• Home
  • About Us
  • Authors
  • Submit News
  • Contact Us
  • Privacy Policy
  • Sitemap
The Hack Post
  • Hacking News
    • Cyber Crime
  • Cyber Security
  • Technology
    • Internet
  • Entertainment
    • Gaming
  • Business
  • Science / Health
No Result
View All Result
The Hack Post
No Result
View All Result

Protecting Yourself from Phishing

Sofia Peterson by Sofia Peterson
June 14, 2019
Protecting Yourself from Phishing
Share on FacebookShare on Twitter

Phishing attacks have dramatically increased in number in recent years. But what is phishing? How do these scammers obtain user information? Moreover, most crucially, what are the best practices for avoiding a phishing attack?

Phishing: an overview 

Phishing involves hackers attempting to obtain sensitive information such as passwords or credit card details from unsuspecting individuals by pretending to be a legitimate organisation via electronic communication channels. The “phishers” may use email, text, or even phone calls to trick the victim into inadvertently giving them information which the scammer can then use for nefarious purposes.

Although phishing attacks can take many forms, the aim is always to defraud from the victim while making them think that they are in contact with somebody they already trust.

Due to extensive media coverage, the general public has become aware of typical phishing schemes. As a result, scammers have had to become more creative in the manner in which they attempt to trick their victims. They have ramped up their efforts in designing convincing emails. It is becoming increasingly difficult to identify a fraudulent email or website. However, despite the increased challenge, there are some simple precautions you can take to ensure that you do not fall victim to one of these scams.

Spotting phishing emails 

First and foremost, users should always be suspicious of emails asking you for login information. Legitimate and reputable banks or organisations never email you for passwords or any other sensitive information. If you get an email asking you to sign in to your account because of an unspecified “issue”,  always open another tab and search for the website and log in from there.   Do not attempt to access your account by following the link in the email. If there is an issue with your account, there would be a notification when you log in. If in doubt, call the organisation and ask the representative about any problems with your account. They can confirm whether the email is legitimate or fake.

If you get a call from an individual who claims to be from your bank or another organisation which holds some personal information belonging to you, always check the number from which they are calling and see if it matches the number listed on the company’s website. If it doesn’t, hang up and call the number on the website. They can tell you if a genuine employee or a phisher had contacted you.

In addition to user awareness, technical solutions can be implemented to reduce the risk of falling victim to a phishing scheme. Email inboxes usually have inbuilt spam filters which filter out large amounts of suspicious emails. If a suspicious email makes it through, mark it as spam and delete it to prevent yourself from receiving similar emails in the future.

Sometimes emails make it through spam filters and the user cannot immediately identify whether or not they are legitimate communications. These emails are often crafted to be as convincing as possible, including the brand logo and even personal information about the victim that the scammer has obtained from social media, they may contain telling clues which give them away as frauds. In such cases, users should be aware of spelling errors, incorrect use of grammar, poor quality images or graphic design, as these are all signs that the email is not from a legitimate company.

The email address itself may look fake; for example, legitimate emails from PayPal are sent from a @paypal.com email address, whereas fake emails may be from a web-based email address (such as Google or Yahoo) while pretending to be from PayPal. Companies often address their emails to the customer directly, and not in a generic fashion such as “To our valued customer”.

Users should always check the URL of websites to which they are directed in an email, as these may be the only give-away that the whole thing is a scam. URLs from fake websites may use odd spellings, such as “0” for “O” so that upon first glance they appear legitimate. When in doubt, always find the website through an independent search through a browser instead of following a link embedded in an email.

Tags: Phishing
Sofia Peterson

Sofia Peterson

Sofia is a contributor at The Hack Post who loves to write about Technology. She also enjoys reading books and swims during her free time.

Next Post
5 Types of Technology That Your Business Should Be Using

5 Types of Technology That Your Business Should Be Using

Latest Articles

Industrial crushing and rolling machinery processing raw materials for manufacturing operations
Business

A Guide to Crushing and Rolling Technologies

November 2, 2025
Artificial intelligence technology enhancing mental health care solutions and support systems
Business

Stanley Vashovsky: A practical look at AI’s role in mental health care

October 30, 2025
Small dog relaxing on a balcony with city buildings in the background, adapting to condo living
Featured

How to Help Your Dog Adapt to Condo Life

October 29, 2025
CBD products and digital shopping cart illustrating online CBD purchasing in the UK
Cyber Security

Buying CBD Online in the UK: A Cyber-Savvy Buyer’s Guide

October 29, 2025
Person walking on a tree-lined path, promoting daily walking tips for a healthy lifestyle
Business

5 Tips for Consistent Daily Walks

September 27, 2025
Modern luxury condo interior with stylish furnishings, showcasing enhanced resale value features
Business

5 Tips to Boost the Resale Value of Your Luxury Condo

September 16, 2025
Modern home office with standing desk, ergonomic chair, laptop, and indoor plants for productivity
Business

4 Surprising Benefits of Standing While Working at Home

September 13, 2025
Colorful online slot machine reels and winning symbols highlighting strategies for extended win streaks
Gaming

How to Make a Beginner Win Streak Last: Smart Tips for Online Slot Games

September 13, 2025
How Modern Tech Is Reshaping DUI Defense
news

How Modern Tech Is Reshaping DUI Defense

September 6, 2025
Tips to Use Your Smartwatch & Level Up Your Experience
Technology

Tips to Use Your Smartwatch & Level Up Your Experience

September 5, 2025
5 Advantages of Using Smart Cameras in Modern Pet Care
Technology

5 Advantages of Using Smart Cameras in Modern Pet Care

August 23, 2025
5 Tips for a Sustainable Commute
news

5 Tips for a Sustainable Commute

August 10, 2025
  • Home
  • About Us
  • Authors
  • Submit News
  • Contact Us
  • Privacy Policy
  • Sitemap

The Hack Post © 2019

No Result
View All Result
  • Hacking News
    • Cyber Crime
  • Cyber Security
  • Technology
    • Internet
  • Entertainment
    • Gaming
  • Business
  • Science / Health

The Hack Post © 2019