Have you ever been a phishing victim? Below are the tips of how to avoid being a phishing victim. It is very important to know what is phishing. For those Who don’t know what is phishing let see first what is a phishing attack:
- Phishing is a type of deception designed to steal your valuable personal data, such as credit card numbers, passwords, account data, or other information by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public.
- Phishing is typically carried out by e-mail or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
- Phishing is an example of social engineering techniques used to fool users and exploits the poor usability of current web security technologies. The purpose of a phishing message is to acquire sensitive information about a user. For doing so the message needs to deceive the intended recipient.
How to avoid being a phishing Victim?
- Phishing e-mail messages are usually sent out in bulk and often do not contain your first or last name. Never respond to requests for personal information via email. When in doubt, call the institution that claims to have sent you the email. For example, “Dear Sir or Madam” rather than “Dear Dr. Jon”.
- If you suspect the message might not be authentic, don’t use the links within the email to get to a web page. Retype the address in a new window.
- Never fill out forms in email messages that ask for confidential information.
- Always ensure that you’re using a secure website when submitting credit card or other sensitive information via your web browser.
- Check the beginning of the Web address in your browsers address bar
- It should be ‘https:/ /’ rather than just ‘http:/ /’
- Look for the locked padlock icon on your URL bar.
Regularly check your bank, credit and debit card statements to ensure that all transactions are legitimate and if anything is suspicious, contact your bank and all card issuers immediately.
Ensure that your browser and OS software is up-to-date and that latest security patches are applied. Keep antivirus definitions updated.
Verify the real address of a website. Phishers also use Uniform Resource Locators (URLs) that resemble the name of a well-known company but are slightly altered by adding, omitting, or transposing letters.
For example, the URL “www.microsoft.com” could appear instead as :