All about phishing phishing and how to protect yourself from it ?!
July 17, 2018
No Comments
All about phishing phishing and how to protect yourself from it ?!
Electronic phishing is a form of fraud and electronic theft where it obtains personal and financial data and information through e-mails, counterfeit sites, telephone calls, etc. There are many ways that the hacker creates them in order to obtain the data he wants. It is one of the most attacks that rely on data theft and therefore you should pay attention as we watch every day in the news of modern ways to be implemented for that is called electronic phishing.
How does this attack happen?This starts when a hacker impersonates a person, such as a company, organization or official in a large site, and sends an email to someone who wants to know his or her data and contact you personally. Then something happens and the reason for your theft is when you are asked to You access a site and confirm your data or send a link to a site where there are scripts. These methods are by contacting you by e-mail, either if a phone call will ask you to give him some data that will help him to increase security Your account
Therefore we in this article will put you some important points that you must follow in order to protect yourself and your personality from this famous attack.
You must check the sites you visit and you should read the link well before clicking it and you can check the link but more importantly is to read the link well and properly, for example in the picture below the Facebook site with a sound link and fake link will be stolen from your account When you access it you must be careful of the shortcut links.
Therefore we in this article will put you some important points that you must follow in order to protect yourself and your personality from this famous attack.
1. Be sure of the sites you visit and you should read the link well before pressing it and it is possible
2. If the site is similar and the link is different, this does not mean that this link is valid. It is possible to create a website with ease, like a well-known site. It is possible to put the logo of the website or company simply.
3. You should read the content of the message well because most of the hackers often fall into errors such as misspellings, errors in the rules of writing or an error in the information in the message, which is why you should be very careful at this point.
4. You should make sure that you communicate with them through e-mail or social media and you should not trust them quickly, especially if they are trying to convince you to access a site or download a program on your computer.