This Article is About
e mail address
trustworthy source
s system
grammar
hackers
phishing attacks
Best Five Tips To Prevent Phishing
Join 1000's of Authors at StreetArticles Today!

Phishing is an age-old technique that is still used by hackers to obtain personal information. It is a kind of attack where the hacker would masquerade as a trustworthy source that lure the user to reveal private credentials like login details, credit card number, debit card PIN, etc. Phishing happens mostly through e-mails. Traditionally, hackers sent a link through e-mail that redirected the user to an untrustworthy website demanding confidential information. These sites look genuine and gain the users’ confidence and lead them to disclosing personal details.

Phishing attacks are characterized by mails being sent by reputed organizations with attachments. Once opened, these mails inject malware into the machine. If successfully executed, the system becomes a botnet, on most occasions.

Here are five techniques that you can adopt to prevent attacks against phishing.

1. Watch out for the e-mail content

Beware of e-mails that begin with a polite addressing like “Dear customer” or have erroneous spelling and grammar. Mails that have a compulsive tone and try to sound very urgent are better avoided. E-mails like this are mostly malicious and will invariably direct you to unsafe sites or use other techniques to gain your private information.

2. Be careful of opening attachments

Avoid opening attachments from a source that you do not deal with. Hackers may also invade your friends’ or employer’s system and send you mails without their knowledge. You may call up the sender and verify if you sense something suspicious in the mail. A hacker faking someone else’s e-mail address is a common way of spreading the infection.

3. Be cautious of links!

Sending untrustworthy links within e-mails is one of the most common techniques of phishing. The link, on most occasions read a genuine and safe path which is detoured to a different site using hacking techniques. You are suggested to visit the website manually instead of using the link, if they genuinely need it. Additionally, you can also do a mouse-over on the link to check for its actual path.

4. Reached a phishing website? Mislead it with wrong details

If you doubt that you have been conned into a phishing website, do not panic. The simplest way to protect your privacy is by entering a wrong password. This will also allow you to clear your doubt with regards to the authenticity of the site. A forged site will always accept a wrong password and display you a message or page saying there is some technical fault. Meanwhile, if the site is genuine one, putting wrong password will not grant you entry.

5. Do not use old/used passwords

It may be difficult to remember multiple passwords, but using the same password on different sites can make you an easy target of hackers. If you have different passwords, hackers will have to invade all your accounts individually. On the other hand, having different passwords will prevent information from getting hacked all at once.

E-mail security is an essential part of protecting your privacy. Little knowledge on e-mail defense and its subsequent application can ensure much better protection of your privacy against scams like phishing. Adopt caution before opening e-mail attachments and links. Ensure that all your passwords are in place. This is applicable to both home as well as business users.


Street Talk

No comments present
You May Also Like
My Progress So Far
In the short time that I have been with WA, (Wealthy Affiliates), I have started the lessons which are pretty knowledgeable, upgraded to Premium, which was solely my choice, so that i can benefit from the extended support, loads of tools, friendly and helpful team members, and enjoy an awesome…
By: Pam Plunkett in  Self Improvement  >  Achievement   Sep 29, 2013  
0
  Likes: 1

Legitimate Legal Services On-line
Legitimate legal service on-line is real. It is given by a company called Legal Zoom They're based in Glendale, California. Their business hours are from 6:00am to 7:00pm Pacific Standard Time. Customer Service is available. An e-mail address and telephone number is given. Legal Zoom is not a substitute for…
By: Mary Castner Comer in  Legal  >  Regulatory Compliance   May 09, 2011  
0
  Likes: 0

How to Use A Citation Generator
Welcome! This text will discuss how to use citation generators and the intended readers are pupils, students, and others who are surfing the web for information about this topic. It can sure be a challenge to produce and hand in quality texts, and teachers and others are quite specific when…
By: Kent Lofgren in  Reference and Education  >  College University   Jan 07, 2013  
4
  Likes: 3

Say - I Don't - to Scammers on Online Dating Sites
One of the biggest concerns I hear from many people about online dating is the safety of it all. With news stores of people getting scammed out of money, stalked, and left with a broken heart; it can be scary to think of putting yourself out there. Here are some…
By: Tracy Fagan in  Relationships  >  Dating   Feb 03, 2012  
1
  Likes: 1

Pinterest the Growing Website
This is a website promoting the interests of people interested to share with others. We can compare this web with face book and twitter. If we look at the back ground of face book and twitter - both have few hundreds of members in the beginning. But in a very…
By: venkateswara rao peesapati in  Relationships  >  Communication   Apr 26, 2012  
1
  Likes: 0

Easy Ways to Protect Your World Of Warcraft Account
World of Warcraft has become huge. Its popularity has grown to over 10.3 million players and is still growing daily. With this popularity come the thieves and hackers. There isn’t any shortfall of individuals who won't stop trying to hack you and rob your account of all your prized gear…
By: Denise Durband in  Gaming  >  Online Gaming   Jun 13, 2012  
0
  Likes: 0

Job Follow Up
Keeping track of a job interview is important to give the future boss a real inside view of who we are. Showing interest on a decision after a job interview is important to show our overall ethics and job dedication. There are many ways to do so, one can try…
  Likes: 2

Book Swap Clubs
Do you read a lot? I know I do. New books are so expensive, even on Amazon, and I am tired of paying the high prices. I had tried all the used book stores in the area and they had become so picky about the books they would take in…
By: Carter Crawford in  Business  >  Marketing   Feb 27, 2013  
0
  Likes: 0

Marketing on Craigslist: The Good And The Bad
Craigslist can be a great way to advertise any products you are promoting without costing you a cent, as long as you utilize it correctly. However, like most things marketing on Craigslist does have its pros and cons. The Good It is free to post-as long as you don't post…
By: Nessa  in  Internet and Businesses Online  >  Internet Marketing   Aug 23, 2013  
2
  Likes: 1

Internet Marketing: Basic Sales Skills
Good sales (in person AND online) is all about building credibility. You need to be able to show your prospects that you're knowledgeable, personable, and have their best interests at heart. To become knowledgeable, you need to not only understand your product, but also how it compares to the competition.…
By: Andrew B in  Internet and Businesses Online  >  Affiliate Revenue   Jun 23, 2012  
1
  Likes: 1

Why Would You Want To Do A Lookup Of Who Owns A Domain Name?
What's the point of doing a lookup of who owns a domain name? Don't you just need to know whether a domain name's available or not? Well, yes and no. If you check for the availability of a domain name you want, and it is available, no problem - click…
By: Ray Boreham in  Internet and Businesses Online  >  Internet Marketing   Jul 18, 2011  
1
  Likes: 0

Tips For Storing Your Customer Information On Your Website
Today, I'm going to share some tips on storing your customers' personal information on your website. With data breaches and identity theft on the rise, it's important to keep security as your number one priority when developing a website where you store client's personal data.Never store your customers passwords in…
By: Jason Molnar in  Legal  >  Identity Theft   Oct 26, 2011  
0
  Likes: 0

Why A Squeeze Page?
Do you know what a squeeze page is? What it is for? Why you need this? And what to put in it? I am going to give you the answers here to these questions. First off your squeeze page is the most important part of your business, oh besides your…
By: Chery Schmidt in  Internet and Businesses Online  >  Traffic Building   Jun 18, 2011  
2
  Likes: 0

Traffic, Traffic, Traffic Exchanges
Traffic Exchanges Can Be Rewarding If You Understand How To Make Use Of Them Traffic is the key to any kind of web based business, and you are going to see that there are lots of different methods that folks can go about getting this traffic. Many successful Online Marketers…
By: Frank Andres in  Internet and Businesses Online  >  Traffic Building   Sep 20, 2012  
0
  Likes: 0

Affiliate Marketing: Mobile Application for Fun And Profit
I first reviewed a mobile application by Textingly and touted all the benefits that it could have for an affiliate marketer. It was a texting application that followed the principles of Aweber, but after some further thought and use of the product, I have discovered many more uses for it.…
By: James Pullman in  Internet and Businesses Online  >  Traffic Building   Oct 13, 2011  
2
  Likes: 1

Article Views: 1124    Report this Article