Tips Guard Against Phishing, Malware Attacks During Tax Season

AppRiver LLC, a provider of email messaging and Web security solutions, today released its latest Threat and Spamscape report as well as a new video offering taxpayers advice on how to safeguard against cyber scams while filing taxes online.

AppRiver’s Threat and Spamscape report traces and analyzes the spam and malware trends prevalent on the Internet. According to Fred Touchette, report author and senior security analyst at AppRiver, 84 percent of all email traffic surveyed in the month of March was spam.

“With billions of dollars changing hands online, tax season is primetime for Internet scams,” said Touchette. “The best defense for taxpayers is multilayered security that includes anti-virus software, email and Web filtering, and a strong firewall. Those tools, along with some good common sense, are the keys to keeping your money safe.”

A key highlight from the report describes how scammers exploit tax season by targeting tax preparers. Throughout the past several weeks, for example, cyber criminals have utilized the “Blackhole” toolkit to send virus-laden emails purportedly from the Better Business Bureau (BBB) as well as Intuit, a company known for their accounting software. With convincing graphics and formatting, messages warned recipients of accounting professionals who were engaging in fraudulent filing practices, details of which were viewable in an attached PDF file. In reality, the attachment was a link to a website hosting malware.

To avoid becoming a victim of a tax scam, Touchette shares these best practice tips:

  • Online fraudsters (a.k.a. “phishers”) will attempt to contact taxpayers via email, whereas the IRS will never initiate contact with a taxpayer through email.
  • The IRS will never ask for PIN numbers or credit card information via email.
  • Never click on a link, or an attachment, from an unsolicited email.
  • Never conduct unsecured transactions that include any account or password information over public hotspots, such as airports, hotels, libraries, restaurants, cafes, or other locations that offer free Wi-Fi services.
  • Always completely log out of sensitive sites. It is possible for an attacker to hijack a browsing session that has been left open.
  • Avoid using the same computer your children use. A good portion of online scams target today's youth, which often infects machines.
  • Remain vigilant and try to use simple logic -- if it seems too good to be true, and is sitting in your inbox, delete it.
  • Before entering sensitive information into a website, look for the security padlock symbol.
  • Create strong passwords by choosing passwords that are complex and utilize a combination of upper and lower case letters, numbers and symbols.

 

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.