all about passion and community, and arriving in a way that aligned with my values made it even more meaningful. 'We all talk about supporting the game we love, but making more sustainable choices is one way we can support the planet too and I'm certain it's going to be spoken a lot more about in football more generally over the next couple of years.' 5 5


Wales Online
5 hours ago
- Wales Online
Google sends red alert to 1.8billion users over AI scam it can't stop
Google sends red alert to 1.8billion users over AI scam it can't stop A new Google scam is reportedly being used by cyber criminals to steal data, with the tech giant issuing a red alert to its 1.8billion users over the fraud Theft scam involves another Google product, Gemini, an AI assistant (Image: SOPA Images, SOPA Images/LightRocket via Getty Images) Google has issued a "red alert" to its 1.8 billion account holders over a new artificial intelligence scam reportedly being exploited by cyber criminals. Tech expert Scott Polderman explained that the data theft scam involves another Google product, Gemini, an AI assistant known as a chatbot. He said: "So hackers have figured out a way to use Gemini - Google's own AI - against itself. Essentially, hackers are sending an email with a hidden message to Gemini to reveal your passwords without you even realising." AI has many impacts, including expected job losses. Scott emphasised that this scam is different from previous ones as it is "AI against AI" and could set a precedent for future attacks of this nature. He elaborated: "These hidden instructions are getting AI to work against itself and have you reveal your login and password information." "There is no link that you have to click [to activate the scam]. It's Gemini popping up and letting you know you are at risk." For our free daily briefing on the biggest issues facing the nation, sign up to the Wales Matters newsletter here He also advised that Google has previously stated it will "never ask" for your login information or "never alert" you of fraud through Gemini. Another tech expert, Marco Figueroa, added that emails including prompts that Gemini can pick up on, with the font size set to zero and the text colour to white so users don't spot it. One TikTok user offered additional guidance to help protect against the scam. "To disable Google Gemini's features within your Gmail account, you need to adjust your Google Workspace settings," they wrote. "This involves turning off 'SMART FEATURES' and potentially disabling the Gemini app and its integration within other Google products." Another commented: "I never use Gemini, still I might change my password just in case." A third person stated: "I'm sick of all of this already. I'm going back to pen and paper!". Similarly, a fourth contributed: "I quit using Gmail a long time ago! Thank you for the alert! I'll go check my old accounts." Google warned in its security blog last month: "With the rapid adoption of generative AI, a new wave of threats is emerging across the industry with the aim of manipulating the AI systems themselves. One such emerging attack vector is indirect prompt injections. "Unlike direct prompt injections, where an attacker directly inputs malicious commands into a prompt, indirect prompt injections involve hidden malicious instructions within external data sources. These may include emails, documents, or calendar invites that instruct AI to exfiltrate user data or execute other rogue actions. "As more governments, businesses, and individuals adopt generative AI to get more done, this subtle yet potentially potent attack becomes increasingly pertinent across the industry, demanding immediate attention and robust security measures." Article continues below However, the technology giant attempted to reassure users, explaining: "Google has taken a layered security approach introducing security measures designed for each stage of the prompt lifecycle. From Gemini 2.5 model hardening, to purpose-built machine learning (ML) models detecting malicious instructions, to system-level safeguards, we are meaningfully elevating the difficulty, expense, and complexity faced by an attacker. "This approach compels adversaries to resort to methods that are either more easily identified or demand greater resources."