Phishing is network fraud. Phishers are technically advanced crooks and thieves. With the help of spam, malicious websites, emails, they lure users of confidential information, such as bank account numbers or credit cards.
How to Recognize Phishing
- Phishers, disguised as well-known companies, use e-mails to request personal information, while the user is directed to a fake website;
- Most often, phishers use emotional expressions, trying to frighten or excite the user and get him to respond immediately to an email;
- Phishing sites look like their prototypes, as copyrighted images from authentic sites, widely used in their design;
- Requests for confidential information via e-mail are often illegal;
- Often fraudulent emails are not personalized and contain the same information in the title and text.
How to Protect Yourself from Phishing
- The first thing to remember is always the following: your PASSWORD is ONLY YOURS; no organization will require your password from you. You only need it to access a particular service, and only you need to know it;
- Be careful when receiving e-mails from unknown senders and e-mails asking to click on the link;
- Always check via the address bar on that site whether you enter your password. (The domain is also forged, that is why, it is very similar to its original, the difference can be only one letter, for example, microsoft.com can turn into maicrosoft.com);
- Use the latest versions of browsers and licensed antivirus software.
If you suspect that you have been subjected to a phishing attack, be sure to immediately change your account password and contact the organization's security department, data from which was obtained by scammers.
- The article defines a phishing attack, provides examples, considers techniques, and explains how to prevent phishing.
- The article defines phishing, sheds light on its history, considers types of phishing attacks, and gives tips on how to get protected.
Last Updated: 05.07.2023