San Diego, CA
This is the phishing scam that gets a San Diego identity theft expert ‘really, very angry’
Digital thieves are nothing if not persistent and innovative.
They keep finding new ways to try to part you from your money.
Phishing — where thieves pose as trusted entities or send legitimate looking emails or messages to trick you into giving them access to your accounts — is a widespread method. And it is constantly evolving.
“We’ve seen phishing go through the roof,” said Eva Velasquez, the CEO of the Identity Theft Resource Center, a San Diego-based national nonprofit.
But knowledge is power. So here are three emerging phishing threats to look out for, according to internet safety experts. All three threats target key parts of people’s digital lives: email attachments that lead to fake login pages, multi-factor authentication trickery and deceptive calendar invites.
Spending a few minutes reading these pointers could help you avoid getting your ID or money stolen and save you countless hours of dealing with the fallout.
HTML attachments that open fake login pages
Imagine a busy professional who is in email action mode. In the past 30 minutes on a Saturday morning, he has filled out emailed liability waivers for his seven children’s summer camps, filed an expense report for work, answered a secure portal message from the veterinarian about his sick puppy’s prescription, skimmed 182 email subject lines and paid five bills from his email inbox, including a car insurance premium and his beloved cheese-of-the-month club.
Amid this flurry of inbound emails, ads, invoices and secure messages, he is working on autopilot: opening messages, skimming, clicking and signing in.
What a perfect opportunity.
Scammers are taking advantage of user distraction — and their trust — by sending emails with HTM or HTML attachments. When clicked, those open a browser file that looks like secure, familiar login page. These pages might look like secure invoice viewers, file-sharing services like DocuSign or Dropbox, or sign-in pages to platforms including Microsoft 365.
“Once the user enters their credentials, they are sent surreptitiously to the attacker’s server,” said Vlad Cristescu, the head of cybersecurity with ZeroBounce, a Florida company that helps businesses lower their rate of bounced marketing emails.
Why this method is especially insidious: “There isn’t a clickable link in the email, so standard email security filters (which scan for malicious URLs or attachments like PDFs and ZIPs) may not catch it,” Cristescu added.
To prevent this, he added, companies should “restrict HTML attachments unless essential, and users should treat unfamiliar HTML files the same way they’d treat a suspicious link — don’t open it unless you’re absolutely sure of the sender.”
If you do receive incoming communication with an HTML link or attachment, don’t engage, said Velasquez, with the ITRC.
“Don’t click on links, people. That’s the big, overarching message,” she said. Instead, go to the source: call the phone number on the back of your credit card, visit the bank in person.
Multifactor authentication tricks
If you are one of the many people who uses multifactor authentication, take note.
Multifactor authentication is still very helpful and should be used.
But Cristescu flagged one way that scammers are taking this tool — which is designed to make people’s online accounts more secure — and using it to slither in.
As a refresher, multifactor authentication is an added layer of protection that prevents data thieves from logging into your accounts if they have your username and password. It helps ensure that you’re the one who typed in your password when you log in, and not some scammer in the Philippines or Poughkeepsie.
To use multifactor authentication, you typically download an app, such as Google Authenticator or Microsoft Authenticator. You register your sensitive online accounts, such as Facebook, bank or email, with that app. Then, every time you log into a registered website, the authenticator app generates a new, random code that you enter after your password as a second layer of verification.
With the rise of this protection, a new threat has emerged: Scammers who have your username and password can send log-in requests to your authenticator app. Next, the scammer can pose as an IT expert from your workplace and ask you to approve the log-in request.
If you fall for it, then boom — the scammer is in.
This technique “exploits a user’s frustration and trust in IT. If you’re receiving multiple (authenticator) prompts you didn’t initiate, that’s not a glitch – it’s an attack,” Cristescu said. He recommends pausing, never approving these unexpected requests and flagging the interaction with IT.
Velasquez added that if you get an authenticator notification and you didn’t just log in yourself, “That is a huge red flag. Stop and address it. Don’t ignore it.”
Anytime you interact with IT, be sure you’re the one initiating that contact, she added. If someone from IT calls or emails you, disconnect and reach back out using a trusted method, such as the same phone number you always dial.
Fake calendar invites
A third technique data thieves are using is calendar invites.
“I just get really very angry about this one,” Velasquez said. “It is super hard to detect.”
Here’s what to look out for. If you use an online calendar like Google calendar or the native iPhone calendar app, you might receive an invitation to an event you didn’t see coming. Sometimes these meetings are legitimate. Sometimes, they are not.
Scammers “are now sending meeting requests with malicious links embedded in the invite or ‘join’ button. These invitations sync directly into calendars and often go unquestioned,” according to ZeroBounce.
Scammers use calendar invites because they have “built-in credibility – they’re not usually scrutinized like emails,” Cristescu said. Look for meeting requests from unknown senders and vague event names like “Sync” or “Project Review,” he added.
In some jobs or roles, meetings routinely get added to calendars by other people — clients, prospects, coworkers, bosses, peers.
“I have gotten these repeatedly,” said Velasquez, with the ITRC. “Depending on your lifestyle and your job and how you work, these are going to be particularly challenging. They are real calendar invites. The problem is they have malicious software embedded in them — so when you click on portions of them, ‘Click to join,’ it’s like opening an attachment (or) clicking on a suspicious link. It’s the same principle.”
Cristescu, with ZeroBounce, shared this tip: “Treat those just like a phishing email. Disable auto-accept where possible and review every invite manually before clicking anything.”
Never stop questioning what lands in your inbox or calendar, Cristescu added. “Always verify the sender’s email address, ensure that any link you click matches the legitimate domain, and look out for subtle red flags like spelling errors or unusual formatting.”
A big picture pointer
“All three of these (scams) are so common that it has probably happened to every single person reading the article — at least one of them. That’s how ubiquitous these are,” Velasquez said.
She shared this broader thought: It’s less important to know how to respond to each scenario and more important to pause, be skeptical, double check.
It’s important to be ever more skeptical, because AI makes it easier and easier for thieves to create convincing ruses, Cristescu and Velasquez both said.
AI “really helps with making these phishing offers look and sound so much more legitimate,” Velasquez said. “And with the amount of data that is out there from public sources and from data breaches, it’s very easy to see what relationships people have.” Where you bank, where you do business — that is all fodder for someone to create a copycat page designed to trick you into logging in.
Adopt an “investigator mindset,” Velasquez said. Use this helpful reminder: the acronym STAR, which stands for Stop. Think. Ask questions or ask for help. Reassess.
The ITRC nonprofit can answer questions, for free, through phone and live chat. Toll-free phone: 888-400-5530. Live chat staffed by people, not bots: https://www.idtheftcenter.org/victim-help-center/
San Diego, CA
San Diego State moves back into NCAA Tournament field in latest ESPN Bracketology
The San Diego State Aztecs’ have moved off the bubble and back into the NCAA Tournament’s Field of 64 in the latest ESPN’s Bracketology projections.
The Aztecs must feel like a yo-yo, but now it’s in a good way. Bracket expert Joe Lunardi moved them from the bottom of the First Four Out — No. 72 — to holding the Mountain West’s automatic bid after an 89-72 home romp Wednesday night over Utah State, which had held the auto-bid in bracketology for a few weeks now.
Lunardi now has the Aztecs as the No. 11 seed in the West Region, with a projected first-round date against former MW rival BYU in Portland.
Lunardi wrote that SDSU’s auto-bid “shifts the entire bubble.”
Wednesday night’s victory not only pulled the Aztecs (19-8, 13-4) into a tie with Utah State (23-5, 13-4) atop the MW standings, but it was just their second Quad 1 victory in six such opportunities.
SDSU’s next two games are both Quad 1 chances, at New Mexico on Saturday and then at Boise State on Tuesday night.
The win lifted the Aztecs only one spot in the NCAA NET Rankings, to No. 43. Those rankings are used by the NCAA Tournament Selection Committee as the primary sorting tool for selection and seeding for March Madness.
SDSU’s resume for earning an at-large berth has been on shaky ground all season, and was seriously damaged last week when the Aztecs lost at home to Grand Canyon and were then routed at Colorado State, both Quad 2 games.
SDSU’s best bet to assure a trip to March Madness for the sixth straight season is to win the MW tournament in Las Vegas and claim the automatic bid. That requires winning three games in as many days, and perhaps a third showdown against the Aggies, who beat the Aztecs 71-66 in Logan on Jan. 31.
Lunardi now has Utah State projected as an at-large team, but still with the No. 7 seed in the East, facing No. 10 Texas A&M in a first-round game in St. Louis.
New Mexico (21-7, 12-5), lurking just a game behind SDSU and USU, has dropped from the Last Four In at No. 68 to the First Four Out at No. 70.
The Aztecs were the unanimous preseason pick to win the MW regular-season title in their final season in the league before moving into the Pac-12 along with Utah State, Boise State, Fresno State and Colorado State.
Saturday’s game at New Mexico is set to tip off at 11 a.m. PT and will air on CBS.
San Diego, CA
Oregon State Dismantles San Diego 83-49
The top teams in the West Coast Conference are jockeying for position in the standings as the regular season draws to a close, and the Oregon State women took care of business Thursday night, blowing out the San Diego Toreros 83-49 to move to 21-9 on the season, and 13-4 in conference play.
Oregon State’s Tiara Bolden Grabs WCC Honor After 44 Points Over Two Games
The Toreros have been a basement dweller in the conference for the last few seasons, so this result isn’t surprising, though it’s magnitude is a bit eye-raising. The Beavers wasted no time putting San Diego into a hole, opening the first quarter on an 8-0 run that Tiara Bolden and Kennedie Shuler getting involved early. Oregon State held a 14 point, 26-12 lead after one.
The second quarter wasn’t as lopsided, but San Diego wasn’t able to make much headway into the Beaver lead. Six points from Olivia Owens kept San Diego within shooting distance, but defensive pressure from Kennedie Shuler and strong rebounding from Lizzy Williamson kept the Toreros under control. Oregon State ended the first half up by 13, 40-27.
Oregon State Dominates Cougars in 79-51 Blowout
Oregon State tightened their grip in the third. While Olivia Owens and Kylie Ray managed to give the Toreros some hope early in the quarter, Oregon State went on a run late in the period to get their lead to 21 at the highest. San Diego finally snapped the Beaver hot streak, but a three from Kennedie Shuler ended the quarter in a 61-43, 18 point Beaver lead.
The bottom seemed to fall out of San Diego in the fourth, with the Toreros only putting six points on the board. Tiara Bolden and Kennedie Shuler kept the points flowing for the Beavers, while Lizzy Willilamson continued to dominate the boards. A layup with an and one from Elisa Mehyar were the last Beaver points of the game, giving Oregon State a 34 point, 83-49 win.
Oregon State Takes Down Portland 64-54 in Season Saving Game
It was a good night for several Beavers, with Kennedie Shuler once again leading the team in scoring. She finished the night with 22 points, four rebounds, three assists, two blocks and two steals. She can do just about everything on the court.
Tiara Bolden continued her hot streak with a 17 point night, along with four rebounds and four assists. Jenna Villa added 14 points, one rebound and one assist. Lizzy Williamson added another double double to her resume, with 10 points and 12 rebounds.
Oregon State’s Winning Streak Ends With 55-51 Loss to LMU
There’s one last item on the agenda for Oregon State, a season-closing meeting with the Loyola Marymount Lions Saturday at Gill Coliseum. The Lions handed Oregon State their first WCC loss of the season back in January, so getting some revenge before the conference tournament would be a good statement from the team. Tip off is set for 1 PM PT.
San Diego, CA
Live in San Diego? The city wants your feedback on the next fiscal budget in a survey
Mayor Todd Gloria sought the public’s feedback Thursday in shaping San Diego’s 2026-27 fiscal year budget, as the city launched a digital survey to help determine which programs and services are prioritized and which are reduced.
The survey is available at datasd.typeform.com/2027budget.
Officials will use responses in crafting the new budget, which takes effect on July 1. The City Charter deadline to release a draft budget is April 15, “allowing ample time for resident feedback to be considered during budget discussions,” officials said.
Gloria said that the city has already “closed hundreds of millions of dollars of a longstanding structural deficit, but we are not done. The next budget will require even tougher choices, and I want to be clear with residents: We will not be able to do everything we might like to do.
“I’m asking San Diegans to take a few minutes to tell us what matters most to them, and what they’re willing to forgo, as we build next year’s budget,” he added.
The five-minute survey is open to residents living within San Diego city limits. Those without home computer access can fill out the survey at any city library.
According to Gloria’s office, the city’s projected deficit is $120 million for the next budget, which the city is required by law to keep balanced.
In addition to asking what residents’ top priorities are, the survey asks if the city “should generate more revenue to protect services.”
Offered in English and Spanish, the survey is available until the start of May.
Officials said residents can also sound off on the budget process by attending City Council budget meetings either in person or via Zoom.
Council members will discuss the budget during their March 10 meeting, which starts at 6 p.m. at the City Administration Building downtown.
Public library locations can be found at sandiego.gov/public- library/locations.
-
World2 days agoExclusive: DeepSeek withholds latest AI model from US chipmakers including Nvidia, sources say
-
Massachusetts3 days agoMother and daughter injured in Taunton house explosion
-
Montana1 week ago2026 MHSA Montana Wrestling State Championship Brackets And Results – FloWrestling
-
Louisiana5 days agoWildfire near Gum Swamp Road in Livingston Parish now under control; more than 200 acres burned
-
Denver, CO2 days ago10 acres charred, 5 injured in Thornton grass fire, evacuation orders lifted
-
Technology7 days agoYouTube TV billing scam emails are hitting inboxes
-
Technology7 days agoStellantis is in a crisis of its own making
-
Politics7 days agoOpenAI didn’t contact police despite employees flagging mass shooter’s concerning chatbot interactions: REPORT
