Medusa

Here Are Some Common Phishing Attacks And How To Avoid Them

<p>You must have come across the word phishing attacks at some point&period; Phishing is a cybercrime where the target is contacted by either email&comma; text messages or phone&period; Most often&comma; they are contacted by somebody posing as a reputable organization&period; In most cases&comma; the attacker lures the victim to provide sensitive data such as their bank account details&comma; credit cards or passwords&period;<&sol;p>&NewLine;<p>Once attackers obtain the information they need&comma; it could result in cases of identity theft or missing money from the victim’s account&period; Phishing dates to the 1900s and remains a menace up to date&period;<&sol;p>&NewLine;<p>Exactly a month after tax day&comma; Internal Revenue Service warned people that there were scammers who would send fake emails to taxpayers asking for the recipient’s email username and password&period; This way&comma; they would steal personal data and use it in fraudulent activities&period; There had been attempted attacks in Illinois&comma; New Jersey&comma; North Carolina&comma; and Iowa&period;<&sol;p>&NewLine;<p>So what are the common phishing attacks and how should you avoid them&quest;<&sol;p>&NewLine;<ol>&NewLine;<li><strong>Deceptive phishing<&sol;strong><&sol;li>&NewLine;<&sol;ol>&NewLine;<p>Deceptive phishing is one of the most widely recognized types of phishing&period; It is any kind of attack where the attackers pose as legit trusted organizations to obtain confidential information from unknowing people&period;<&sol;p>&NewLine;<p>The way they craft their messages uses some feeling of urgency so that clients can panic and do what the hackers ask them to do&period;<&sol;p>&NewLine;<p>For example&comma; you could get an email from &OpenCurlyQuote;your bank’ in a matter of urgency telling you there is a security breach and they need your account details&period; The sad thing is once you click on the link provided&comma; they may have a phony bank login page that gets the victim’s details and sends them to the hackers&period;<&sol;p>&NewLine;<p><strong>How to avoid&colon;<&sol;strong><&sol;p>&NewLine;<p>Whether on a business level or a personal level&comma; ensure that all the URLs are legit and if they link to a suspicious looking site&period;<&sol;p>&NewLine;<p>Pay attention to spelling errors and non-specific greetings throughout the email&period; Such keenness helps avoid any phishing attacks to you and your organization&period;<&sol;p>&NewLine;<ol start&equals;"2">&NewLine;<li><strong>Spear phishing<&sol;strong><&sol;li>&NewLine;<&sol;ol>&NewLine;<p>Unfortunately&comma; there is another type of phishing that is even more worrying than the deceptive one&period; Here&comma; scammers personalize their attack emails using the victim’s name&comma; company contacts and company position&period; Such emails are designed to convince the recipient that they have a connection with the sender&period;<&sol;p>&NewLine;<p>Spear phishing happens as people can access information on sites such as LinkedIn and they craft a crafted email which you may fall victim of&period;<&sol;p>&NewLine;<p><strong>How to avoid&colon;<&sol;strong><&sol;p>&NewLine;<p>People should try to avoid publishing information that is sensitive on social media where people can quickly get access&period;<&sol;p>&NewLine;<p>Companies should hold employee seminars to educate them about phishing&period; They should also invest in tools or software that can pick up malicious emails&period;<&sol;p>&NewLine;<ol start&equals;"3">&NewLine;<li><strong>Pharming<&sol;strong><&sol;li>&NewLine;<&sol;ol>&NewLine;<p>Also known as &OpenCurlyDoubleQuote;phishing without a lure&comma;” it is a scamming practice where malicious code gets its way on your PC or server and redirects people to fraudulent sites without people’s knowledge&period;<&sol;p>&NewLine;<p>There is domain name system &lpar;DNS&rpar; poisoning where the DNS table in a server is altered so that people think they are accessing a trusted site&comma; but in the real sense&comma; they are redirected to a malicious one&period; Victims end up in malicious sites without even noticing&period;<&sol;p>&NewLine;<p>Attackers will often make use of DNS servers to route site names&period; They focus on the DNS server and change the IP address related to the trusted site making them able to divert people to unreliable websites&period;<&sol;p>&NewLine;<p>Here&comma; people give out their personal information unknowingly making them victims of identity theft&period;<&sol;p>&NewLine;<p><strong>How to avoid&colon;<&sol;strong><&sol;p>&NewLine;<p>Always ensure that before giving out any information&comma; the site is using HTTPS&period;<&sol;p>&NewLine;<p>Verify the digital certificate of the website and ensure that the site is using a secure certificate&period; To do this&comma; go to the browser properties menu and click &OpenCurlyDoubleQuote;certificate” to verify&period;<&sol;p>&NewLine;<p>Keep your operating system and browser update to avoid exploitation from scammers&period; For any PC related issues&comma; <u>TechLoris<&sol;u> can help you get them sorted&period;<&sol;p>&NewLine;<ol start&equals;"4">&NewLine;<li><strong>CEO Fraud<&sol;strong><&sol;li>&NewLine;<&sol;ol>&NewLine;<p>It is common for phishers to target top executives in a company which is also known as whaling&period; Again&comma; they aim to get their personal information so that they can request information from the rest of the employees which ends up being a high risk to the entire firm&period;<&sol;p>&NewLine;<p>Take a look at this scenario where your boss asks for some company data&semi; you will automatically comply without question&period; This could lead to substantial financial losses&period;<&sol;p>&NewLine;<p><strong>How to avoid&colon;<&sol;strong><&sol;p>&NewLine;<p>Everybody should attend security awareness training &lpar;because we all know some managers skip them and let the subordinates attend&rpar; and install software that could help keep the company safe&period;<&sol;p>&NewLine;<p>As an organization&comma; there should be set rules and regulations to ensure that no sensitive information is sent via email&period; People should also be on the lookout for any fishy when they receive emails and be extra cautious&period; With that&comma; it’s easier to avoid phishing attacks&period;<&sol;p>&NewLine;

Exit mobile version