Skip to main content

Keep yourself safe from phishing attacks: Find out how!


The world is moving online, and so is crime. One of the most common cyber crimes that often target innocent individuals is phishing.
Phishing refers to fraudulent electronic communication which attempts to steal personal data, especially for financial theft.
Despite advancements in technology worldwide, such decades-old crimes still keep happening.
Here's how you can keep yourself safe from phishing attacks.
In context: How to protect yourself from phishing

07 Aug 2017Keep yourself safe from phishing attacks: Find out how!

The world is moving online, and so is crime. One of the most common cyber crimes that often target innocent individuals is phishing.
Phishing refers to fraudulent electronic communication which attempts to steal personal data, especially for financial theft.
Despite advancements in technology worldwide, such decades-old crimes still keep happening.
Here's how you can keep yourself safe from phishing attacks.

IdentifyHow do such mails look?

Often, phishing mails come from official-looking email IDs and have real-looking logos. The brand name is mostly familiar.
It may say something like there's a problem with your bank account, or that you have won a million dollars: something that would end in you being asked personal details or passwords.
There might be a link that redirects you to a fake, often malicious website.
Red alert: Keep an eye out for these signs

TipsRed alert: Keep an eye out for these signs

Look closely at the URL it is redirecting you to. It generally spells like the name of a reputed organization with just a letter mis-spelt.
Most authentic organizations would address you by name, not just "Dear Customer".
Typos in 'official' emails; all words in the subject capitalized; too many exclamation marks; urgent deadlines to do something crucial - these are all tell-tale signs.

LanuguageThe often-wrongly-written English is sometimes intentional. Here's why

The hackers aren't very stupid: the often-wrongly-worded emails might be a way to ensure only the most gullible ones fall prey and the aware ones stay away.
Sometimes, previously-successful scam mails get recycled without correction.
Besides, many such mails originate from countries where English is a second language.
Sometimes, the attacker uses perfect language to fool even those who know English well.

Spear fishingSpear phishing: The new-age scamming technique

There's an advanced kind of phishing called spear phishing. Unlike traditional scam emails, they may refer to you by name and mention some recent online activity you conducted. They may be in the name of one of your friends.
Turn on privacy settings on social media to limit the range of your audience. Also try using different passwords for different accounts.

 YOU MAY ALSO LIKE:

Comments

Popular posts from this blog

[Guide] How to Protect Your Devices Against Meltdown and Spectre Attacks

Recently uncovered two huge processor vulnerabilities called Meltdown and Spectre have taken the whole world by storm, while vendors are rushing out to patch the vulnerabilities in its products. The issues apply to all modern processors and affect nearly all operating systems (Windows, Linux, Android, iOS, macOS, FreeBSD, and more), smartphones and other computing devices made in the past 20 years. What are Spectre and Meltdown? We have explained both, Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753, CVE-2017-5715), exploitation techniques in our previous article. In short, Spectre and Meltdown are the names of security vulnerabilities found in many processors from Intel, ARM and AMD that could allow attackers to steal your passwords, encryption keys and other private information. Both attacks abuse 'speculative execution' to access privileged memory—including those allocated for the kernel—from a low privileged user process like a malicious app running...

iOS 11.3 coming this spring with battery and performance settings, ARKit 1.5, new Animoji

In a sign that Apple will continue to update iOS regularly instead of withholding features for its next major point-zero release, Apple on Wednesday revealed new features coming to an iOS 11.3 update this spring, including the ability to toggle the power management feature for iPhone models with aging batteries. Apple will implement new battery health information and the ability to customize power settings after it was revealed that the company  throttles CPU performance on older devices  where the battery is deteriorating. Apple's throttling is done to prevent random shutdowns of the device and ensure smooth operation, but some customers took offense to the fact that the slowdowns were occurring without transparency to the user. In a press release issued on Wednesday, Apple said that the iOS 11.3 update this fall will show battery health, and recommend to users if their battery needs to be serviced. The capabilities will be available for iPhone 6 and later. Users will...

Unlocked phones vs. locked phones: Why you should care

Should you get an unlocked phone? The US wireless market is more competitive than ever, which is great news for consumers who have lots of choices when it comes choosing a service provider. But one barrier still exists when trying to switch carriers: the locked smartphone. The end of wireless contracts marked a watershed trend for consumers because it finally opened the door for them to more easily shop around for alternative wireless carriers. But the software locks that carriers put on phones restricting its use on other networks still prevent many consumers from having total freedom when it comes to choosing a provider. Now Verizon, the only wireless carrier that sold its phones unlocked out of the box, is reversing course. The company  said earlier this week  it would begin locking the phones it sells to consumers for an undetermined period of time, which will prevent them from using a SIM card from another carrier. But Verizon promised it would eventually ...