Phishing of course is when you receive a fraud based email designed to trick you into clicking links and entering your personal information. In some cases when clicking those links you may download a virus. Their intention is to bypass your computers security.
Phishing is emerging as sophisticated due to ways in which the phish emails are disguised to look like legitimate communications often from other trusted employees on the inside or companies you may do business with.
The criminals behind these emails are doing their research on company websites finding key individuals to model and following up their research on Facebook and LinkedIn to make their phish emails more personal.
And while criminals are still targeting “whales” or CEOs of major corporations and their officers, they are using similar attacks on consumers, as well.
Home invaders are using similar tactics to stalk their prey. You receive a knock on the door, and the minute you open it, like clicking a link, you’re vulnerable. Their intention is to bypass your home security alarm by getting you to open the door.
Home invaders use some ruse like they are from the gas company or making a delivery or some may lie that their car broke down. All of these methods prey upon your trusting of another person or business that you may have a relationship with.
Home invaders do their research. They watch you on social media, they look up basic information and they often target the head of the household.
Protecting yourself from phishing or home invasions comes down to one fundamental principle: Don’t automatically trust or believe that whoever is contacting you in any form has good intentions. We trust by nature, and that’s great, but not allowing yourself to question others intentions set you up to fail.
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.
- Phishers Using Holidays and Social Media to Target
Recent reports of “The Oak Ridge National Laboratory, home to one of the world’s most powerful supercomputers, has been forced to shut down its email systems and all Internet access for employees since late last Friday, following a sophisticated cyberattack.” The sophisticated cyber attack was reported to be the lowly unsophisticated phishing email. Phishing is emerging as
- Phishing 101: How Not to Get Hooked
You’d think that it would be as easy as pie to avoid getting reeled in by a phishing scam. After all, all you need to do is avoid clicking on a link inside an email or text message. How easy is that? A phishing scam is a message sent by a cybercriminal to get you to click on a
- Phishing Scammers Target Macs
On Christmas Day, 2011, Apple product users were targeted by a major phishing attack. The Mac Security Blog reported, “A vast phishing attack has broken out, beginning on or around Christmas day, with emails being sent with the subject ‘Apple update your Billing Information.’ These well-crafted emails could fool many new Apple users, especially those who may
- Hackproof your facebook account
With over one billion people connected to Facebook, we have to assume that many of them are criminals. (Criminals are people with friends too!) But the criminals we need to be concerned about are the ones who create all kinds of scams designed to do everything from getting us to open our wallets to clicking
- Be aware of all these Confidence Crimes
Criminals often rely on tricking their victims to gain access to their passwords and other account information. This act of tricking is called social engineering, also known as a confidence crime, and it comes in many forms. A type of phishing e-mail where the criminal targets someone specific is called spearphishing. The spearphishing e-mail will look
Leave a Comment
You must be logged in to post a comment.