Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Scandi-style tiny house combines smart storage and simple layout
    • Our Favorite Apple Watch Has Never Been Less Expensive
    • Vercel says it detected unauthorized access to its internal systems after a hacker using the ShinyHunters handle claimed a breach on BreachForums (Lawrence Abrams/BleepingComputer)
    • Today’s NYT Strands Hints, Answer and Help for April 20 #778
    • KV Cache Is Eating Your VRAM. Here’s How Google Fixed It With TurboQuant.
    • OneOdio Focus A1 Pro review
    • The 11 Best Fans to Buy Before It Gets Hot Again (2026)
    • A look at Dylan Patel’s SemiAnalysis, an AI newsletter and research firm that expects $100M+ in 2026 revenue from subscriptions and AI supply chain research (Abram Brown/The Information)
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Sunday, April 19
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»Technology»Scammers Will Try to Trick You Into Filling Out Google Forms. Don’t Fall for It
    Technology

    Scammers Will Try to Trick You Into Filling Out Google Forms. Don’t Fall for It

    Editor Times FeaturedBy Editor Times FeaturedAugust 31, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link


    One of many lesser-known apps within the Google Drive on-line suite is Google Kinds. It is a straightforward, intuitive option to create an internet type for different individuals to enter data into. You need to use it for worker surveys, for organizing social gatherings, for giving individuals a option to contact you, and rather more. However Google Kinds can be used for malicious functions.

    These kinds might be created in minutes, with clear and clear formatting, official-looking photos and video, and—most significantly of all—a real Google Docs URL that your internet browser will see no drawback with. Scammers can then use these authentic-looking kinds to ask for fee particulars or login data.

    It is a kind of rip-off that continues to unfold, with Google itself issuing a warning about the issue in February. College students and employees at Stanford College had been amongst these focused with a Google Forms link that requested for login particulars for the tutorial portal there, and the assault beat normal electronic mail malware safety.

    How the Rip-off Works

    Google Kinds are fast and straightforward to place collectively.

    David Nield

    These scams can take quite a lot of guises, however they’re going to sometimes begin with a phishing electronic mail that may attempt to trick you into believing it is an official and real communication. It is perhaps designed to appear to be it is from a colleague, an administrator, or somebody from a good group.

    The obvious high quality and trustworthiness of this authentic phishing email is a part of the con. Our inboxes are repeatedly stuffed with requests to reset passwords, confirm particulars, or in any other case take motion. Like many scams, the e-mail would possibly counsel a way or urgency, or point out that your safety has been compromised ultimately.

    Even worse, the instigating electronic mail would possibly really come from a reputable electronic mail handle, if somebody in your social circle, household, or workplace has had their account hijacked. On this case you would not be capable to run the same old checks on the sender identification and electronic mail handle, as a result of all the things would look real—although the wording and elegance could be off.

    This electronic mail (or maybe a direct message on social media) might be used to ship a Google Kinds hyperlink, which is the second half of the rip-off. This kind will most frequently be set as much as look real, and could also be attempting to spoof a acknowledged website like your workplace or your financial institution. The shape would possibly immediate you for delicate data, supply up a hyperlink to malware, or characteristic a cellphone quantity or electronic mail handle to guide you into additional hassle.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    Our Favorite Apple Watch Has Never Been Less Expensive

    April 19, 2026

    The 11 Best Fans to Buy Before It Gets Hot Again (2026)

    April 19, 2026

    Hisense U7SG TV Review (2026): Better Design, Great Value

    April 19, 2026

    Best Meta Glasses (2026): Ray-Ban, Oakley, AR

    April 19, 2026

    How Can Astronauts Tell How Fast They’re Going?

    April 19, 2026

    The ‘Lonely Runner’ Problem Only Appears Simple

    April 19, 2026

    Comments are closed.

    Editors Picks

    Scandi-style tiny house combines smart storage and simple layout

    April 19, 2026

    Our Favorite Apple Watch Has Never Been Less Expensive

    April 19, 2026

    Vercel says it detected unauthorized access to its internal systems after a hacker using the ShinyHunters handle claimed a breach on BreachForums (Lawrence Abrams/BleepingComputer)

    April 19, 2026

    Today’s NYT Strands Hints, Answer and Help for April 20 #778

    April 19, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    New green ammonia method uses human-made lightning

    July 7, 2025

    OpenAI’s latest product lets you vibe code science

    January 27, 2026

    A Caching Strategy for Identifying Bottlenecks on the Data Input Pipeline

    June 27, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.