Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
How do a Phishing email/site look like?
The following are some of the examples of Phishing emails and websites:
• The email is convincingly good-looking. The sender and the true destination of the link are not plainly visible, which adds to the effect
• The email looks quite convincing, with the exception of the SPAM line at the end
• Poor formatting of this message makes it appear very phishy, but the link opens a convincing site
•An example of phishing site
Here are some recommendation about how to minimize the risk of susceptible to Phishing:
•Before submitting financial information through a Web site, look for the "lock" icon on the browser's status bar. It means your information is secure during transmission.
•If you are uncertain about the information, contact the company through an address or telephone number you know to be genuine.
•If you unknowingly supplied personal or financial information, contact your bank and credit card company immediately.
•Be careful about sharing personal information or letting it circulate freely.
•Be particularly careful about your SIN.
•Using technologies that enhance your security and privacy when you use the Internet, such as digital signatures, data encryption
•Pay attention to your billing cycle. If credit card or utility bills fail to arrive, contact the companies to ensure that they have not been illicitly redirected.
•Choose difficult passwords and change them often.
•Key in personal identification numbers privately when you use direct purchase terminals, bank machines, or telephones.
So long as the necessary steps have taken, phishing will not be easy to reach you.
Read more:
0 Comment:
Post a Comment