IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

2019/20’s 10 biggest, boldest, and most brazen business email compromise scams

Understand how email scams work to know how they can be avoided

whitepaper
Proofpoint logo

Telling the difference between authentic emails and an impostor’s scam is not always easy. That’s because business email compromise (BEC) attacks prey on human nature, the innate psychological traits shared by everyone. 

This whitepaper offers a roundup of the most high-profile (and low-minded) BEC and email account compromise (EAC) attacks of the last 12 months.

Download it now to understand how email scams work and know how they can be avoided.

Recommended

Education and government most at risk from email threats
phishing

Education and government most at risk from email threats

26 Nov 2021
Attackers use CSS to fool anti-phishing systems
phishing

Attackers use CSS to fool anti-phishing systems

11 Nov 2021
Senate report slams agencies for poor cyber security
cyber security

Senate report slams agencies for poor cyber security

3 Aug 2021
Most employees put their workplace at risk by taking cyber security shortcuts
cyber security

Most employees put their workplace at risk by taking cyber security shortcuts

27 Jul 2021

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022
Preparing for the 3G sunset
Network & Internet

Preparing for the 3G sunset

18 May 2022
(ISC)2 launches free scheme to get 100,000 UK citizens into cyber security
Careers & training

(ISC)2 launches free scheme to get 100,000 UK citizens into cyber security

17 May 2022
Samsung Galaxy S22 Ultra review: A noteworthy flagship
Mobile Phones

Samsung Galaxy S22 Ultra review: A noteworthy flagship

18 May 2022