Top Ad 728x90

,

How To Protect Yourself Against Phishing Attacks ?

1. What is phishing?

Phishing is the method of stealing login info(usernames and passwords) by directing the victim to a clone(fake) login page, that logs the login info without the knowledge of the victim.
Such clone website is known as a phisher.

Image result for phishing attack

Also Read: The Best 5 Websites to Scan Files from Viruses Online

2. How to protect yourself against phishing?

Use your login info in the correct places only.
Don't ever put your login info anywhere else than the page you registered to, unless it's a trusted service you know(such as youtube or blogger asking for your google account's info).
Make sure the website you're logging in isn't fake.

Whenever you login to a website, if you didn't type the URL(address) of the website yourself, i.e. if you clicked a link that led you to the login page(from message, website, search engine results), always check the url(address) to see if you're in the right place.
For instance, if you're logging in your facebook account, make sure the url appears as http://www.facebook.com/...
Where a phisher page would look like http://www.facebook.freewebs.com/... or http://www.facebook.justfree.com/... or any url whose part before the .com isn't exactly the same as the page you want to login to.

Make sure the links you're clicking aren't fake.
Whenever you're clicking a link, check where the link goes before clicking it. Links can be masked to appear as something else than the page they're leading to. For example, www.google.com leads to yahoo instead of google. Fortunately, in most browsers, whenever you point your mouse cursor over the link, the true location of the link is displayed on the bottom left part of the screen. Try it with the above link.

This is particularly important because it can protect you from another, rarer but more dangerous method called cookie stealing, which is basically automatically stealing your account if you're previously logged in the website.

Know that links to phishing pages are usually spread via email, and often represent impersonating trusted services and persons, such as making the email appear as it's sent from the website you've registered to, or a friend of yours whose account has been compromised.

Also Read: Here's The Best Penetration Testing and Ethical Hacking Course for Free !!

3. What to do if you have spotted a phisher?

Report the phisher as soon as you can.
Report the phisher's address here:
http://www.google.com/safebrowsing/report_phish/

If the phishing attempt has been done via message, report the message in any of the following services:

http://www.reportphish.org/forwardphish.php
http://www.reportphish.org/forwardphish.php
http://www.us-cert.gov/nav/report_phishing.html

If you received the message from a friend's compromised account, inform your friend, and other friends that might be in danger.

Also Read: How to Protect and Hide your Files easily

0 commentaires:

Post a Comment

Top Ad 728x90