{"id":27771,"date":"2018-07-20T16:04:00","date_gmt":"2018-07-20T14:04:00","guid":{"rendered":"https:\/\/perseus.de\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/"},"modified":"2026-03-31T07:03:23","modified_gmt":"2026-03-31T05:03:23","slug":"part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/","title":{"rendered":"Part 1: Would you have fallen for it? The most sophisticated scams to obtain company data."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27771\" class=\"elementor elementor-27771 elementor-22875\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"511\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2018\/07\/Cybersicherheit_Kriminelle_Tricks-768x511-1.jpeg\" class=\"attachment-medium_large size-medium_large wp-image-27770\" alt=\"Cybersecurity Criminal Tricks\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2018\/07\/Cybersicherheit_Kriminelle_Tricks-768x511-1.jpeg 768w, https:\/\/perseus.de\/wp-content\/uploads\/2018\/07\/Cybersicherheit_Kriminelle_Tricks-768x511-1-300x200.jpeg 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image source: TeroVesalainen on Pixabay.com<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-691a78e7 e-flex e-con-boxed e-con e-parent\" data-id=\"691a78e7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-10ba115 e-con-full e-flex e-con e-child\" data-id=\"10ba115\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b197b61 e-con-full e-flex e-con e-child\" data-id=\"b197b61\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c0413d elementor-widget elementor-widget-text-editor\" data-id=\"4c0413d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>20.07.2018<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0f32a3 elementor-widget elementor-widget-heading\" data-id=\"e0f32a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Part 1: Would you have fallen for it? The most sophisticated scams to obtain company data. <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a37372 elementor-widget elementor-widget-text-editor\" data-id=\"3a37372\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity | IT Protection | Attack Vectors<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3f8821c e-con-full e-flex e-con e-child\" data-id=\"3f8821c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-735454e elementor-widget elementor-widget-text-editor\" data-id=\"735454e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>The inventiveness of criminals is limitless. In our new series, we present how creative cybercriminals become to access company information. In our first part, you will find three tricks that you should not fall for.  <\/strong><\/p><p> <\/p><h4>1. The lost USB flash drive<\/h4><p>They are often distributed to companies as promotional gifts. Occasionally, there is even a lost specimen on the way to the office. Who wouldn&#8217;t be happy about a free USB stick? But as soon as careless employees plug the small electronic devices into their work computers, a rude awakening threatens. Because they are not always as harmless as they seem. Criminals like to use the portable storage media to infiltrate malware or espionage programs on company computers. Private devices can also be sources of danger if they have previously been infected with malware. Such a case became famous in 2008 when the <a href=\"http:\/\/www.spiegel.de\/netzwelt\/netzpolitik\/virenbefall-das-pentagon-und-die-usb-bombe-a-713863.html\">use of a private USB stick<\/a> infected a large part of the computers of the US Department of Defense with spy programs.       <\/p><p><em>Our tip: <\/em>Do not use external devices and buy your own USB stick from a trusted manufacturer, which you use exclusively for business purposes.<\/p><p> <\/p><h4>2. Misdirected email from HR<\/h4><p>Do you know this? An e-mail from colleagues was mistakenly forwarded. Most of the time, you just click away the troublemaker in your inbox. But if the subject line sounds too tempting, then take a closer look. Resourceful criminals take advantage of this curiosity. Subject lines such as &#8220;staff cut&#8221;, &#8220;salary overview&#8221; or even &#8220;vacation pictures&#8221; arouse curiosity and are popular lures of scam e-mails that are intended to entice employees to click on the attachment or link they contain. Often, the e-mails are designed to be deceptively real: design, name of the sender, salutation and signature correspond to those of the company.      <\/p><p><em>Our tip: <\/em>Often you can only conclude a fraud attempt by taking a closer look at the e-mail address. Check the address carefully. Is the name correct? Is the email provider correct? Even if you know the email provider you are using \u2013 identifiable by the part that follows the @ sign \u2013 you should consider whether it is usually used.    <\/p><p> <\/p><h4>3. The transition to the new General Data Protection Regulation<\/h4><p>In times of upheaval, criminals like to take advantage of the emerging uncertainty. This was also the case during the entry into force of the European General Data Protection Regulation (EU GDPR). Personal and business e-mail inboxes were flooded with requests to agree to new privacy policies and to re-enter some of the data \u2013 often accompanied by the note that certain services were no longer available without consent. Criminals have cleverly exploited the confusion surrounding the EU GDPR to <a href=\"https:\/\/www.tagesschau.de\/ausland\/phishing-datenschutz-101.html\">place their scam emails<\/a>.   <\/p><p><em>Our tip: <\/em>Again, take a close look at the sender&#8217;s email addresses. If in doubt, do not open an attachment or click on any links it contains. Find out the sender&#8217;s phone number on the official website and find out if the email is actually from them.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The inventiveness of criminals is limitless. In our new series, we present how creative cybercriminals become to access company information. In our first part, you will find three tricks that you should not fall for.  <\/p>\n","protected":false},"author":4,"featured_media":27770,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-27771","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Part 1: Would you have fallen for it? The most sophisticated scams to obtain company data. - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Part 1: Would you have fallen for it? The most sophisticated scams to obtain company data. - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"The inventiveness of criminals is limitless. In our new series, we present how creative cybercriminals become to access company information. In our first part, you will find three tricks that you should not fall for.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-20T14:04:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T05:03:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2018\/07\/Cybersicherheit_Kriminelle_Tricks-768x511-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"511\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasia Pamoukis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasia Pamoukis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/\"},\"author\":{\"name\":\"Anastasia Pamoukis\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\"},\"headline\":\"Part 1: Would you have fallen for it? The most sophisticated scams to obtain company data.\",\"datePublished\":\"2018-07-20T14:04:00+00:00\",\"dateModified\":\"2026-03-31T05:03:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/\"},\"wordCount\":535,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Cybersicherheit_Kriminelle_Tricks-768x511-1.jpeg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/\",\"name\":\"Part 1: Would you have fallen for it? The most sophisticated scams to obtain company data. - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Cybersicherheit_Kriminelle_Tricks-768x511-1.jpeg\",\"datePublished\":\"2018-07-20T14:04:00+00:00\",\"dateModified\":\"2026-03-31T05:03:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Cybersicherheit_Kriminelle_Tricks-768x511-1.jpeg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Cybersicherheit_Kriminelle_Tricks-768x511-1.jpeg\",\"width\":768,\"height\":511,\"caption\":\"Cybersecurity Criminal Tricks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Part 1: Would you have fallen for it? The most sophisticated scams to obtain company data.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\",\"name\":\"Anastasia Pamoukis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"caption\":\"Anastasia Pamoukis\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/anastasia-pamoukis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Part 1: Would you have fallen for it? The most sophisticated scams to obtain company data. - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/","og_locale":"en_US","og_type":"article","og_title":"Part 1: Would you have fallen for it? The most sophisticated scams to obtain company data. - Perseus Technologies","og_description":"The inventiveness of criminals is limitless. In our new series, we present how creative cybercriminals become to access company information. In our first part, you will find three tricks that you should not fall for.","og_url":"https:\/\/perseus.de\/en\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/","og_site_name":"Perseus Technologies","article_published_time":"2018-07-20T14:04:00+00:00","article_modified_time":"2026-03-31T05:03:23+00:00","og_image":[{"width":768,"height":511,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2018\/07\/Cybersicherheit_Kriminelle_Tricks-768x511-1.jpeg","type":"image\/jpeg"}],"author":"Anastasia Pamoukis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Anastasia Pamoukis","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/"},"author":{"name":"Anastasia Pamoukis","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b"},"headline":"Part 1: Would you have fallen for it? The most sophisticated scams to obtain company data.","datePublished":"2018-07-20T14:04:00+00:00","dateModified":"2026-03-31T05:03:23+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/"},"wordCount":535,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2018\/07\/Cybersicherheit_Kriminelle_Tricks-768x511-1.jpeg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/","url":"https:\/\/perseus.de\/en\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/","name":"Part 1: Would you have fallen for it? The most sophisticated scams to obtain company data. - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2018\/07\/Cybersicherheit_Kriminelle_Tricks-768x511-1.jpeg","datePublished":"2018-07-20T14:04:00+00:00","dateModified":"2026-03-31T05:03:23+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2018\/07\/Cybersicherheit_Kriminelle_Tricks-768x511-1.jpeg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2018\/07\/Cybersicherheit_Kriminelle_Tricks-768x511-1.jpeg","width":768,"height":511,"caption":"Cybersecurity Criminal Tricks"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/part-1-would-you-have-fallen-for-it-the-most-sophisticated-scams-to-obtain-company-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Part 1: Would you have fallen for it? The most sophisticated scams to obtain company data."}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b","name":"Anastasia Pamoukis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","caption":"Anastasia Pamoukis"},"sameAs":["https:\/\/perseus.de"],"url":"https:\/\/perseus.de\/en\/author\/anastasia-pamoukis\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=27771"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27771\/revisions"}],"predecessor-version":[{"id":27772,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27771\/revisions\/27772"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/27770"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=27771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=27771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=27771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}