Phishing: Learn how to protect yourself


Phishing, a topic increasingly addressed in society, especially in the media. But despite the great focus it has gained, the topic of phishing is still largely unknown. But after all, what is it and how can it be protected from phishing?

Foreign term, with global impact. Second Kasperskyand its most recent report, identified 430 million attempts to phishing only in 2020. Scary numbers on a subject that not everyone knows what it is, nor how to protect themselves.

Online Schemes

Phishing: What is it?

Nothing more, nothing less, than a tactic to manipulate people so that these provide your personal data and confidential, such as passwords or bank account number. With so many people trying to deceive ordinary citizens, it is obvious that there are numerous phishing tactics. One of the most common refers to the sending an email or text message what if it passes by a person or entity where the person would normally trustas a colleague, friend, bank entity or stores dear to the public.

Most of the time, information is sent that will leave the user in startle. That is, often on some amount that is not settled, a debt, etc. In the email or message there is a link that provides the user with the possibility to take immediate action on the situation, without paying the consequences.

By clicking on this link, you will be taking the bait and falling into the trap. You will be redirected to a website that Apparently looks trustworthy. You will soon be asked to do Login with your usual credentials. By doing so, you will be providing your confidential data and the opportunity to be stolen.

Phishing - How to protect yourself

What are the different types of Phishing?

As with all schemes, there are several ways to do this. Discover some of them below.

Spear Phishing: Attacks of this kind are aimed at a specific person or organization. They usually reach the person with content created to suit the victim. That is, it requires a greater person’s knowledge before the attack, where they usually already seek to know the so-called “common information”: names, title, e-mail, etc.

Clone Phishing: As the name implies, in this type of attack a clone. of what? From an e-mail or means of contact that is familiar and reliable. However, the phisher make a single alteration: the link that goes in this message. So that you can go to the website created by him.

Nigerian Schemes: It sounds like something straight out of a Hollywood movie, but it really is one of the oldest strategies on the Internet. With this scam, the phisher sends you an email claiming that he is a member of the Nigerian government or royal family, and that he is in search for help to transfer millions of dollars out of Nigeria. You will receive this email as “urgent” or “private”, in order to give you a stronger character and unleash a immediate reactionwithout much thought, where you provide your bank account number.

Phone Phishing: This method, which is not so common, but which consists of a phone call where the phisher impersonates a credible entity (bank, police or even Finance) and gives him the understanding that he needs to make a payment via electronic transfer or prepaid cards. paid, making it impossible to identify them.

SMS Phishing: Exactly the same strategy as Phone Phishing, only instead of a phone call, you receive a text message.

what is phishing

After so many styles of attacks, clearly you must find this whole situation a little scary, and if there are so many ways, how can you protect? Don’t worry, we’ll offer you some tips.

As we are used to saying in Portugal: if something doesn’t “smell good”, it has a reason. If you suspect a phishing attempt, try to look for the following factors: if you know the source of the contact (but you don’t usually speak), if the message seems scary, if it contains any attachments or unexpected information, if it comes with a link that seems a little strange and unusual.

How can you protect yourself?

There are some tips to protect yourself. Between them:

  • Do not open an email from a sender who don’t know.
  • don’t click on any link where you are not sure where it will end up.
  • If you receive an email from a bank, creditor, or other, and you want to clear up your doubts, please contact them. directly and never through the link sent to you.
  • If you think the email is unreliable, search for it on Google to see if there is already an attack complaint
  • If the link provided to you starts with “HTTPS” instead of “HTTP”, it means that the website is secure (“S”). However, this does not mean that it is trustworthy.
  • Do not take immediate action, if you think you are facing a possible phishing attack, read carefully what was sent to you and do your research in depth on what was sent to you.

____________________________________

Did you already know this term? Have you ever been submitted to a phishing attack? share with your friends and family this article and tell us your story and how you protected yourself, or if they really managed to get the best of it.





Source link

Leave a Comment

Pin It on Pinterest

Share This