top of page

Phishing & Spoofing

Everything you need to know and how to prevent it.


Phishing and Spoofing

In the last post we discussed malware, phishing and spoofing are two popular methods of using malware to access information or gain control. Phishing involves sending out e-mails, or websites being designed that ask you for your information directly, or prompt you to use a provided link that installs malware onto your computer. This type of cybercrime extends past the internet, where phishers also use phone calls and text messages to achieve the same goals. Spoofing is an extension of phishing, which involves dummy websites that impersonate ones that you are likely actually trying to access. When you mistakenly provide information on these fake websites, you are inadvertently installing malware onto your computer. 


Credit: Unsplash

Prevention

Awareness is key to avoid becoming a victim of phishing and spoofing. Always look closely at the contact information of who is communicating with you. Often times, these types of cybercriminals will have phone numbers that look like they are real, and e-mail addresses that are extremely close to what an e-mail address from the actual website or organization would look like. Most major organizations will not ask for your personal information, and when something is being called an emergency, that should raise red flags. Never give out your personal information without checking with others that you trust, and looking up the source of these phone calls, e-mails or information gatherers, and check whether or not they are contacting you from the right places. For more information check out this link. (https://itstillworks.com/difference-between-phishing-spoofing-2602.html)

Identity theft is a real concern, and will be further examined in the next post.

コメント


bottom of page