Not yet registered? Create a OverBlog!

Create my blog

What is phishing and how can it be avoided?

Phishing is the name given to a particular type of internet scam that is used primarily by criminals and hackers in order for them to try and obtain personal and valuable information about people that can then be used in various different ways. I shall be discussing what phishing is and how best to avoid it.

What is phishing?

Phishing is when criminals or hackers gain sensitive or personal information by pretending to be legitimate sources. For instance, the phisher might send a scam email purporting to be from the victim's bank. Upon opening the hoax mail, the user could be asked to login to their account and may be presented with a link that leads them to what looks like their bank's website. Whilst everything may look legitimate as the victim attempts to login, their sensitive data such as user name, password etc. will be automatically sent to the scammers for them to use for fraudulent purposes.

How to avoid phishing

There are a number of basic techniques that a user can undertake to avoid being the victim of a phishing hoax. Some of these are outlined below: - Never click on a link purporting to be from your bank, credit card company etc. that asks you to log into your account. Most banking institutions have a policy whereby they would never do this. - When doing something like online banking, always ensure that you log into the bank through a secure website. This can be seen in the web address bar with 'https://' (not the s at the end of http) at the start of the address. - Never fill out a form that you have received via email that asks for personal information. - Many web browsers now have available plugins that will protect users against known fraudulent websites. Consider installing one of these. - If you receive a hoax email, be sure to forward it to the support email address of the company the hoax email is trying to imitate. - Regularly login to bank accounts etc. and keep an eye on any suspicious activity. - Do not use the same passwords for different accounts and change them regularly. Final word
By following the few simple rules above will help to thwart any phishing attacks in their tracks.

Same category articles Computers

How do I secure my wireless network?

How do i secure my wireless network?

Wireless networks are extremely convenient, but they are also vulnerable to hackers. this problem is made worse by the fact that many wi-fi networks have very little or no security. below is a short guide to some of the security settings available for your network and how best to implement them.
Types of light laptops

Types of light laptops

For people on the go, be it students or business professionals or all other types of people from different walks of life, having a laptop with them can be an essential part of everyday living. with that said, there can be nothing worse than carrying around a weighty laptop for many hours a day. here, i shall be looking at different types of light laptops.
All about: Cyber law

All about: cyber law

If you are interested in law, then you have probably studied internet or cyber law at one point or another. this is the form of law and law enforcement related to internet technology. it has become an increasingly important epidemic. moreover, the law enforcement agencies around the world have created more sophisticated "white collar crime enforcement" agencies. this article will discuss on cyber law and how it pertains to you.
Where to buy an HP notebook battery

Where to buy an hp notebook battery

Do you own an hp notebook? are you searching for an hp battery for your notebook? in this case, you don’t have to spend your valuable free time searching, visiting retail stores and browsing through brochures and hundreds of websites. read the following article and find out all the interesting facts that you need to know about buying an hp notebook battery.