• Home
  • About Us
  • Authors
  • Submit News
  • Contact Us
  • Privacy Policy
  • Sitemap
The Hack Post
  • Hacking News
    • Cyber Crime
  • Cyber Security
  • Technology
    • Internet
  • Entertainment
    • Gaming
  • Business
  • Science / Health
No Result
View All Result
The Hack Post
No Result
View All Result

Protecting Yourself from Phishing

Sofia Peterson by Sofia Peterson
June 14, 2019
Protecting Yourself from Phishing
Share on FacebookShare on Twitter

Phishing attacks have dramatically increased in number in recent years. But what is phishing? How do these scammers obtain user information? Moreover, most crucially, what are the best practices for avoiding a phishing attack?

Phishing: an overview 

Phishing involves hackers attempting to obtain sensitive information such as passwords or credit card details from unsuspecting individuals by pretending to be a legitimate organisation via electronic communication channels. The “phishers” may use email, text, or even phone calls to trick the victim into inadvertently giving them information which the scammer can then use for nefarious purposes.

Although phishing attacks can take many forms, the aim is always to defraud from the victim while making them think that they are in contact with somebody they already trust.

Due to extensive media coverage, the general public has become aware of typical phishing schemes. As a result, scammers have had to become more creative in the manner in which they attempt to trick their victims. They have ramped up their efforts in designing convincing emails. It is becoming increasingly difficult to identify a fraudulent email or website. However, despite the increased challenge, there are some simple precautions you can take to ensure that you do not fall victim to one of these scams.

Spotting phishing emails 

First and foremost, users should always be suspicious of emails asking you for login information. Legitimate and reputable banks or organisations never email you for passwords or any other sensitive information. If you get an email asking you to sign in to your account because of an unspecified “issue”,  always open another tab and search for the website and log in from there.   Do not attempt to access your account by following the link in the email. If there is an issue with your account, there would be a notification when you log in. If in doubt, call the organisation and ask the representative about any problems with your account. They can confirm whether the email is legitimate or fake.

If you get a call from an individual who claims to be from your bank or another organisation which holds some personal information belonging to you, always check the number from which they are calling and see if it matches the number listed on the company’s website. If it doesn’t, hang up and call the number on the website. They can tell you if a genuine employee or a phisher had contacted you.

In addition to user awareness, technical solutions can be implemented to reduce the risk of falling victim to a phishing scheme. Email inboxes usually have inbuilt spam filters which filter out large amounts of suspicious emails. If a suspicious email makes it through, mark it as spam and delete it to prevent yourself from receiving similar emails in the future.

Sometimes emails make it through spam filters and the user cannot immediately identify whether or not they are legitimate communications. These emails are often crafted to be as convincing as possible, including the brand logo and even personal information about the victim that the scammer has obtained from social media, they may contain telling clues which give them away as frauds. In such cases, users should be aware of spelling errors, incorrect use of grammar, poor quality images or graphic design, as these are all signs that the email is not from a legitimate company.

The email address itself may look fake; for example, legitimate emails from PayPal are sent from a @paypal.com email address, whereas fake emails may be from a web-based email address (such as Google or Yahoo) while pretending to be from PayPal. Companies often address their emails to the customer directly, and not in a generic fashion such as “To our valued customer”.

Users should always check the URL of websites to which they are directed in an email, as these may be the only give-away that the whole thing is a scam. URLs from fake websites may use odd spellings, such as “0” for “O” so that upon first glance they appear legitimate. When in doubt, always find the website through an independent search through a browser instead of following a link embedded in an email.

Tags: Phishing
Sofia Peterson

Sofia Peterson

Sofia is a contributor at The Hack Post who loves to write about Technology. She also enjoys reading books and swims during her free time.

Next Post
5 Types of Technology That Your Business Should Be Using

5 Types of Technology That Your Business Should Be Using

Latest Articles

Indian Oil Credit Card showcasing rewards and savings on daily fuel and shopping expenses
Business

Understanding everyday spending benefits of the Indian Oil Credit Card

April 9, 2026
Alpine skier navigating snowy slope with visible safety gear and mountainous winter scenery
Entertainment

Hampton Luzak: Important Safety Tips for Alpine Skiers

April 2, 2026
Assorted high-quality nurse scrubs in vibrant colors displayed neatly for selection and comparison
Business

The Ultimate Guide to Choosing a High-Quality Nurse Scrubs Range

March 27, 2026
PVC window frames and modern interior decor showcasing innovative uses of polyvinyl chloride
Business

From Windows to Interior Design: Everything you Didn’t Know about the Birth of PVC Object

March 23, 2026
Why Is Peer Review Important in PhD Dissertation Publication? 4 Reasons Explained
Business

Why Is Peer Review Important in PhD Dissertation Publication? 4 Reasons Explained

March 12, 2026
Betsy DeVos during her tenure as Education Secretary under the Trump administration
Business

Betsy DeVos Served as One of the Longest-Tenured Education Secretaries in the Trump Era

March 11, 2026
Remote Filipino team collaborating online to support international business expansion efficiently
Business

Scaling Smarter: How Remote Teams in the Philippines Help Businesses Expand Efficiently

March 10, 2026
Colorful gaming app icons on a smartphone screen highlighting user engagement benefits
Gaming

Beyond the Browser: The Hidden Perks of Gaming Apps for User Engagement

March 9, 2026
Gavel and legal documents symbolizing Judge Jessica Recksiedler's decisions in family law cases
Business

Judge Jessica Recksiedler: Judicial Decision-Making in Difficult Family Cases

March 2, 2026
Dog on leash walking politely through a modern condo hallway, illustrating good urban pet manners
Featured

Urban Pet Manners in Daily Condo Life

February 28, 2026
Car registration document and keys on a desk illustrating fast vehicle registration loans
Business

A Simple Guide to Getting Quick Funds with Your Vehicle Registration

February 23, 2026
Secure pharmaceutical packaging influenced by market trends and supply chain innovations
Cyber Security

Neil Alpert: Market Forces Shaping Secure Pharmaceutical Packaging

February 17, 2026
  • Home
  • About Us
  • Authors
  • Submit News
  • Contact Us
  • Privacy Policy
  • Sitemap

The Hack Post © 2019

No Result
View All Result
  • Hacking News
    • Cyber Crime
  • Cyber Security
  • Technology
    • Internet
  • Entertainment
    • Gaming
  • Business
  • Science / Health

The Hack Post © 2019