Don’t Fall for the “The Following Is Your Very Last Notification” Email Scam

The “The Following Is Your Very Last Notification” email ominously popping up in inboxes across the country has users on edge. Is this a credible threat or something more sinister? This alarming message claims to have compromised your device and obtained access to your most private information. Threatening to expose embarrassing materials unless their ransom is paid, the email has all the hallmarks of an extortion scam. But could it actually be real?
In this comprehensive investigation, we’ll uncover the truth about this viral scam and equip you with the knowledge needed to protect yourself. You’ll learn how to spot the tell-tale signs that this “hacked device” email is a fraudulent deception. 

Scam Email

Overview of the Scam

The “The Following Is Your Very Last Notification” is the latest example of an extortion scam making the rounds through spam emails. This fraudulent scam message claims to have hacked your device in order to access personal information, recordings through your camera or microphone, browsing history, and other sensitive data.

The “The Following Is Your Very Last Notification” email then threatens to leak or publicly share any embarrassing, inappropriate or compromising materials they’ve allegedly uncovered unless you pay a ransom demand in bitcoin. This is why it is sometimes referred to as a sextortion or hacker extortion scam.

The alarming “The Following Is Your Very Last Notification” email is crafted to appear credible and make recipients panic, hoping they will pay up out of fear. However, cybersecurity experts confirm this is just a scam attempt and no actual hacking has occurred. The cybercriminals behind it are simply trying to extort money through deception, intimidation, and empty threats.

Anatomy of the “The Following Is Your Very Last Notification” Scam Email

While specific wording may vary, these fraudulent extortion emails tend to share common elements:

  • A subject line stating your device, accounts or operating system was hacked, often citing an exact date. For example: “Your device was hacked on January 1, 2023.”
  • Claims of remotely accessing or compromising your device, including gaining control over your camera, microphone, and screen monitoring capabilities.
  • Assertions they’ve been tracking your online behaviors and activities for an extended period of time, sometimes weeks or months.
  • Threats that they will share or leak edited videos, photos, audio recordings or sensitive information if payment is not received. These materials are often described in an embarrassing or compromising manner.
  • A deadline demanding payment within 24-48 hours, sometimes citing they will increase the amount after that timeframe. This creates a sense of urgency.
  • Payment instructions directing victims to send funds in bitcoin or other cryptocurrencies to a specific wallet address provided.
  • Assurances that they will immediately destroy or delete all of the data, footage and malware after the ransom payment is received.
  • Attempts to intimidate the recipient and instill fear that their reputation, relationships or livelihood could be ruined if the materials are leaked.
  • Warnings not to go to the police or seek help, as there is “no way to stop the release” once their process begins.

To give it the appearance of a hack, the email may contain the recipient’s username or email address in the message. Some variants even spoof the sender’s email address to look like an official notice from a service provider.

Here is how the “The Following Is Your Very Last Notification” email may look:

Hey There.

The following is your very last notification.

I compromised your operating system thru the Wifi modem you were connecting to.

Several weeks prior, I entered the systems that you previously used to get on-line.

All the info from your electronics and devices has been immediately duplicated to my hosting space.

I can take advantage of all your cellphone messengers, social media sites, emails, chats, & list of contacts.

My trojan regularly changes its signature (driver-type), for that reason it remains not visible to anti-virus software.
I suppose now you understand, the reasons why I remained unseen until this current day

Whilst get together infos about yourself, I discovered that you are a big fan of porno sites and much more.
You really love to visit mature web pages and view kinky videos whilst getting an orgasm.

I have surely created a cam recording of you jacking off.
The cropping and editing of the videos you were seeing at the same time and your masturbation.
Your own facial expression is clearly seeable. I don’t believe this sort of information will be good for your personal status.

I can direct this video footage out to everybody who know who you are.

I also have no trouble with making all your confidential information open public on the net.
I do believe you know what I mean.

It may be an absolute frustration for you personally.

I can wreck your life forever.

I suspect that you seriously don’t want this to occur.

Let us fix it this way: you transfer me 1300 $ (usd) using btc equivalent at the moment of exchange), and i’ll promptly get rid of all of your data from my machines.
Proceeding that, we’ll forget about one another.

My bitcoin wallet address for transfering: 112b2rLHpqs6fjmpvxmEEghhDWTY6HL1v3

If you do not realize how to transmit money and what exactly btc is. Then key in the Google “Get btc”.

I give you 3 days to send the funds.
The time launched counting automatically after you opened this e
mail.
I will see a message when this email is exposed.

Do not try and search for help, as the wallet address cannot be monitored, e-mail the letter is coming from & cannot be followed either & generated automatically, so there is no reason for messaging me.
Don’t try to get hold of the police and other security services, & should you choose to do, your own information will undoubtedly be posted.

Changing passwords online in social network sites, e mail, & devices will not help you, since all the info is already downloaded to my servers.

Good luck and try to not do something foolish. Think of your possible future.

Goals and Motives of Scammers

The core goal is to extort money through false threats, deception, and social engineering. Specifically, the scammers aim to:

  • Craft an email that appears legitimate and credible on the surface.
  • Make alarming claims that private videos or information were obtained through hacking.
  • Leverage embarrassment, fear and panic to prevent clear thinking.
  • Force quick payment by creating a sense of urgency with a short deadline.
  • Demand payment through difficult-to-trace cryptocurrency like bitcoin.
  • Scare and manipulate people into paying ransom out of desperation.
  • Threaten ruining a person’s reputation or livelihood as extra intimidation.
  • Sow enough doubt that victims question whether their device was truly hacked.
  • Convince recipients that paying a small ransom is “easier” than dealing with the alleged consequences.

By preying on a victim’s worst fears of embarrassment or reputation destruction, the scammers increase their chances of compliance. Even a very low success rate can prove profitable if millions of emails are sent out.

Who is Vulnerable to the Scam?

In truth, we’re all potentially vulnerable to a well-crafted extortion scam that instills fear. However, the email is designed to specifically target those who:

  • Have engaged in private online behaviors they wish to keep secret, such as adult content or infidelity.
  • Tend to experience feelings of shame or embarrassment when it comes to their private activities being exposed.
  • Would go to great lengths to avoid having their online reputation damaged or relationships harmed.
  • Are not technically savvy enough to recognize an obvious scam attempt and email spoofing.
  • Are prone to reacting hastily out of emotion instead of thinking rationally.
  • Have the available funds on hand to easily pay the ransom amount being demanded.
  • Are unwilling to take the small risk that the threats could be carried out.

The scammers know that only a small percentage of recipients likely meet this criteria. But within a massive email blast, a 1% success rate could still amount to thousands of victims and major profits.

Tools and Techniques Used

To carry out this scam on such a wide scale, hackers utilize a range of black hat cybersecurity tools and illicit techniques, including:

  • Malware, keyloggers or Remote Access Trojans (RATs) to harvest emails and compile massive distribution lists.
  • Botnets rented through black market sites on the dark web which allow sending millions of emails.
  • Anonymous encrypted email accounts hosted outside mainstream providers’ domains.
  • Services or software to spoof legitimate email headers and sender addresses.
  • Bitcoin mixers and tumblers to launder cryptocurrency payments and obfuscate transaction trails.
  • Disposable cryptocurrency wallets that can quickly be generated then abandoned after payments are withdrawn.
  • Encryption, obfuscation and anonymity tools to avoid tracking or backtracing by authorities.

By covering their tracks and utilizing anonymity tools, the scammers hope to avoid ever getting caught. Law enforcement has found these scams extremely difficult to prosecute due to their global nature and technical sophistication.

How the “The Following Is Your Very Last Notification” Scam Works

Here is a step-by-step look at how this scam typically operates:

1. Scammers Obtain Massive Email Lists

The first step is compiling a massive list of target email addresses. These are harvested from various sources:

  • Hacking databases and contact lists from vulnerable websites and companies.
  • Buying emails in bulk on the dark web hacker forums.
  • Utilizing malware and spyware to infect devices and steal contacts.
  • Phishing for account credentials then logging into accounts to export email contacts.
  • Scrapping public sites, social media, and forums for publicly posted email addresses.

The scammers cast an extremely wide net, compiling millions of emails through both legal and illegal means. Quantity is their priority.

2. The Fraudulent Email is Crafted

Next, the scammer designs the scam email to appear credible on the surface. Technical details and personal information are fabricated to make the claims seem plausible.

Examples of false evidence they might include:

  • Screenshots that appear to show your desktop or online activities.
  • IP address, location, device details, or password hints.
  • Names, dates, times, and snippets of any personal data.
  • Attachments pretending to contain compromising images or recordings.

In reality, none of this fabricated information comes from real hacking or monitoring. But it plants the seed of doubt that their claims could be true.

3. The Email Blast Commences

Using compromised computers and stolen servers, the scammers distribute the extortion email en masse. Millions of recipients will end up in the spam folders of innocent victims.

Distribution techniques include:

  • Botnets – networks of infected devices that distribute spam.
  • Hacked websites – inserted code that injects emails into outbound traffic.
  • Black market email services – pay for access to millions of spoofed addresses.
  • Open relays – insecure mail servers used to mask the origin.

The sheer massive scale of the email blast increases the criminal’s chance of success.

4. Recipients React with Fear or Anger

Upon receiving the alarming claims and threats in their inbox, most recipients will experience either:

  • Fear that the threats could be real and not paying could ruin their lives.
  • Anger at the scammers for attempting such a brazen extortion scheme.

But these emotional reactions are precisely what the criminals intend. Clear thinking goes out the window when we’re reacting from fear or rage.

5. A Percentage of Victims Pay the Ransom

Despite all the evidence pointing to it being a scam, some small percentage of recipients will give in and pay the ransom demand. This is driven by:

  • Panic that the threats could be real.
  • Desperation to avoid the threatened consequences.
  • Embarrassment and wanting to keep perceived misdeeds secret.
  • Lack of technological skills to recognize an obvious scam.
  • Having the disposable income to easily make the payment.
  • Unwillingness to take even a small risk of being exposed.

Even if only 1% pay, that can equal thousands of payouts and huge profits for scammers.

6. Scammers Withdraw and Launder the Funds

Once cryptocurrency payments come flowing into their falsely generated bitcoin wallet, the scammers quickly withdraw it.

They utilize crypto laundering techniques to cover their tracks:

  • Cryptocurrency mixers – tools for swapping between different cryptocurrencies.
  • Chain hopping – spreading funds across multiple blockchains.
  • Transaction splitting – breaking payments into smaller, harder to trace amounts.
  • Obfuscation – providing false sender and receiver information.

Within days, the payments are withdrawn, laundered, and cashed out. The temporary crypto wallets used are then discarded.

7. Recipients Realize it Was Fake

After the time has passed, recipients realize:

  • No damaging videos or information was ever released.
  • Their accounts and devices were not actually hacked.
  • The threats were completely fabricated with no truth behind them.

But for those who paid, it’s too late. The scammers have disappeared with their money.

8. Scammers Repeat the Process

Rinse and repeat. The scammers simply refine the scam emails and send out new batches to more email lists.

Minor tweaks might be made to:

  • Update the subject lines, threats, and payment amounts.
  • Adjust the technical details and false evidence provided.
  • Link to new bitcoin wallets.

Then they blast out millions more emails and count their profits from victims who fall prey to the social engineering and threats.

What to Do If You Get the “The Following Is Your Very Last Notification” Email

If you receive an email claiming your operating system was hacked under their direction, here are important steps to take:

1. Do Not Panic or Act Rashly

This is easier said than done, but do not let fear or embarrassment push you into paying the ransom. The threats are not real. Take a deep breath and think it through.

2. Do Not Reply to the Email

Replying will confirm your email is active. Instead, delete the email right away to avoid further scam attempts.

3. Check Your Accounts for Suspicious Activity

Log into your email, social media, and bank accounts to look for any signs of actual compromise. But usually there will be no indication of a hack.

4. Run a Security Scan on Your Devices

Run a full system security scan using anti-virus software like Malwarebytes and HitmanPro to check for malware or unauthorized access. But again, it’s unlikely anything will turn up.

5. Change Passwords on Important Accounts

Changing passwords is always smart online security practice. Use unique, complex passwords for each account. Enable two-factor authentication where possible.

6. Report the Email to Your Email Provider

Forward the scam email to spam@uce.gov and your email provider (e.g. Google, Yahoo) so they can block further emails.

7. Contact the FBI Cyber Crime Division (optional)

You can report the scam attempt to the FBI’s Internet Crime Complaint Center at ic3.gov. This helps authorities track cyber crime trends.

8. Educate Yourself on Sextortion Scams

Learn to recognize the signs of a sextortion scam so you won’t fall for it in the future. See the bottom line for more resources.

9. Seek Help if You Already Paid the Scammers

If you did pay the ransom, immediately contact your bank/crypto exchange and cyber crime authorities. There may be ways to stop the transfer or trace the scammers. Don’t be embarrassed – scammers are experts at manipulation.

Is Your Device Infected? Check for Malware

If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.  

Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.

Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android

Scan your computer with Malwarebytes for Windows to remove malware

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes for Windows

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Your computer should now be free of trojans, adware, browser hijackers, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Scan your computer with Malwarebytes for Mac to remove malware

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your Mac should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Scan your phone with Malwarebytes for Android to remove malware

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


Your phone should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

Frequently Asked Questions About the “The Following Is Your Very Last Notification” Scam Email

1. What is the “The Following Is Your Very Last Notification” email scam?

The “The Following Is Your Very Last Notification” scam is a fraudulent extortion email threatening to expose private videos, information or photos unless a ransom is paid in bitcoin. The email claims hackers used malware to access your device and compromise your operating system. However, it is just a scam trying to extort money through fear and deception. No actual hacking occurred.

2. What are some typical claims made in the scam email?

Common claims in the scam email include:

  • Hackers remotely accessed your device and operating system.
  • They have been monitoring your online activities through your camera and microphone.
  • Compromising videos or information were obtained that will be shared if payment is not sent.
  • Urgency to pay the ransom in bitcoin within 24-48 hours.
  • Promises to delete the data after payment.
  • Warnings not to go to the police.

3. What are red flags that indicate it’s a scam?

Red flags include:

  • Threats with no evidence. They don’t provide any actual proof of hacking.
  • Contradictory claims. Why delete data after payment if the goal is to expose you?
  • Requests for unusual payment methods like bitcoin.
  • Bluffing with no intention to follow through on threats.
  • Emails sent en masse to random people. Real hackers would target individuals.

4. What information do the scammers actually have?

The scammers do not have any actual videos, images or recordings of you. They are simply sending mass emails to frighten people into paying. Any personal details in the email were fabricated.

5. What should I do if I receive this scam email?

If you get this email, report it as spam and do not reply. Check your accounts for unauthorized access. Change passwords and enable two-factor authentication. Do not pay any ransom demands, as this only encourages more scam attempts.

6. What if I already paid the ransom?

If you paid, immediately contact your bank and local authorities about tracing the payments. Provide them with details of the scam email. In future, stay calm when faced with threats and carefully verify claims before paying. Many have fallen victim to this scam out of haste and fear.

7. How do I report this scam?

Forward the scam email to the Anti-Phishing Working Group (reportphishing@antiphishing.org). Report it to the FBI’s IC3 at www.ic3.gov. Notify your email provider and necessary contacts about the scam.

8. How does this scam work technically?

The scammers use botnets and malware to blast out millions of emails. They use technical tricks to hide their identity and launder money. Do not reply – this could infect your device. Simply delete the scam email.

9. How can I improve my online security?

Practice good online security by using unique complex passwords, enabling two-factor authentication, updating software and running antivirus scans. Be cautious of links and attachments from unknown sources. Backup your data regularly.

10. Am I at risk if I don’t pay the ransom?

No, you are not at any real risk if you don’t pay. The scammers are just trying to scare you with empty threats. No evidence will actually be released, so don’t give in to their demands.

The Bottom Line on the “The Following Is Your Very Last Notification” Scam

This viral scam preys on fear and embarrassment, but don’t let it fool you. Remember:

  • The claims are fake – your device was not hacked.
  • No compromising videos exist – it’s an empty threat.
  • Don’t pay the ransom – you’d just lose money.
  • Report the scam email to raise awareness.
  • Check your online accounts for real unauthorized access.
  • Use unique passwords and enable two-factor authentication.

With vigilance and awareness, we can avoid falling victim to these deceptive online scams. For more help, check out resources like the FTC’s page on sextortion scams or this YouTube video explaining the hacker extortion email scam. Don’t let them intimidate you – knowledge is power against these fraudsters!

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.