Phishing Techniques: The 2016 Refresher Course

A common threat to your pc security is phishing. It may sound rather familiar as it’s been around for quite some time. BUT that is exactly the reason why you should be wary of it. Phishing is one of the more enduring ways in which scoundrels will aim to breach your cyber security. For the purpose of providing a more modern understanding of the phishing scam, this article discusses how it is now perpetrated with the technological developments we’ve enjoyed in the past years.

To clarify, phishing is the method where in your personal information is stolen through spam or other deceptive means. A cause of concern for this scam is that it evolves with the technology available. In order to effectively secure your information from internet phishing, it is important to have an updated knowledge of anti-phishing techniques.

Emails

When email was launched, it was to be the main way in which malware could be injected into a user’s system. This malware is usually attached to spam emails—once you click any links or any files within that email, the malware starts operating.

Search Engines

Who doesn’t use Google’s search engine nowadays, right? So it was inevitable that phishing scams would take this route as well. The scams works by directing the user to product sites that offer deals that seem too good to be true (and it is!). The less savvy pc owner may end up trying to buy a product and enter their credit card details which are the main target of the phishing sites. It is crucial for users to understand that there are fake bank websites that are tailored to look like the sites of reputable banks. These fake sites offer credit cards or loans at a very low rate so it’s important to be discerning of the sites you visit through search engine results.

Social Media Pop-ups

Whenever you access your social media pages, it is important that you keep track of which window or tab you are using. Phishing scams have evolved to the point that they can mimic your social media page quite convincingly but are in fact a pop-up or a different page entirely. If you try to interact with any of the icons of the pop-up, it’ll tell you that you have a new friend request or that you’ve been logged out and will need to sign back in. If you do, this will give phishers more information with which they can try to steal your identity.

Instant Messaging

With so many apps that feature a way to connect with strangers, it’s not unusual to get a message from a stranger who’s hoping to connect. So, phishing has evolved to incorporate even this seemingly innocuous exchange. You’re more than likely to get a message from a program, called bots, masquerading as a person and will likely send you the usual lines like “hello”. Once you engage or reply, you will receive a few odd lines and will eventually be directed to a link. Once you click it, a program will start and will infiltrate your profile and log your details like usernames and passwords which can be used to access other accounts.