Not yet registered? Create a OverBlog!

Create my blog

What is phishing and how can it be avoided?

Phishing is the name given to a particular type of internet scam that is used primarily by criminals and hackers in order for them to try and obtain personal and valuable information about people that can then be used in various different ways. I shall be discussing what phishing is and how best to avoid it.

What is phishing?

Phishing is when criminals or hackers gain sensitive or personal information by pretending to be legitimate sources. For instance, the phisher might send a scam email purporting to be from the victim's bank. Upon opening the hoax mail, the user could be asked to login to their account and may be presented with a link that leads them to what looks like their bank's website. Whilst everything may look legitimate as the victim attempts to login, their sensitive data such as user name, password etc. will be automatically sent to the scammers for them to use for fraudulent purposes.

How to avoid phishing

There are a number of basic techniques that a user can undertake to avoid being the victim of a phishing hoax. Some of these are outlined below: - Never click on a link purporting to be from your bank, credit card company etc. that asks you to log into your account. Most banking institutions have a policy whereby they would never do this. - When doing something like online banking, always ensure that you log into the bank through a secure website. This can be seen in the web address bar with 'https://' (not the s at the end of http) at the start of the address. - Never fill out a form that you have received via email that asks for personal information. - Many web browsers now have available plugins that will protect users against known fraudulent websites. Consider installing one of these. - If you receive a hoax email, be sure to forward it to the support email address of the company the hoax email is trying to imitate. - Regularly login to bank accounts etc. and keep an eye on any suspicious activity. - Do not use the same passwords for different accounts and change them regularly. Final word
By following the few simple rules above will help to thwart any phishing attacks in their tracks.

Same category articles Computers

The importance of encryption

The importance of encryption

With the exponential increase in computer technology and information available online over the past twenty years, data encryption now plays a vital part in protecting what you transmit online from hackers, cyber-thieves and even rouge employees!
Where to buy a Pro desktop computer

Where to buy a pro desktop computer

Whilst for many people a pro desktop computer will be out of bounds in terms of cost, for professionals out there such as video or photo editors and music studios, a powerful computer is a must have part of their working environment. indeed, without one, certain tasks just would not be possible. this article will be looking at where to buy a pro desktop computer.
A guide to recycling ink cartridges

A guide to recycling ink cartridges

Recycling has been widely discussed around the world as well as within the everyday society and their cry has surely been heard by the technological industry. without doubt, being able to recycle ink cartridge has helped many people to save a lot of money and while on the other hand, it has helped some businesses cash in. there are many people using cartridges and toner, which provide the raw material for this business. this article provides a guide to recycling ink cartridges.
How to buy an HP large-format printer

How to buy an hp large-format printer

Hp printing solutions for large printers includes wide-format printers and large-format printers in addition to hp scanners, hp plotters and hp copiers. you can contact retailers, resellers and hp authorised dealers to buy an hp large-format printer. read on this article to know where to buy an hp large-format printer.