Wednesday, December 17, 2014

Phishing he signs and Options

Phishing is the act of an individual e-mail to a user in an attempt to scam the user to disclose personal information. It is easy to determine if this is a scam? Sometimes - but not always. Hope that helps enough examples and information to protect themselves from these nasty people give.

Also, sometimes the email sent to malware, so helpless equipment. Therefore, it is important that you do not click on the link provided, as is the trigger to load the software on your system.

Examples of Phishing

You can get hundreds of emails in the mailbox, but an email to the eyes - it takes you to a site that asks you to update your personal information. He calls personal information, such as:

- Password
- Credit card numbers
- Social security number
- Account numbers

"It seems to be legitimate," you say to yourself. It is also observed that the email of businesses that have done business with for a while. "Warning: The site could be wrong.

Some examples of phishing in action.
1. The email indicating that they are E-bay and feel that your account is compromised and who want to deliver their data kontrolieren comfortably with them. Do not click on it.

2. E-mail from PayPal or your bank asking you to verify the information, because they feel that your account has been compromised, or God forbid, suspended. The same scenario, different companies. Do not click on the link.

3. E-mail indicating that an unauthorized transaction has occurred on your account. Click the link below and confirm your identity. Do Not.

4. Here is a work in home scam - we need to see your resume on Monster and feel you would fit our position. If you are interested, please visit our website, so that you have the necessary experience and submit your resume, if you have that context. Website is professional looking, offer looks good - but it could be a scam.

What they after

In the above examples, for information, whether passwords, credit cards, social security numbers, all can relate to - and that they can use to take advantage of you.

The work email is used to ensure that the email is a real, active email address blue. What do you do with that information - that sell to spammers money from these accounts. You must confirm your email address

No comments:

Post a Comment

"Thank you for reading my blog, please leave a comment"