{"id":27762,"date":"2018-07-27T16:11:00","date_gmt":"2018-07-27T14:11:00","guid":{"rendered":"https:\/\/perseus.de\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/"},"modified":"2026-03-31T07:02:16","modified_gmt":"2026-03-31T05:02:16","slug":"part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/","title":{"rendered":"Part 2: Would you have fallen for it? The most sophisticated scams to obtain company data."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27762\" class=\"elementor elementor-27762 elementor-22888\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"730\" height=\"412\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2018\/07\/Blog-Header-Waeren-Sie-hereingefallen-Teil-2.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27761\" alt=\"Blog Header Sophisticated Scams Cyber\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2018\/07\/Blog-Header-Waeren-Sie-hereingefallen-Teil-2.jpg 730w, https:\/\/perseus.de\/wp-content\/uploads\/2018\/07\/Blog-Header-Waeren-Sie-hereingefallen-Teil-2-300x169.jpg 300w\" sizes=\"(max-width: 730px) 100vw, 730px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: John Schnobrich via Unsplash<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8754629 e-flex e-con-boxed e-con e-parent\" data-id=\"8754629\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b388947 e-con-full e-flex e-con e-child\" data-id=\"b388947\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-059c6b2 e-con-full e-flex e-con e-child\" data-id=\"059c6b2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f761188 elementor-widget elementor-widget-text-editor\" data-id=\"f761188\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>27.07.2018<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c0bc1f elementor-widget elementor-widget-heading\" data-id=\"0c0bc1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Part 2: Would you have fallen for it? The most sophisticated scams to obtain company data. <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cb0596 elementor-widget elementor-widget-text-editor\" data-id=\"4cb0596\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity | IT Protection | Attack Vectors<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-733ab26 e-con-full e-flex e-con e-child\" data-id=\"733ab26\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dfbae1c elementor-widget elementor-widget-text-editor\" data-id=\"dfbae1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Have you heard of the evil twin? In the second part of our series, we will again introduce you to three inventive tricks used by cybercriminals and give you suggestions on how to protect yourself from such maneuvers. <\/strong><\/p><p> <\/p><h4><strong>1. The evil twin or the seductive Wi-Fi<\/strong><\/h4><p>Mobile working is a blessing for the stressed employee, but also a risk for companies. This is true at least as long as there are no safety guidelines for working on the go. Criminals like to use such vulnerabilities for the trick of the so-called <a href=\"https:\/\/www.security-insider.de\/was-ist-ein-evil-twin-a-727155\/\">evil twin<\/a>: Here, reputable wireless Internet access points (W-LAN) are replaced by malicious clones that look exactly like their twin and often boast a stronger signal. If you are connected via this network, data can be read by cybercriminals.   <\/p><p><em>Our tip: Bad twins are difficult for outsiders to recognize. Therefore, only use foreign networks if you have no alternatives. While using someone else&#8217;s Wi-Fi, you should not enter any critical information such as access rights or payment details. Alternatively, you can install a VPN program (VPN \u2013 Virtual Private Network) or have it set up by your IT manager. The private network allows you to surf the Internet safely.    <\/em><\/p><p> <\/p><h4><strong>2. The desperate service provider<\/strong><\/h4><p>The phone rings. A new employee from your service provider is on the other end of the line. He desperately asks you for help: Your company&#8217;s website has been hacked, all data is visible online in a few minutes \u2013 unless you give him your password immediately so that he can prevent worse. Since it is new, it needs your password and if you don&#8217;t help it, then unfortunately you will have to take responsibility for the data leak. You want to talk to his superior. No problem, he will be happy to forward you. The supposed boss confirms the process. A delicate matter. And then the person on the phone sounds very trustworthy. Numerous scams of the past few months have been built up in this or similar way. A well-known software manufacturer recently warned again about fraudsters posing as the company&#8217;s maintenance team in order to grant you<a href=\"https:\/\/www.microsoft.com\/security\/blog\/2018\/04\/20\/teaming-up-in-the-war-on-tech-support-scams\/\"> access to the computer<\/a>.          <\/p><p><em>Our tip: Don&#8217;t let yourself be put under pressure. Find the service provider&#8217;s phone number from your records, call them and have the story confirmed. <\/em><\/p><p> <\/p><h4><strong>3. The contaminated advertisement<\/strong><\/h4><p>No more clicking on suspicious links, no downloading of dubious email attachments: there are cyberattacks that criminals use to infiltrate your systems without you noticing. These malicious programs are often found in infected ads that disguise themselves as advertisements. When you visit affected websites, these ads are automatically executed. They exploit security gaps in the browser, whereby the malware is automatically downloaded (drive-by attack). Trustworthy sites can also be affected if they integrate <a href=\"https:\/\/www.bsi.bund.de\/DE\/Presse\/Pressemitteilungen\/Presse2017\/Cyber-Angriff_auf_den_Bundestag_Stellungnahme_29032017.html\">advertising from unknown third parties<\/a> into their own website without quality control.    <\/p><p><em>Our tip: Always use the latest version of your browser and download security updates automatically. You can also use an ad blocker: This blocks ads before they open in your browser. However, please note that many free services such as online media are financed by advertising. With the ad blocker switched on, these are often not available at all or only to a limited extent.   <\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Have you heard of the evil twin? In the second part of our series, we will again introduce you to three inventive tricks used by cybercriminals and give you suggestions on how to protect yourself from such maneuvers. <\/p>\n","protected":false},"author":4,"featured_media":27761,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-27762","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Part 2: Would you have fallen for it? The most sophisticated scams to obtain company data. - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Part 2: Would you have fallen for it? The most sophisticated scams to obtain company data. - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Have you heard of the evil twin? In the second part of our series, we will again introduce you to three inventive tricks used by cybercriminals and give you suggestions on how to protect yourself from such maneuvers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-27T14:11:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T05:02:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2018\/07\/Blog-Header-Waeren-Sie-hereingefallen-Teil-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"412\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasia Pamoukis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasia Pamoukis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/\"},\"author\":{\"name\":\"Anastasia Pamoukis\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\"},\"headline\":\"Part 2: Would you have fallen for it? The most sophisticated scams to obtain company data.\",\"datePublished\":\"2018-07-27T14:11:00+00:00\",\"dateModified\":\"2026-03-31T05:02:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/\"},\"wordCount\":580,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Blog-Header-Waeren-Sie-hereingefallen-Teil-2.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/\",\"name\":\"Part 2: Would you have fallen for it? The most sophisticated scams to obtain company data. - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Blog-Header-Waeren-Sie-hereingefallen-Teil-2.jpg\",\"datePublished\":\"2018-07-27T14:11:00+00:00\",\"dateModified\":\"2026-03-31T05:02:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Blog-Header-Waeren-Sie-hereingefallen-Teil-2.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Blog-Header-Waeren-Sie-hereingefallen-Teil-2.jpg\",\"width\":730,\"height\":412,\"caption\":\"Blog Header Sophisticated Scams Cyber\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Part 2: Would you have fallen for it? The most sophisticated scams to obtain company data.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\",\"name\":\"Anastasia Pamoukis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"caption\":\"Anastasia Pamoukis\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/anastasia-pamoukis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Part 2: Would you have fallen for it? The most sophisticated scams to obtain company data. - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/","og_locale":"en_US","og_type":"article","og_title":"Part 2: Would you have fallen for it? The most sophisticated scams to obtain company data. - Perseus Technologies","og_description":"Have you heard of the evil twin? In the second part of our series, we will again introduce you to three inventive tricks used by cybercriminals and give you suggestions on how to protect yourself from such maneuvers.","og_url":"https:\/\/perseus.de\/en\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/","og_site_name":"Perseus Technologies","article_published_time":"2018-07-27T14:11:00+00:00","article_modified_time":"2026-03-31T05:02:16+00:00","og_image":[{"width":730,"height":412,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2018\/07\/Blog-Header-Waeren-Sie-hereingefallen-Teil-2.jpg","type":"image\/jpeg"}],"author":"Anastasia Pamoukis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Anastasia Pamoukis","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/"},"author":{"name":"Anastasia Pamoukis","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b"},"headline":"Part 2: Would you have fallen for it? The most sophisticated scams to obtain company data.","datePublished":"2018-07-27T14:11:00+00:00","dateModified":"2026-03-31T05:02:16+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/"},"wordCount":580,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2018\/07\/Blog-Header-Waeren-Sie-hereingefallen-Teil-2.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/","url":"https:\/\/perseus.de\/en\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/","name":"Part 2: Would you have fallen for it? The most sophisticated scams to obtain company data. - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2018\/07\/Blog-Header-Waeren-Sie-hereingefallen-Teil-2.jpg","datePublished":"2018-07-27T14:11:00+00:00","dateModified":"2026-03-31T05:02:16+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2018\/07\/Blog-Header-Waeren-Sie-hereingefallen-Teil-2.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2018\/07\/Blog-Header-Waeren-Sie-hereingefallen-Teil-2.jpg","width":730,"height":412,"caption":"Blog Header Sophisticated Scams Cyber"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/part-2-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Part 2: Would you have fallen for it? The most sophisticated scams to obtain company data."}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b","name":"Anastasia Pamoukis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","caption":"Anastasia Pamoukis"},"sameAs":["https:\/\/perseus.de"],"url":"https:\/\/perseus.de\/en\/author\/anastasia-pamoukis\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=27762"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27762\/revisions"}],"predecessor-version":[{"id":27763,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27762\/revisions\/27763"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/27761"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=27762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=27762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=27762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}