Phishing- How to prevent it?

If you are familiar with the term Phishing then you may also know that earlier phishing techniques were pretty common. You may have seen or heard about bogus websites that look really similar to the original ones. It is a well-known fact that hackers are always trying to steal your information for their own benefits. This article will talk about phishing and how there are different types of it.

What is Phishing?

The most irritating thing about Phishing is that, that we know how it may happen but we still can’t do anything about it. Sometime people just fall into this Phishing scam and don’t know what to do.

Now what actually is phishing is the matter of concern. Phishing can be defined as a cyber crime that takes place by targeting people through emails, texts etc. Where they (hackers) pose as some legitimate institution and lure people in providing them their personal information such as passwords, credit cards and bank details.

Once the hackers get this information they can hack into your systems or take money out of your account in no time and not even giving you time to react. Here are some of the common features of phishing.

  1. First of all, they are too good to be true. They look so eye catching and have statements that will surely catch public attention. This can be about winning any lavished prize, money or a trip, anything that lures people. It is a red flag! Do not click on such links.
  2. Receiving any unexpected mail can also be a sign of phishing. There can be attachments on that mail carrying payloads such as ransomware or any other type of virus. So don’t open such kind of attachments.
  3. One of the most common features of phishing can be hyperlinks. Whenever you click on such links, which you should not, it redirects you to some page that will look familiar to the original one. You have to look closely and find flaws if you find that page suspicious.
  4. If you sense urgency then it means hackers are trying to trick you. One of the most common characters of phishing includes this. They may tell you that this sale ends in a minute or offer is valid for just a few minutes. You may get mails stating them. The best thing you should do is to avoid them.
  5. Sometimes you can get suspicious emails or messages from unknown or even known people. If you find it suspicious then you don’t have to open it. You aren’t obliged to do it even if that suspicious mail is from someone you know.

Types of Phishing

Nowadays hackers have found different ways to scam us and some of the most common phishing methods are mentioned below.

  • Email phishing: It is one of the most common phishing techniques you can see. As the name indicates the phishing attacks are sent by mail. The hacker will register a fake domain that highly resembles the original organization. The fake domain name can contain character substitution like writing “m” and “rn”. Consent phishing is also there which is basically works by tricking users into granting access to a malicious app to get the personal information of the user
  • Spear phishing: This is one type of sophisticated phishing that involves the use of emails. Here malicious emails are sent to a specific person. This type of phishing is possible only when the hacker/attacker has all the information about the victim like their name, email address, place of employment, job profile, and specific information regarding that too.
  • Smishing and vishing: Smishing and vishing involve two steps. Smishing means sending malicious texts (just like email) to a person and vishing means having a telephonic conversation. A very common example of this technique is getting fake calls from a fraud investigator and them telling us how our bank account has been breached. They then ask for our card details for identity verification to move our money into a secure account. Once they get the details, they (the attacker) transfer our money into theirs.
  • Whaling: Whaling attacks target someone like a senior executive of a company, with a bit more subtle way. It is actually very obvious that attackers can’t fool the executives by these malicious links, emails, or text messages. They are very much aware of it already. Here bogus tax returns are used to trick them and are a common type of whaling. This trick is used by the attackers as it involves following useful information like name, address, bank account details and social security numbers.
  • Angler phishing: Social media has come up with new techniques to trick users like fake URLs, duplicated websites, tweets, posts, and many other things as well. By using these techniques attackers can make people download malware (unknowingly) or give personal information. This trick is really common and effective for attackers because almost everyone uses social media on a daily basis.

So this article concluded some basic information about phishing and its types. You can see and know if someone is or will ever try to phish you. The bottom line here is only you can save yourself from being phished by knowing these common do’s and dont’s.