Have you heard about the danger of phishing and would like to know what it is? We’ll explain it to you.
Phishing is a scam used to steal information from the Internet. Phishing emails containing links to fake websites are usually used for this purpose. Mail and website look deceptively real and often lead users to enter personal information. This article will tell you what exactly phishing is, how to spot it, and then what to do.
The word “phishing” is made up of two English words, “password” and “fishing”. It means something like “fishing for passwords”. And that is exactly what phishing scammers do: They trick their victims into entering sensitive data such as email addresses or passwords on the Internet. They then access this information and misuse it. They spread even more spam and phishing emails via captured email addresses; with the help of third-party access data, they manipulate user accounts or even steal money.
The phishing scam: You get an email that looks official, real and trustworthy. For example, the email seems to come from your bank, the social network Facebook or the payment service PayPal. In this email, you will be asked to click on a link to update your data, enter your credit card number, or renew your password. Popular reason: Your data has been lost, or your account has been blocked.
The link then takes you to a website that also looks deceptively real. If you log in there with your data or provide it, the fraudsters will fish the information because email and website are fake. The phishing scammers send their fake emails to several addresses at the same time – this increases the likelihood that someone will fall into it and divulge their data.
An extended form of phishing is what is known as spear phishing. Here, the fraudulent emails are not sent indiscriminately to countless email addresses, specifically to a few recipients. Victims are, for example, individuals or companies. With the exact target, the scammers can find out about their victim in advance and design the phishing email and phishing website so that the victim is very likely to fall for it. The goal of this attack is usually to steal specific data, such as trade secrets.
Phishing emails used to be easy to spot. Often they were written in broken German or another language, bristling with errors and immediately attracting attention due to their strange layout. This still happens, but most of the time, the emails cannot be recognized as a phishing attack at first glance. Even so, there are some indications for this:
To not fall victim to phishing scammers in the first place, you should handle your data carefully. Don’t give away your email address lightly, and protect all your accounts with strong passwords. You should also use a separate one for each service – otherwise, fraudsters will have access to all services if they steal your password. We explain how to find a secure password here. To protect yourself against attacks on your computer, you should always keep your browser, operating system and anti-virus software up to date.
If you have detected a phishing attempt, you should report it to the consumer advice centre on the one hand and, on the other hand, the company concerned. Both can then take action against the fraud and warn consumers and their customers. Then it would help if you put the sender of the mail on the spam list of your mail program.
If you are not entirely sure whether the email is genuine, ask the company concerned. Important: Do not use the links and contact details from the questionable email for this! Call up the company’s website yourself by entering the address in the browser and use the contact options provided there.
If you’ve fallen for a phishing email and disclosed data, you need to act quickly. When it comes to login details, the scammers will change them very soon so that you can no longer access your account. So try to beat them up and change your password. If you have given bank details, contact your bank immediately and have your account blocked. Also, keep an eye on your transfers.
There is not an industrial sector or a company that is not being transformed today… Read More
Although its logistics capabilities have been known for some time, RFID technology is now ready… Read More
There is great expectation for the future reform of the ePrivacy directive, which concerns the… Read More
How Many Steps Does Market Research Involve? The best technique for doing statistical surveying is… Read More
On September 9 and 10, Silicon is organizing two days of web conferences to share… Read More
Today's unpredictable business world presents serious security breaches and data theft threats as constant risks;… Read More