Skip to main content

WHAT IS PHISHING ATTACK AND HOW YOU CAN BE A PREY OF IT?

ALL ABOUT PHISHING ATTACK

“Phishing” refers to an attempt to steal sensitive information, typically in the form of usernames, passwords, credit card numbers, bank account information or other important data in order to utilize or sell the stolen information. By masquerading as a reputable source with an enticing request, an attacker lures in the victim in order to trick them, similarly to how a fisherman uses bait to catch a fish. Typically carried out by email spoofing or instant messaging, it often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site.


Phishing is an example of social engineering techniques being used to deceive users. Users are often lured by communications purporting to be from trusted parties such as social web sites, auction sites, banks, online payment processors or IT administrators. Phishing is often used to gain a foothold in corporate or governmental networks as a part of a larger attack, such as an advanced persistent threat (APT) event. In this latter scenario, employees are compromised in order to bypass security perimeters, distribute malware inside a closed environment, or gain privileged access to secured data.

Phishing attack examples:

1.
Example 1

2.
Example 2

An organization succumbing to such an attack typically sustains severe financial losses in addition to declining market share, reputation, and consumer trust. Depending on scope, a phishing attempt might escalate into a security incident from which a business will have a difficult time recovering.

TIPS TO SAVE YOURSELF FROM PHISHING ATTACK


  • Never allow remote access to your computer.

  •  Use Antivirus Software 

  •  Keep Informed About Phishing Techniques

  • Keep Your Browser Up to Date 

  • Install an Anti-Phishing Toolbar 
PHISHING SITE EXAMPLE 1

  • Think Before You Click! :
  • You should never click on links in an email to a website unless you are absolutely sure that it is authentic. If you have any doubt, you should open a new browser window and type the URL into the address bar.

  • Be wary of emails asking for confidential information – especially if it asks for personal details or banking information. Legitimate organizations, including and especially your bank, will never request sensitive information via email.

  • You should always place your mouse over a web link in an email to see if you’re actually being sent to the right website – that is, “the one that appears in the email text” is the same as “the one you see when you mouse-over”.
PHISHING SITE EXAMPLE 2

  • Plenty of phishing emails are fairly obvious. They will be punctuated with plenty of typos, words in capitals and exclamation marks. They may also have an impersonal greeting – think of those ‘Dear Customer’ or ‘Dear Sir/Madam’ salutations – or feature implausible and generally surprising content.

  •  Verify a Site’s Security:You should always, where possible, use a secure website (indicated by https:// and a security “lock” icon in the browser’s address bar) to browse, and especially when submitting sensitive information online, such as credit card details.

  • You should never use public, unsecured Wi-Fi for banking, shopping or entering personal information online (convenience should not trump safety). When in doubt, use your mobile’s 3/4G or LTE connection.

  • If a person calls claiming to work for a specific, well-known company, look up the phone number online and tell them you will call them back.


If you  follow these advises  than you can some how keep away from phishing attack.






Comments

Popular posts from this blog

ALL ABOUT I-SIMS: THE FUTURE OF SIMS

i-SIMS ARE THE UPCOMING FUTURE WHICH WILL BE BECOME THE NEXT COMMON THING Not like e-Sims, i-Sims are completely a different concept. It will be the future of Sim cards. It will become the next common thing Image Source: www.technologyweuse.com   There was a time when we used ID card size sims. Then there came Mini sims. And soon Micro and Nano sims are become a common thing. As the technology is evolving, new doors are opening. After the e-Sim ( Embedded Sim ) a new technology is coming in the upcoming future which is known as i-Sims ( Integrated Sims ). So how does this i-Sim works and how it can affects the upcoming future? Lets have a look. Future of i-Sims The chipset manufacture company ARM  is planning to integrate the sim in the  SoC (System On Chip) section with the processor, GPU (Graphics Processing Unit) and the other important components . ARM confirms that the size of i-Sims will be just a fraction of millimeter. The work process of i-...

DOSTANA 2 ANNOUNCED! KARAN JOHAR IS ON SEARCH FOR SECOND SUITABLE BOY

Karan Johar has just announced the Dostana 2 is coming soon and revealed that the lead roles will be Kartik Aryan and Janhvi Kapoor along with a second suitable boy Karan Johar has announced a sequel to his 2008 hit production  Dostana , which starred Priyanka Chopra, Abhishek Bachchan and John Abraham in lead roles. The director-producer made the announcement on Twitter on Thursday. However, the third actor in Dostana 2 is not confirmed yet. According to Karan's tweet, he will soon be launching "a suitable boy" who will be a fresh face. “The return of the franchise with unlimited madness! @TheAaryanKartik, #Janhvi & a soon to be launched fresh face - making it the trio for #Dostana2, directed by @CollinDcunha. Watch out for the third suitable boy!,” Karan wrote in a tweet and shared an animated announcement video. Karan is also looking forward to working with Kartik in their first-ever collaboration, “I am excited to take the franchise forw...