Not yet registered? Create a OverBlog!

Create my blog

What is phishing and how can it be avoided?

Phishing is the name given to a particular type of internet scam that is used primarily by criminals and hackers in order for them to try and obtain personal and valuable information about people that can then be used in various different ways. I shall be discussing what phishing is and how best to avoid it.

What is phishing?

Phishing is when criminals or hackers gain sensitive or personal information by pretending to be legitimate sources. For instance, the phisher might send a scam email purporting to be from the victim's bank. Upon opening the hoax mail, the user could be asked to login to their account and may be presented with a link that leads them to what looks like their bank's website. Whilst everything may look legitimate as the victim attempts to login, their sensitive data such as user name, password etc. will be automatically sent to the scammers for them to use for fraudulent purposes.

How to avoid phishing

There are a number of basic techniques that a user can undertake to avoid being the victim of a phishing hoax. Some of these are outlined below: - Never click on a link purporting to be from your bank, credit card company etc. that asks you to log into your account. Most banking institutions have a policy whereby they would never do this. - When doing something like online banking, always ensure that you log into the bank through a secure website. This can be seen in the web address bar with 'https://' (not the s at the end of http) at the start of the address. - Never fill out a form that you have received via email that asks for personal information. - Many web browsers now have available plugins that will protect users against known fraudulent websites. Consider installing one of these. - If you receive a hoax email, be sure to forward it to the support email address of the company the hoax email is trying to imitate. - Regularly login to bank accounts etc. and keep an eye on any suspicious activity. - Do not use the same passwords for different accounts and change them regularly. Final word
By following the few simple rules above will help to thwart any phishing attacks in their tracks.

Same category articles Computers

How to select a gaming desktop PC

How to select a gaming desktop PC

Computers today are powerful enough to support visually exhilarating games and people are demanding capable PCs for such activity. Desktop PCS are best for gaming demands since they are beefier and more powerful than the fastest laptops ever created. All-in-one PCs (used for documents, Internet, and light-gaming) are not enough to play large games like Crysis 2, Assassin’s Creed, and the Call of Duty franchise. This article will help you to buy a PC that will let you enjoy incredible gaming experience.
How to check broadband speed

How to check broadband speed

Ever wondered if your provider is indeed delivering the speeds it promised? Look no further as this guide will explain how to check your download, upload and ping speeds. Your broadband connection will forever be available to you, whenever you are connected to the internet.
Benefits of an APC surge protector

Benefits of an APC surge protector

For the past 30 years, APC have been the strength in AC and DC world. Their product line varies from surge suppressors, Uninterruptible Power Supply (UPS), power conditioners, and many more other power devices that we all know and use in our households. This article provides you with an overview of the benefits of an APC surge protector.
Where to buy Canon wireless printers

Where to buy Canon wireless printers

Are you thinking of buying a Canon wireless printer? Are you wondering where you can find the ideal one? If that is the case, you don’t have to spend your time searching, visiting retail stores and browsing through hundreds of magazines and websites. Read the following article and find out all the interesting facts that you need to know about buying Canon wireless printers.