Phishing attacks also known under familiar names - Phishing. Phishing often appears as a trusted activity by legitimate companies or a reputable website such as eBay, Paypal, Gmail or online banks in various forms.
In this article, we would like to introduce to you some of the most common Phishing attacks. Regardless of the form, you should be able to grasp the basic ways to identify and prevent. Let's follow through the infographic below.
The 4 most common forms of phishing
- Email Phishing
- Call (Vishing)
- Messaging (SMiShing)
- USB trap
Phishing emails often appear as a trusted entity with the intent of stealing personal data to make money. This type of Phishing often attaches malware installation files to your computer or links to illegal websites to trick victims into transferring personal data.
Statistics show that up to 91% of advanced cyber attacks start with email, 50% of recipients will open the email and click on a phishing link. This data shows that Phishing by email is an extremely effective way used by cybercriminals.
- How to identify and prevent Phishing attacks via phishing emails
Phishing phone calls are made by cybercriminals impersonating financial services, banking to entice users to provide remittance or other sensitive information.
The number of Vishing damage globally is about 46.3 billion USD per year.
TIP: Limit receiving calls from unknown phone numbers and never give personal information over the phone.
This form is done using text messages to lure the victim Download malware to your phone, visit a phishing website, or call a fake phone number.SMiShing-type messages can also be compelling, prompting a victim to trust, leading to an immediate action such as a request for the owner's personal and confidential information and account details.
A recent Pew Research survey found that only 32% of smartphone users have installed anti-virus software on their phones. So the likelihood that phishing attacks over the phone still achieve their goals is quite high.
TIP: Do not reply to the message or click on any links. Delete messages and block the number of senders immediately.
In phishing attacks using USB, cybercriminals attack victims' psychology when they often "forget" USB devices to the user will plug in his or her computer for the purpose of finding the owner of the device. These USB drives are used to inject malicious code, redirect you to phishing websites, or grant hackers access to your personal computer.
A Phishing attack on medium-sized organizations will "evaporate" about $ 1.6 million each.
So stay alert and resist the temptation to insert a "natively" USB flash drive into your computer just to see what's on it. Instead, take it to a qualified IT department to handle it.
Be careful and protect yourself from Phishing attacks!