Not so long ago, the biggest problem for Internet users was infection of the computer by a virus or worm. The main task of the virus is to distribute it to the masses. Today, with the advent of more modern methods, the problem of infection has gone by the wayside, but there are new and more significant threats that lead to the failure of the work sites and programs.
The most common type of this kind of fraud is called phishing. Although the name is not frightening, but it is serious. The main objective of cyber-criminal is to obtain confidential data to log into any system, ie username and password.
In order not to get hooked on scams you need to know what types of phishing scams exists, for this we will look at examples of phishing.
One of the most common techniques is the achieving of the letter from the alleged administration, which indicates that you were broke, and you need to click on the link to change the username and password. Remember, the reference in such cases leads to a strange resources.
Here are examples of phishing emails from the bank. “On your account entered a remittent that exceeds two thousand dollars. In order to successfully enroll the money you need to confirm the operation. In order to do this operation, you need to go to the link below and following the instructions, confirm the remittent. If this operation will not be carried out, the money will return to the sender’s account in two days. “
Although you know that nobody sent you money, you still follow the link, hoping that a rich relative or a fan has appeared. We must remember that such situation is impossible, and you will never receive such a letter, if someone will send you money. In this case it is better to remove a letter, and not lead to provocation.
Let’s look at examples of phishing, in order you understand what they are.
Just as in the previous case, you receive a letter, but not from the bank, but from the security of the service. The letter contains the information that you need to follow the link to change the login and the password. If you click on a link and enter data, you will automatically give your confidential information to the fraudster. It is so because apparently, the site will be very similar to a real and the difference can only be only in the title.
Almost all of the resources are amenable by phishing attacks that have a username and password, and this also applies to social networking.
Also, telephone, voice scams are referred to the phishing, but this type of fraud is called vishing.
In order to protect yourself, below we provide general information about the phishing attack.
All-phishing strategy is built on that to get useful information from you, ie user name and password. Scammers get personal information by sending messages to e-mail. And then there is a daisy chain, the scammer sends a letter, supposedly from the real resource, mainly from the banks, electronic payment system, social networks and online wallets. Then, a person clicks on the link and enters their personal data.
If a person has done all these steps, he gave personal information to attackers and can wait for trouble, and they will come very fast. For example, firstly conman remove money from your account.
Phishing information, which comes to your e-mail, may be different, up to intimidation and threats that if he does not perform the action, then he can be filed a lawsuit.
Cyber-criminals often create a page similar to the real thing. If you click on a link, refer necessarily to the domain name, it will have differences if to look good.
The main question is who reads the article like this, how to fight such crime?
We would like to assure you once, that the level of solved cases in this area is very low, since the police do not have enough specialists in this field.
But still, if you have come under cyber-attack, call the police and write a resource administration, on which you were trying to be cracked. If your case won`t be immediately disclosed, there still will be guarantees that the fraudster will sooner or later will be caught. Each written statement will help the special services in solving the crime.
Of course, it is better not to fall for this kind of provocation and in order to protect yourself from this, we have provided you with phishing information, and also will list a number of instructions, which also is better to adhere.
- Never click on links, even if you receive the information from known to you company.
- Do not enter login and password by clicking on the link;
- Check the domain name carefully, since scammers often use a very similar name.
- Do not store passwords on your computer, and do not tell them to anyone.
- Install on your PC licensed anti-virus system.