{"id":27753,"date":"2018-08-13T16:17:00","date_gmt":"2018-08-13T14:17:00","guid":{"rendered":"https:\/\/perseus.de\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/"},"modified":"2026-03-31T07:01:18","modified_gmt":"2026-03-31T05:01:18","slug":"part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/","title":{"rendered":"Part: 3 Would you have fallen for it? The most sophisticated scams to obtain company data."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27753\" class=\"elementor elementor-27753 elementor-22911\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"730\" height=\"412\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2018\/08\/Blog-Header-Waeren-Sie-hereingefallen-Teil-3.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27752\" alt=\"Blog Header Scams Man with Mobile Phone\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2018\/08\/Blog-Header-Waeren-Sie-hereingefallen-Teil-3.jpg 730w, https:\/\/perseus.de\/wp-content\/uploads\/2018\/08\/Blog-Header-Waeren-Sie-hereingefallen-Teil-3-300x169.jpg 300w\" sizes=\"(max-width: 730px) 100vw, 730px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image source: Nordwood Themes via Unsplash<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4b1d599b e-flex e-con-boxed e-con e-parent\" data-id=\"4b1d599b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b949708 e-con-full e-flex e-con e-child\" data-id=\"b949708\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d2cc8ce e-con-full e-flex e-con e-child\" data-id=\"d2cc8ce\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c9d5134 elementor-widget elementor-widget-text-editor\" data-id=\"c9d5134\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>13.08.2018<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94ead71 elementor-widget elementor-widget-heading\" data-id=\"94ead71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Part: 3 Would you have fallen for it? The most sophisticated scams to obtain company data. <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85c497b elementor-widget elementor-widget-text-editor\" data-id=\"85c497b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity | IT Protection | Attack Vectors<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-424a24a e-con-full e-flex e-con e-child\" data-id=\"424a24a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0260b58 elementor-widget elementor-widget-text-editor\" data-id=\"0260b58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>How much do you trust your online rendezvous? It is common knowledge that you should not reveal too much information with Internet acquaintances. However, when it comes to their own career or love, even level-headed people forget all the basic rules of cybersecurity. Criminals exploit vanity and loneliness to get hold of company data.   <\/strong><\/p><h4><strong>1. The fake warning from the Federal Office for Information Security<\/strong><\/h4><p>If anyone knows anything about IT security, it&#8217;s the German Federal Office for Information Security (BSI) \u2013 after all, it&#8217;s Germany&#8217;s top federal authority in the field of cybersecurity. It is considered a valuable knowledge carrier, advises and supports companies. It also issues alerts when new waves of attacks are launched by cybercriminals. At the beginning of the year, emails circulated calling on people to carry out security updates. Alleged sender: the BSI. It contains: A link under which the recipient could download the update. However, the download on the fake website contained malware. A nasty trick by cybercriminals. The BSI finally issued a <a href=\"https:\/\/www.bsi.bund.de\/DE\/Presse\/Pressemitteilungen\/Presse2018\/Gefaelschte_BSI-Mails_12012018.html\">warning message <\/a>itself with the recommendation to ignore the message.        <\/p><p><em>Our tip: Check the e-mail address carefully even from trustworthy senders. If in doubt, do not open an attachment or click on any links it contains. For more information, visit other channels, such as the organization&#8217;s official website or customer service.  <\/em><\/p><h4><strong>2. The curious headhunter<\/strong><\/h4><p>You will be contacted via Xing: Great CV and unique profile. The company could use someone like you, the interested HR manager writes to you. Who doesn&#8217;t like to hear such compliments? A telephone call will be arranged in which you will get to know each other better. Your counterpart inquires about your current position. The person asks for more and more detailed information about internal processes and resources. The <a href=\"https:\/\/www.heise.de\/newsticker\/meldung\/Verfassungsschutz-Massive-Spionage-Chinas-ueber-soziale-Netzwerke-3914864.html\">headhunter scam<\/a> via social networks is a popular trick to obtain information.      <\/p><p><em>Our tip: Be careful with what you reveal to the outside world about your current company. A recruiter will usually inquire about your responsibilities. However, he should understand if you do not disclose any details or internals \u2013 such as internal operating procedures, access rights or software used in your company.  <\/em><\/p><h4>3. The digital rendezvous without a happy ending<\/h4><p>Similar to the headhunter&#8217;s scam, espionage also works in online dating: A person with an attractive profile photo contacts the victim on social networks. There is flirting, people write to each other all night and build trust. Once the first step has been taken, there are two popular approaches: either the target is questioned directly about their company or they are asked to download a flirting app that acts as a Trojan horse and is infected with a spy program.    <\/p><p><em>Our tip: Become suspicious if you are questioned extensively about your company by anonymous flirts on the Internet. Of course, the profession is an interesting topic of conversation, but you should keep company internals and similar details to yourself. Are you asked to download an app or other programs\/files? It is best to refrain from clicking on links from strangers. There are always alternatives, you can fall back on commonly used means of communication \u2013 your online rendezvous will certainly understand this.    <\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>How much do you trust your online rendezvous? It is common knowledge that you should not reveal too much information with Internet acquaintances. However, when it comes to their own career or love, even level-headed people forget all the basic rules of cybersecurity. Criminals exploit vanity and loneliness to get hold of company data.   <\/p>\n","protected":false},"author":4,"featured_media":27752,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-27753","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Part: 3 Would you have fallen for it? The most sophisticated scams to obtain company data. - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Part: 3 Would you have fallen for it? The most sophisticated scams to obtain company data. - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"How much do you trust your online rendezvous? It is common knowledge that you should not reveal too much information with Internet acquaintances. However, when it comes to their own career or love, even level-headed people forget all the basic rules of cybersecurity. Criminals exploit vanity and loneliness to get hold of company data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-13T14:17:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T05:01:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2018\/08\/Blog-Header-Waeren-Sie-hereingefallen-Teil-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"412\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasia Pamoukis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasia Pamoukis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/\"},\"author\":{\"name\":\"Anastasia Pamoukis\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\"},\"headline\":\"Part: 3 Would you have fallen for it? The most sophisticated scams to obtain company data.\",\"datePublished\":\"2018-08-13T14:17:00+00:00\",\"dateModified\":\"2026-03-31T05:01:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/\"},\"wordCount\":569,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Blog-Header-Waeren-Sie-hereingefallen-Teil-3.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/\",\"name\":\"Part: 3 Would you have fallen for it? The most sophisticated scams to obtain company data. - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Blog-Header-Waeren-Sie-hereingefallen-Teil-3.jpg\",\"datePublished\":\"2018-08-13T14:17:00+00:00\",\"dateModified\":\"2026-03-31T05:01:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Blog-Header-Waeren-Sie-hereingefallen-Teil-3.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Blog-Header-Waeren-Sie-hereingefallen-Teil-3.jpg\",\"width\":730,\"height\":412,\"caption\":\"Blog Header Scams Man with Mobile Phone\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Part: 3 Would you have fallen for it? The most sophisticated scams to obtain company data.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\",\"name\":\"Anastasia Pamoukis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"caption\":\"Anastasia Pamoukis\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/anastasia-pamoukis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Part: 3 Would you have fallen for it? The most sophisticated scams to obtain company data. - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/","og_locale":"en_US","og_type":"article","og_title":"Part: 3 Would you have fallen for it? The most sophisticated scams to obtain company data. - Perseus Technologies","og_description":"How much do you trust your online rendezvous? It is common knowledge that you should not reveal too much information with Internet acquaintances. However, when it comes to their own career or love, even level-headed people forget all the basic rules of cybersecurity. Criminals exploit vanity and loneliness to get hold of company data.","og_url":"https:\/\/perseus.de\/en\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/","og_site_name":"Perseus Technologies","article_published_time":"2018-08-13T14:17:00+00:00","article_modified_time":"2026-03-31T05:01:18+00:00","og_image":[{"width":730,"height":412,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2018\/08\/Blog-Header-Waeren-Sie-hereingefallen-Teil-3.jpg","type":"image\/jpeg"}],"author":"Anastasia Pamoukis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Anastasia Pamoukis","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/"},"author":{"name":"Anastasia Pamoukis","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b"},"headline":"Part: 3 Would you have fallen for it? The most sophisticated scams to obtain company data.","datePublished":"2018-08-13T14:17:00+00:00","dateModified":"2026-03-31T05:01:18+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/"},"wordCount":569,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2018\/08\/Blog-Header-Waeren-Sie-hereingefallen-Teil-3.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/","url":"https:\/\/perseus.de\/en\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/","name":"Part: 3 Would you have fallen for it? The most sophisticated scams to obtain company data. - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2018\/08\/Blog-Header-Waeren-Sie-hereingefallen-Teil-3.jpg","datePublished":"2018-08-13T14:17:00+00:00","dateModified":"2026-03-31T05:01:18+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2018\/08\/Blog-Header-Waeren-Sie-hereingefallen-Teil-3.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2018\/08\/Blog-Header-Waeren-Sie-hereingefallen-Teil-3.jpg","width":730,"height":412,"caption":"Blog Header Scams Man with Mobile Phone"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/part-3-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Part: 3 Would you have fallen for it? The most sophisticated scams to obtain company data."}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b","name":"Anastasia Pamoukis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","caption":"Anastasia Pamoukis"},"sameAs":["https:\/\/perseus.de"],"url":"https:\/\/perseus.de\/en\/author\/anastasia-pamoukis\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=27753"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27753\/revisions"}],"predecessor-version":[{"id":27754,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27753\/revisions\/27754"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/27752"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=27753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=27753"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=27753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}