Phising

How To Protect Yourself From Phishing



Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. 

The word is a neologism created as a homophone of fishing due to the similarity of using fake bait in an attempt to catch a victim. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting victims. 

Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. 

Phishing is an example of social engineering techniques used to deceive users,  and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. Many websites have now created secondary tools for applications, like maps for games, but they should be clearly marked as to who wrote them, and users should not use the same passwords anywhere on the internet.Phishing is a form of online identity theft in which fraudsters trick Internet users into submitting personal information to illegitimate web sites.

Phishing scams are usually presented in the form of spam or pop-ups and are often difficult to detect. Once the fraudsters obtain your personal information, they can use it for all types of identity theft, putting your good credit and good name at risk.

Because phishing is one of the most devious forms of identity theft, it is important for you to become familiar with various types of phishing scams as well as to learn how to guard against them.


These 8 Ways To Prevent 

"Phishing Scams"


To help you protect yourself from phishing, we offer the following tips:

Step  1

 Guard against spam. Be especially cautious of emails that:

* Come from unrecognized senders.

* Ask you to confirm personal or financial information over the Internet and/or make urgent requests for this information.

* Aren’t personalized.

* Try to upset you into acting quickly by threatening you with frightening information.

Step 2

Communicate personal information only via phone or secure web sites. In fact:

When conducting online transactions, look for a sign that the site is secure such as a lock icon on the browser’s status bar or a “https:” URL whereby the “s” stands for “secure” rather than a “http:”.

Also, beware of phone phishing schemes. Do not divulge personal information over the phone unless you initiate the call. Be cautious of emails that ask you to call a phone number to update your account information as well.

Step 3

 Do not click on links, download files or open attachments in emails from unknown senders. It is best to open attachments only when you are expecting them and know what they contain, even if you know the sender.

Step 4

 Never email personal or financial information, even if you are close with the recipient. You never know who may gain access to your email account, or to the person’s account to whom you are emailing.

Step 5

 Beware of links in emails that ask for personal information, even if the email appears to come from an enterprise you do business with. Phishing web sites often copy the entire look of a legitimate web site, making it appear authentic. To be safe, call the legitimate enterprise first to see if they really sent that email to you. After all, businesses should not request personal information to be sent via email.

Step 6

Beware of pop-ups and follow these tips:

* Never enter personal information in a pop-up screen. 

* Do not click on links in a pop-up screen.

* Do not copy web addresses into your browser from pop-ups. 

* Legitimate enterprises should never ask you to submit personal information in pop-up screens, so don’t do it.

Step 7

 Protect your computer with a firewall, spam filters, anti-virus and anti-spyware software. Do some research to ensure you are getting the most up-to-date software, and update them all regularly to ensure that you are blocking from new viruses and spyware.

Step 8

 Check your online accounts and bank statements regularly to ensure that no unauthorized transactions have been made. 
You should always be careful about giving out personal information over the Internet. Luckily, companies have begun to employ tactics to fight against phishers, but they cannot fully protect you on their own.

NOTE:

Remember that you may be targeted almost anywhere online, so always keep an eye out for those “phishy” schemes and never feel pressure to give up personal information online.

Comments