Tech Alert: Use Caution with LinkedIn Invitations

by | Apr 1, 2013 | Uncategorized

Cybercriminals have launched yet another spam campaign, impersonating LinkedIn, in an attempt to trick its users into clicking on the malicious links found in the bogus “Invitation Notification” themed emails. Once they click on the links, users are automatically exposed to the client-side exploits served by the Black Hole Exploit Kit.  We realize several of our clients use LinkedIn so we wanted to share this threat information.  Click here to see more details, including a sample screen shot of the email.

While we do everything we can to protect our clients’ systems, the single biggest factor in preventing a malware infection on a PC is an individual’s behavior.  Each one of us needs to be vigilant to avoid downloading and installing anything we do not understand or trust, no matter how tempting, from different sources.  The LinkedIn threat is one of many major sites that they spoof, so always be cautious when clicking a link or opening an attachment.  This article from offers good suggestions for smart online behavior.





John Ahlberg
CEO, Waident

CIO in the corporate world and now for Waident clients. John injects order and technology into business process to keep employees productive, enterprises running, and data safe.


Related posts

Interesting Tech

Interesting Tech

                      Hushme - A muzzle you wear for those important office calls that you do not want to be overheard. Or give one to that loud guy you work with to wear… KittyKorner – Turn almost any interior door into one with a cat door. The Edge Desk – Ever...

Security – Just Deal With It Already!

Security – Just Deal With It Already!

There are way too many stories about companies that discover a security breach and then find out that the actual breach happened months or even years ago. Yikes. No one ever wants to be in that position so why not try to avoid it? Krebs on Security wrote a good...

A Dark Web Story

A Dark Web Story

I have written about the Dark Web in the past, and nothing has changed, but I did want to share a real life story. Now that we have access to the Dark Web to run reports on client data breaches, we have seen interesting results. Only once did the report come back...

Subscribe to our blog!

Get our latest thinking to keep your people productive, your enterprise running, and your data safe.

Share This