Thursday, 19 May 2016


6 Common Phishing Attacks and How To Avoid Them
Cloud Pages, 11 May 2016.

On February 2016, an apparently politically-motivated hacker accessed the personal information of 20,000 FBI employees and 9,000 Department of Homeland Security employees in a phishing attack. Nobody is immune from the phishing epidemic, and as it relies on human fallibility as much as technical wizardry, there’s no reason to believe it’s a problem that will go away. So what does phishing involve? And how can we defend ourselves?

‘Phishing’ is a method of fraud that involves tricking the victim into volunteering information such as account names and passwords to their online accounts - be they email, social, or banking accounts. Usually, phishing takes the form of a spoof email or website to which the victim unwittingly submits their log-in details. Money or data is then illegally extracted - but insurance companies are unwilling to stump up when the leak can be traced to a mistake made by the victim themselves.


Infographic Sources:
Fraudsters duped this company into handing over $40 million
2. An email hack can destroy our digital world and we won’t see it coming
3. Kaspersky Lab report: Over one million UK internet users experienced phishing attacks last year
4. The 'bogus boss' email scam costing firms millions
5. An Apology to Our Employees
6. Tech Firm Ubiquiti Suffers $46M Cyberheist
7. Email Attack on Vendor Set Up Breach at Target
8. Snapchat users watch 7 billion videos every day, and it’s almost caught Facebook
9. WhatsApp the subject of new malware attack
10. Types of Phishing Attacks
11. How to Identify 5 Common Phishing Attacks
12. Phishing: Fraudulent Emails, Text Messages, Phone Calls & Social Media
13. How to recognize phishing email messages, links, or phone calls
14. How to Protect Against Pharming
15. Spear Phishing: Scam, Not Sport
16. Two Dropbox Phishing Scams Cause Consumer Problems
17. Google Docs Users Targeted by Sophisticated Phishing Scam
18. Sophisticated Google Drive Phishing Scam Returns

[Source: Cloud Pages.]

No comments:

Post a Comment

Please adhere to proper blog etiquette when posting your comments. This blog owner will exercise his absolution discretion in allowing or rejecting any comments that are deemed seditious, defamatory, libelous, racist, vulgar, insulting, and other remarks that exhibit similar characteristics. If you insist on using anonymous comments, please write your name or other IDs at the end of your message.