Tuesday, 20 May 2014

How to Protect Yourself from Phishing Scams

      

        How to Protect Yourself from    Phishing  And Scam


Phishing scams can happen when malicious organizations or people (also known as cybercriminals) present themselves as an entity you can trust, then try to trick you, or lure you, into providing them with your personal information. Phishing scams normally occur via email, websites, text messages, and sometimes, even phone calls. Cybercriminals will often pose as your bank or financial institution, your employer, or any other entity that you normally trust with your information. To protect yourself from phishing scams, you can learn about the methods these cybercriminals use and the signs that indicate you may be a potential victim.
 


  1. Protect Yourself from Phishing Scams Step 1.jpg
    1
    Determine if the nature of the correspondence is suspicious. The subject content of the email, phone call, or text message will often help you determine if the message is legitimate.
    • Phishing correspondences will usually ask you for sensitive, personal information that the organization should already have. For example, if your bank sends you an email asking you to provide them with your bank account and routing number, it may be a phishing scam.
    • In some cases, phishing correspondence may be written to induce panic or assume a threatening tone designed to make you act immediately and provide your personal information.
  2. Protect Yourself from Phishing Scams Step 2.jpg
    2
    Review suspicious emails and text messages for spelling and punctuation errors. In most cases, phishing scams are not proofread before they are sent and contain multiple errors.
    • If the email or text message is coming from a major business or corporation, it is unlikely that spelling and punctuation errors will be published without review by an editor.
  3. Protect Yourself from Phishing Scams Step 3.jpg
    3
    Call the organization directly to verify the inquiry. This will allow you to determine if the correspondence you received is legitimate or a phishing scam.
    • Mention to the organization that you received suspicious correspondence and you need to clarify its authenticity. The organization may also take further action on their end if it is a phishing scam.
    • If you were left with a voice mail or automated message providing you with a phone number to call, verify that the phone number matches with the phone number in your records for that organization.
  4. Protect Yourself from Phishing Scams Step 4.jpg
    4
    Examine the website links and logos in suspicious emails you receive. In some cases, links and logos are masked to look legitimate but may take you to a different website or cause you to download malicious files.
    • Hover your cursor over the link or business logo within your email. A small pop-up bar that displays the true website address will appear below the link embedded within the email.
    • Refrain from clicking or visiting any unfamiliar links that end with an "exe" extension. "Exe" links may cause you to download malicious software, spyware, or other programs that can steal your personal information.
  5. Protect Yourself from Phishing Scams Step 5.jpg
    5
    Examine the email address of the entity that sent you the email. Sometimes, phishing scams will display email addresses that resemble authentic company email addresses, but vary slightly enough to trick you. For example, if the email address for a business ends in "company.com," a phishing scam may use a variation such as "trusted.company.com" to trick you.
  6. Protect Yourself from Phishing Scams Step 6.jpg
    6
    Provide your personal information only to websites that are secure. This may prevent any personal information you enter from being seen or stolen by malicious entities.
    • Look at the address bar of the website you are visiting to determine if the site begins with "[[https" https"] [https" https"]] rather than "[http." http."] The "[[https" https"] [https" https"]] part of the web address indicates that the website is secure.
    • A yellow padlock icon displayed toward the bottom of your web session can also help you determine a website's security. Double-click on the padlock icon to verify that a security certificate displays on the screen, as some websites will display just a graphic of a padlock to be malicious.
  7. Protect Yourself from Phishing Scams Step 7.jpg
    7
    Review your bank statements regularly. This will allow you to see if any unauthorized charges or purchases have been made with your account, indicating that you may be the victim of a phishing scam.
    • If you notice any unauthorized activity in your bank account or on credit cards, notify your local authorities and your financial organizations immediately. This may prevent the cybercriminals behind the phishing scam from continuing to use your information.
Connect Me on Facebook:-






My New Facebook Page:-  

2 comments:


  1. Hello everyone, i would like to share my experience with you all, I lost over 100 thousand dollars to all these fake so called BO merchants , after several attempts in trying to recover my money all efforts failed, i was looking through the page of the internet then i saw cybergoldenhacker they were recommended as a good and reputable company so i reach out to them, to my surprise i was able to to recover all my funds
    contact: cybergoldenhacker at gmail dot com

    ReplyDelete

  2. Hello everyone, i would like to share my experience with you all, I lost over 100 thousand dollars to all these fake so called BO merchants , after several attempts in trying to recover my money all efforts failed, i was looking through the page of the internet then i saw cybergoldenhacker they were recommended as a good and reputable company so i reach out to them, to my surprise i was able to to recover all my funds
    contact: cybergoldenhacker at gmail dot com

    ReplyDelete

 
 
Blogger Templates