• Home
  • About Us
  • Authors
  • Submit News
  • Contact Us
  • Privacy Policy
  • Sitemap
The Hack Post
  • Hacking News
    • Cyber Crime
  • Cyber Security
  • Technology
    • Internet
  • Entertainment
    • Gaming
  • Business
  • Science / Health
No Result
View All Result
The Hack Post
No Result
View All Result

Protecting Yourself from Phishing

Sofia Peterson by Sofia Peterson
June 14, 2019
Protecting Yourself from Phishing
Share on FacebookShare on Twitter

Phishing attacks have dramatically increased in number in recent years. But what is phishing? How do these scammers obtain user information? Moreover, most crucially, what are the best practices for avoiding a phishing attack?

Phishing: an overview 

Phishing involves hackers attempting to obtain sensitive information such as passwords or credit card details from unsuspecting individuals by pretending to be a legitimate organisation via electronic communication channels. The “phishers” may use email, text, or even phone calls to trick the victim into inadvertently giving them information which the scammer can then use for nefarious purposes.

Although phishing attacks can take many forms, the aim is always to defraud from the victim while making them think that they are in contact with somebody they already trust.

Due to extensive media coverage, the general public has become aware of typical phishing schemes. As a result, scammers have had to become more creative in the manner in which they attempt to trick their victims. They have ramped up their efforts in designing convincing emails. It is becoming increasingly difficult to identify a fraudulent email or website. However, despite the increased challenge, there are some simple precautions you can take to ensure that you do not fall victim to one of these scams.

Spotting phishing emails 

First and foremost, users should always be suspicious of emails asking you for login information. Legitimate and reputable banks or organisations never email you for passwords or any other sensitive information. If you get an email asking you to sign in to your account because of an unspecified “issue”,  always open another tab and search for the website and log in from there.   Do not attempt to access your account by following the link in the email. If there is an issue with your account, there would be a notification when you log in. If in doubt, call the organisation and ask the representative about any problems with your account. They can confirm whether the email is legitimate or fake.

If you get a call from an individual who claims to be from your bank or another organisation which holds some personal information belonging to you, always check the number from which they are calling and see if it matches the number listed on the company’s website. If it doesn’t, hang up and call the number on the website. They can tell you if a genuine employee or a phisher had contacted you.

In addition to user awareness, technical solutions can be implemented to reduce the risk of falling victim to a phishing scheme. Email inboxes usually have inbuilt spam filters which filter out large amounts of suspicious emails. If a suspicious email makes it through, mark it as spam and delete it to prevent yourself from receiving similar emails in the future.

Sometimes emails make it through spam filters and the user cannot immediately identify whether or not they are legitimate communications. These emails are often crafted to be as convincing as possible, including the brand logo and even personal information about the victim that the scammer has obtained from social media, they may contain telling clues which give them away as frauds. In such cases, users should be aware of spelling errors, incorrect use of grammar, poor quality images or graphic design, as these are all signs that the email is not from a legitimate company.

The email address itself may look fake; for example, legitimate emails from PayPal are sent from a @paypal.com email address, whereas fake emails may be from a web-based email address (such as Google or Yahoo) while pretending to be from PayPal. Companies often address their emails to the customer directly, and not in a generic fashion such as “To our valued customer”.

Users should always check the URL of websites to which they are directed in an email, as these may be the only give-away that the whole thing is a scam. URLs from fake websites may use odd spellings, such as “0” for “O” so that upon first glance they appear legitimate. When in doubt, always find the website through an independent search through a browser instead of following a link embedded in an email.

Tags: Phishing
Sofia Peterson

Sofia Peterson

Sofia is a contributor at The Hack Post who loves to write about Technology. She also enjoys reading books and swims during her free time.

Next Post
5 Types of Technology That Your Business Should Be Using

5 Types of Technology That Your Business Should Be Using

Latest Articles

Home Meditation Mindful Moments and Modern Tech
news

Home Meditation: Mindful Moments and Modern Tech

May 17, 2025
Why Living in a Condo is Ideal for Families
news

Why Living in a Condo is Ideal for Families

May 12, 2025
Zen Your Condo Tips for a Tranquil Space
Business

Zen Your Condo: Tips for a Tranquil Space

May 8, 2025
4 Hobbies for Introverts
news

4 Hobbies for Introverts

May 3, 2025
5 Benefits of Living in a Condo for Professionals
news

5 Benefits of Living in a Condo for Professionals

April 22, 2025
Are German Proxies Legal? The Complete 2025 Guide
Technology

Are German Proxies Legal? The Complete 2025 Guide

April 16, 2025
5 Ideas for Your Condo Console Gaming Setup
news

5 Ideas for Your Condo Console Gaming Setup

April 11, 2025
5 Creative Ideas to Level Up Your Condo Gaming Room
news

5 Creative Ideas to Level Up Your Condo Gaming Room

March 30, 2025
6 Helpful Tips when Moving with Your Pet
news

6 Helpful Tips when Moving with Your Pet

March 19, 2025
Enhancing Security Measures for A Seamless Mobile Trading Experience
Technology

Enhancing Security Measures for A Seamless Mobile Trading Experience

March 19, 2025
5 Ways Condos Support Health-Conscious Living
Science / Health

5 Ways Condos Support Health-Conscious Living

March 8, 2025
The Future of Mobile Gaming 5G, Al, and Cloud Inclusion
Entertainment

The Future of Mobile Gaming: 5G, Al, and Cloud Inclusion

February 21, 2025
  • Home
  • About Us
  • Authors
  • Submit News
  • Contact Us
  • Privacy Policy
  • Sitemap

The Hack Post © 2019

No Result
View All Result
  • Hacking News
    • Cyber Crime
  • Cyber Security
  • Technology
    • Internet
  • Entertainment
    • Gaming
  • Business
  • Science / Health

The Hack Post © 2019