Skip to main content

Identify and Avoid Phishing Scams

 
Phishing is a form of social engineering technique used by hackers to gather sensitive information such as usernames, passwords and credit card details by posing as a trustworthy person or organization. Since most online users are unaware of the techniques used in carrying out a phishing attack, they often fall victim and hence, phishing can be very effective.
With the dramatic increase in the number of phishing scams in the recent years, there has also been a steady rise in the number of people being victimized. Lack of awareness among the people is the prime reason behind such attacks. This article will try to create awareness and educate the users about such online scams and frauds.
Phishing scams usually sends an email message to users requesting for their personal information, or redirects them to a website where they are required to enter thier personal information. Here are some of the tips to identify various phishing techniques and stay away from it:

Identifying a Phishing Scam:

  1. Beware of emails that demand for an urgent response from your side. Some of the examples are:
    • You may receive an email which appears to have come from your bank or financial organization stating that “your bank account is limited due to an unauthorized activity. Please verify your account asap so as to avoid permanent suspension”. In most cases, you are requested to follow a link (URL) that takes you to spoofed web page (similar to your bank website) and enter your login details over there.
    • In some cases, phishing emails may ask you to make a phone call. There may be a person or an audio response waiting on the other side of the phone to take away your credit cards details, account number, social security number or other valuable data.
  2. Phishing emails are generally not personalized. Since they target a lagre number of online users, they usually use generalized texts like “Dear valued customer”, “Dear Paypal user” etc. to address you. However, some phishing emails can be an exception to this rule.
  3. When you click on the links contained in a phishing email, you will most likely be taken to a spoofed web page with official logos and information that looks exactly same as that of the original web pages of your bank or financial organization. Pay attention to the URL of a website before you enter any of your personal information over there.
    Even though malicious websites look identical to the legitimate site, it often uses a different domain or variation in the spelling. For example, instead of paypal.com, a phishing website may use different addresses such as:
    • papyal.com
    • paypal.org
    • verify-paypal.com
    • xyz.com/paypal/verify-account/

Tips to Avoid Being a Victim of Phishing:

  1. Do not respond to suspicious emails that ask you to give your personal information. If you are unsure whether an email request is legitimate, verify the same by calling the respective bank/company. Always use the telephone numbers printed on your bank records or statements and not those mentioned in the suspicious email.
  2. Don’t use the links in an email, instant messenger or chat conversation to enter a website. Instead, always type the URL of the website on your browser’s address bar to get into a website.
  3. Legitimate websites always use a secure connection (https://) on those pages which are intended to gather sensitive data such as passwords, account numbers or credit card details. You will see a lock icon Picture of the Lock icon in your browser’s address bar which indicates a secure connection. On some websites like paypal.com which uses an extended validation certificate, the address bar turns GREEN as shown below.
    HTTPS Address Bar
    In most cases, unlike a legitimate website, a phishing website or a spoofed web page will not use a secure connection and does not show up the lock icon. So, absence of such security features can be a clear indication of phishing attack. Always double-check the security features of the web page before entering any of your personal information.
  4. Always use a good antivirus software, firewall and email filters to filter the unwanted traffic. Also ensure that your browser is up-to-date with the necessary patches being applied.
  5. Report a “phishing attack” or “spoofed emails” to the following groups so as to stop such attacks from spreading all over the Internet:
    You can directly send an email to reportphishing@antiphishing.org or spam@uce.gov reporting an attack. You can also notify the Internet Crime Complaint Center of the FBI by filing a complaint on their website: www.ic3.gov.

Comments

Popular posts from this blog

How To Install Wordpress in Linux server

  Hello friend's In this session i am going to tell you how to install Worldpress in Linux server, Wordpress is open source blogging tool and CMS based on PHP and mysql which runs on a web hosting service. Wordpress is use by more then 18.9% of the top 10 million website. In order to install wp we have to configure the   web server   & mysql server. So now i am going to configure mysql database, As you can see sql database has been configured successfully and time to download Wordpress and configure the same, I already downloaded wordpress zip file, Ok guys we successfully configured the wordpress config file and added the our mysql database, user and password, all configuration done now time to move and install wordpress Go to you browser and type http://localhost (i did not configure dns server so i put localhost if you already install dns server then type you website name ) and fill required information After filling the same click to install Bingo :) wordpress ins...

How to Install CWM recovery on Samsung Galaxy Trend Plus GT S7580

Samsung  Galaxy  Trend Plus is a mid-range device, with its 1.2GHz CPU with 768MB RAM, 4-inch touchscreen display, 5MP camera and Android 4.2 firmware.   Before You Begin:  1:  Backup Your Data First. 2: Enable USB Debugging on your device. To do so, go to Settings > Applications > Development > USB debugging. The checkbox of USB Debugging should be ticked. 3: You should charge your device so that there is 30% or more amount of battery charge on your device. 4:   Download   USB Drivers  (ADB and Fastboot) for your Android device to make it compatible with Windows. Here Is The Procedure To install CWM Recovery Galaxy Trend Plus: First OF All Download Following Files: Odin307 .zip CWM_6.0.3.7_notouch_GalaxyTrendPlus_s7580_bdc_v0.2 .zip Follow The Easy Steps: 1. Extract Odin307.zip to a folder on your desktop. 2. Extract CWM_6.0.3.7_notouch_GalaxyTrendPlus_s7580_bdc_v0.2.zip to another folder on your desktop and you...

How To Root the Xolo Q700 and flash CWM Recovery

Do you want to root Xolo q700? Do you want to install CWM recovery and take backups, install custom ROMs and do more? Well, here's a step by step method to root the phone and install CWM recovery.  Requirements: The Xolo Q700 phone fully charged Download the USB and ADB drivers for the Xolo Q700 from  here  and  here Download the Motochopper rooting utility from  here Download the flash tool for the recovery from  here Download the recovery image from  here Download the necessary drivers and tools to a folder on your desktop and extract the archives to their respective folders. First, we shall root the phone and later install the CWM recovery patch. Make sure you have administrative rights on your Windows PC before you proceed. Install the necessary driver(s) Rooting the Xolo Q700 For this, we will need the USB and ADB drivers installed. Go ahead and install the drivers (usually one driver should work, but in certain cases, you would have to install bo...