San Diego, CA
This is the phishing scam that gets a San Diego identity theft expert ‘really, very angry’
Digital thieves are nothing if not persistent and innovative.
They keep finding new ways to try to part you from your money.
Phishing — where thieves pose as trusted entities or send legitimate looking emails or messages to trick you into giving them access to your accounts — is a widespread method. And it is constantly evolving.
“We’ve seen phishing go through the roof,” said Eva Velasquez, the CEO of the Identity Theft Resource Center, a San Diego-based national nonprofit.
But knowledge is power. So here are three emerging phishing threats to look out for, according to internet safety experts. All three threats target key parts of people’s digital lives: email attachments that lead to fake login pages, multi-factor authentication trickery and deceptive calendar invites.
Spending a few minutes reading these pointers could help you avoid getting your ID or money stolen and save you countless hours of dealing with the fallout.
HTML attachments that open fake login pages
Imagine a busy professional who is in email action mode. In the past 30 minutes on a Saturday morning, he has filled out emailed liability waivers for his seven children’s summer camps, filed an expense report for work, answered a secure portal message from the veterinarian about his sick puppy’s prescription, skimmed 182 email subject lines and paid five bills from his email inbox, including a car insurance premium and his beloved cheese-of-the-month club.
Amid this flurry of inbound emails, ads, invoices and secure messages, he is working on autopilot: opening messages, skimming, clicking and signing in.
What a perfect opportunity.
Scammers are taking advantage of user distraction — and their trust — by sending emails with HTM or HTML attachments. When clicked, those open a browser file that looks like secure, familiar login page. These pages might look like secure invoice viewers, file-sharing services like DocuSign or Dropbox, or sign-in pages to platforms including Microsoft 365.
“Once the user enters their credentials, they are sent surreptitiously to the attacker’s server,” said Vlad Cristescu, the head of cybersecurity with ZeroBounce, a Florida company that helps businesses lower their rate of bounced marketing emails.
Why this method is especially insidious: “There isn’t a clickable link in the email, so standard email security filters (which scan for malicious URLs or attachments like PDFs and ZIPs) may not catch it,” Cristescu added.
To prevent this, he added, companies should “restrict HTML attachments unless essential, and users should treat unfamiliar HTML files the same way they’d treat a suspicious link — don’t open it unless you’re absolutely sure of the sender.”
If you do receive incoming communication with an HTML link or attachment, don’t engage, said Velasquez, with the ITRC.
“Don’t click on links, people. That’s the big, overarching message,” she said. Instead, go to the source: call the phone number on the back of your credit card, visit the bank in person.
Multifactor authentication tricks
If you are one of the many people who uses multifactor authentication, take note.
Multifactor authentication is still very helpful and should be used.
But Cristescu flagged one way that scammers are taking this tool — which is designed to make people’s online accounts more secure — and using it to slither in.
As a refresher, multifactor authentication is an added layer of protection that prevents data thieves from logging into your accounts if they have your username and password. It helps ensure that you’re the one who typed in your password when you log in, and not some scammer in the Philippines or Poughkeepsie.
To use multifactor authentication, you typically download an app, such as Google Authenticator or Microsoft Authenticator. You register your sensitive online accounts, such as Facebook, bank or email, with that app. Then, every time you log into a registered website, the authenticator app generates a new, random code that you enter after your password as a second layer of verification.
With the rise of this protection, a new threat has emerged: Scammers who have your username and password can send log-in requests to your authenticator app. Next, the scammer can pose as an IT expert from your workplace and ask you to approve the log-in request.
If you fall for it, then boom — the scammer is in.
This technique “exploits a user’s frustration and trust in IT. If you’re receiving multiple (authenticator) prompts you didn’t initiate, that’s not a glitch – it’s an attack,” Cristescu said. He recommends pausing, never approving these unexpected requests and flagging the interaction with IT.
Velasquez added that if you get an authenticator notification and you didn’t just log in yourself, “That is a huge red flag. Stop and address it. Don’t ignore it.”
Anytime you interact with IT, be sure you’re the one initiating that contact, she added. If someone from IT calls or emails you, disconnect and reach back out using a trusted method, such as the same phone number you always dial.
Fake calendar invites
A third technique data thieves are using is calendar invites.
“I just get really very angry about this one,” Velasquez said. “It is super hard to detect.”
Here’s what to look out for. If you use an online calendar like Google calendar or the native iPhone calendar app, you might receive an invitation to an event you didn’t see coming. Sometimes these meetings are legitimate. Sometimes, they are not.
Scammers “are now sending meeting requests with malicious links embedded in the invite or ‘join’ button. These invitations sync directly into calendars and often go unquestioned,” according to ZeroBounce.
Scammers use calendar invites because they have “built-in credibility – they’re not usually scrutinized like emails,” Cristescu said. Look for meeting requests from unknown senders and vague event names like “Sync” or “Project Review,” he added.
In some jobs or roles, meetings routinely get added to calendars by other people — clients, prospects, coworkers, bosses, peers.
“I have gotten these repeatedly,” said Velasquez, with the ITRC. “Depending on your lifestyle and your job and how you work, these are going to be particularly challenging. They are real calendar invites. The problem is they have malicious software embedded in them — so when you click on portions of them, ‘Click to join,’ it’s like opening an attachment (or) clicking on a suspicious link. It’s the same principle.”
Cristescu, with ZeroBounce, shared this tip: “Treat those just like a phishing email. Disable auto-accept where possible and review every invite manually before clicking anything.”
Never stop questioning what lands in your inbox or calendar, Cristescu added. “Always verify the sender’s email address, ensure that any link you click matches the legitimate domain, and look out for subtle red flags like spelling errors or unusual formatting.”
A big picture pointer
“All three of these (scams) are so common that it has probably happened to every single person reading the article — at least one of them. That’s how ubiquitous these are,” Velasquez said.
She shared this broader thought: It’s less important to know how to respond to each scenario and more important to pause, be skeptical, double check.
It’s important to be ever more skeptical, because AI makes it easier and easier for thieves to create convincing ruses, Cristescu and Velasquez both said.
AI “really helps with making these phishing offers look and sound so much more legitimate,” Velasquez said. “And with the amount of data that is out there from public sources and from data breaches, it’s very easy to see what relationships people have.” Where you bank, where you do business — that is all fodder for someone to create a copycat page designed to trick you into logging in.
Adopt an “investigator mindset,” Velasquez said. Use this helpful reminder: the acronym STAR, which stands for Stop. Think. Ask questions or ask for help. Reassess.
The ITRC nonprofit can answer questions, for free, through phone and live chat. Toll-free phone: 888-400-5530. Live chat staffed by people, not bots: https://www.idtheftcenter.org/victim-help-center/
San Diego, CA
San Diego health officials monitor hantavirus situation as cruise ship passengers return to U.S.
SAN DIEGO (KGTV) — American passengers from a cruise ship hit with a hantavirus outbreak are back in the United States.
San Diego County health officials say they are monitoring the situation and there is no need for panic.
“The risk to Californians is really low and especially here in San Diego. Since the year 2000, we’ve only had 4 cases of hantavirus and the majority of those were in travel related cases so not even acquired here locally,” Ankita Kadakia, deputy public health officer for the County of San Diego, said.
According to the CDC, hantavirus is spread through contact with infected rodents.
“The virus can be in their saliva, feces or droppings,” Kadakia said.
San Diego County does see cases of rodents infected with hantavirus, but the strain seen locally is not the same strain connected to the cruise ship outbreak.
“The vast majority of strains of hantavirus are mouse or animal to human transmission. Not human to human transmission. So the Andes strain, which is found in Argentina, there is evidence that there is human to human transmission,” Dr. Ahmed Salem, a pulmonologist at Sharp Memorial Hospital, said.
Salem treated hantavirus during the 2012 Yosemite National Park outbreak.
“One of the ways you die from hantavirus is you get a collapse of your cardiac system and your pulmonary system and you have to go on something called ECMO. It’s one of the most aggressive forms of life support that you can do. So I do remember that case, and unfortunately, that person passed away,” Salem said.
There is currently no cure or vaccine for hantavirus. Health officials stress that for those who were not on the cruise ship, the risk of contracting the virus remains low.
This story was reported on-air by a journalist and has been converted to this platform with the assistance of AI. Our editorial team verifies all reporting on all platforms for fairness and accuracy.
San Diego, CA
Machado's walk-off lifts Padres to 10-inning comeback victory over Cards
Here’s some instant reaction from the Padres’ wild 3-2 victory
San Diego, CA
Padres come back, walk off with win over Cardinals to split series
It seemed like the same tired story.
Instead, it was the same thriller.
The Padres pushed their offensive lethargy as long as possible without paying for it Sunday, tying the game with two outs in the ninth inning on Nick Castellanos’ two-run homer and then celebrating after Manny Machado’s sacrifice fly in the 10th inning gave them a 3-2 victory over the Cardinals.
“Getting it done,” Machado said.
That’s it. That is all they are doing.
And at what is essentially the quarter mark of the season, the Padres are 24-16 and tied with the Dodgers atop the National League West.
The shocking component of their having the major leagues’ fifth-best record is that the Padres rank in the bottom three among MLB’s 30 teams in batting average and OPS.
They split with the Cardinals despite having 14 hits, their fewest in a four-game series in franchise history. Their 61 hits over their past 10 games are the fewest in a stretch that long since 2019, and they are 5-5 in those games.
“It sucks; we need to hit; Machado said. “I mean, you know, look, it’s obvious. We’re not hitting. It’s obvious, but we’re getting things done, man.”
Sunday was the Padres’ 12th victory this season in which the decisive run was scored in the seventh inning or later. That is exactly half their victories.
It was their fourth walk-off victory, their second in extra innings. It was the seventh time that a run scored in their final offensive half-inning decided a victory.
So it is no small thing to proffer that Sunday was possibly their most dramatic triumph. Because it was possibly their most unlikely one.
Not only were they a strike away from defeat, but they began the ninth inning having gotten two hits all day.
The Cardinals took a 2-0 lead in the fourth inning on their first two hits off Walker Buehler — a single by Alec Burleson and a home run by Jordan Walker with two outs. Buehler pitched six innings, allowing just one more hit before Ron Marinaccio worked two scoreless innings.
But the Padres were unable to make anything of their seven at-bats with runners in scoring position over the first eight innings. They had walked five times but had just Jackson Merrill’s third-inning single and Xander Bogaerts’ fourth-inning double to that point.
“Really good teams find ways to win games when they’re not doing their best,” Gavin Sheets said. “… We’re not clicking on all cylinders by any means. And I don’t think any of us would say that he’s on a roll right now, but we’re getting hits in a timely fashion and it’s someone different every night.”
Almost.
The Padres have game-winning RBIs from 10 different players. They have go-ahead RBIs from 13 of the 14 position players who have been on their roster this season. Sunday was Castellanos’s third game-tying RBI.
His home run, on the ninth pitch of his at-bat against Cardinals closer Riley O’Brien, was something of a clinic by a veteran hitter who is in his first season as a role player.
Castellenos, who entered the game as a pinch-hitter in the seventh inning and remained in right field, came to the plate with Bogaerts at first base with two outs.
Bogaerts’ single leading off the inning had been followed by two strikeouts, and Castellanos fell behind 0-2 before working the count full and then sending a 99 mph sinker on the inner edge of the plate almost to the ribbon scoreboard fronting the second level of seats beyond left field.
“The first pitch started, and I was probably looking to do what I did,” he said. “And then I ended up getting 0-2 and chasing. After that, just took a deep breath and tried to shorten up as much as possible and just compete. Just find a way on base. And then found myself in a full account and was able to get the job done.”
It was the first home run allowed by O’Brien this season.
With closer Mason Miller not available after throwing 29 pitches over 1⅓ innings on Saturday, Jeremiah Estrada got the first two outs of the 10th. With runners on first and second, Adrian Morejón entered the game and got an inning-ending pop out on his first pitch.
Gordon Graceffo was on the mound for the Cardinals, and Ramón Laureano was the Padres’ automatic runner in the 10th. The Cardinals intentionally walked Merrill at the start before Fernando Tatis Jr. whittled a 1-2 count into a walk to load the bases.
The game was over one pitch later, when Machado sent a fastball to right-center field and Laureano slid across the plate well in front of right fielder Jordan Walker’s throw.
It was a somewhat subdued but still enthusiastic celebration along the first-base line, as teammates bounced around Machado.
“It’s hard to win a game like that,” Padres manager Craig Stammen said. “Their pitchers pitched great, and they’re bringing in one of the best closers in the game. And we just stuck with it. It just speaks to how those guys believe in themselves and how they believe in what we’ve got going on as a team.”
-
Movie Reviews6 minutes agoFilm Review: ‘The Wizard of the Kremlin’ Finds Paul Dano and Jude Law in a Compelling Throwback Political Drama – Awards Radar
-
World18 minutes ago
A South Korean startup captures workers’ techniques to develop AI brains for robots
-
News24 minutes agoInstructure Strikes Deal for Hackers for Return of Canvas Data
-
Politics30 minutes agoJudge Again Delays Guantánamo’s First Death-Penalty Terror Trial
-
Business36 minutes agoChina Increasingly Views Trump’s America as an Empire in Decline
-
Science42 minutes agoScientists Press Congress on Dismissal of National Science Foundation Board and Research Funding
-
Health48 minutes agoA Single Infusion Could Suppress H.I.V. for Years, Study Suggests
-
Culture1 hour agoBook Review: ‘When the Forest Breathes,’ by Suzanne Simard

