Not yet registered? Create a OverBlog!

Create my blog

What is phishing and how can it be avoided?

Phishing is the name given to a particular type of internet scam that is used primarily by criminals and hackers in order for them to try and obtain personal and valuable information about people that can then be used in various different ways. I shall be discussing what phishing is and how best to avoid it.

What is phishing?

Phishing is when criminals or hackers gain sensitive or personal information by pretending to be legitimate sources. For instance, the phisher might send a scam email purporting to be from the victim's bank. Upon opening the hoax mail, the user could be asked to login to their account and may be presented with a link that leads them to what looks like their bank's website. Whilst everything may look legitimate as the victim attempts to login, their sensitive data such as user name, password etc. will be automatically sent to the scammers for them to use for fraudulent purposes.

How to avoid phishing

There are a number of basic techniques that a user can undertake to avoid being the victim of a phishing hoax. Some of these are outlined below: - Never click on a link purporting to be from your bank, credit card company etc. that asks you to log into your account. Most banking institutions have a policy whereby they would never do this. - When doing something like online banking, always ensure that you log into the bank through a secure website. This can be seen in the web address bar with 'https://' (not the s at the end of http) at the start of the address. - Never fill out a form that you have received via email that asks for personal information. - Many web browsers now have available plugins that will protect users against known fraudulent websites. Consider installing one of these. - If you receive a hoax email, be sure to forward it to the support email address of the company the hoax email is trying to imitate. - Regularly login to bank accounts etc. and keep an eye on any suspicious activity. - Do not use the same passwords for different accounts and change them regularly. Final word
By following the few simple rules above will help to thwart any phishing attacks in their tracks.

Same category articles Computers

Where to buy a cheap laptop tote bag

Where to buy a cheap laptop tote bag

If you are interested in buying a cheap laptop tote bag for yourself, this article will help you to find where you can purchase a stylish one.
What to look for when buying bluetooth keyboards

What to look for when buying bluetooth keyboards

The decision to buy a keyboard is not an easy one. there are various types of keyboards available on the market and each one comes with its distinct advantages and disadvantages. there are the good old wired keyboards which have been in existence for decades. there are folding keyboards which offer you ease of use; and then, there are bluetooth keyboards for users who are looking for an advanced keyboard. this article tells you what you should look for while buying a bluetooth keyboard.
Where to buy DVD printers

Where to buy dvd printers

Dvd printers enable you to print labels on your dvds at home. labelling a dvd makes it recognisable and it adds an aesthetic value to it. dvd printers are easy to use and anybody can follow the procedure. it also cuts down the cost that you might incur by getting your dvds printed on the market. for someone who has to work regularly with dvds in bulk, a dvd printer is the perfect product.
How to block a website

How to block a website

If you want to keep your employees from wasting time or to protect your children from online threats, then it would be a good idea to block certain websites. to find out exactly how to block sites quickly and easily, keep on reading.