how to protect yourself against phishing threats?

Share if you likedShare on Facebook0Share on Google+3Tweet about this on TwitterShare on LinkedIn12

Phishing is the attempt to get sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
Attackers get this information by sending you links to sites that look like sites you trust like your online banking website or social networks and can steal your data as you enter it.

It is necessary for users to know all different types of phishing scams and to learn how to protect themselves against them.

Our latesthackingnews readers should do the following:

– Always pay attention to the links before clicking (especially on social media), hover over it to preview the URL, and look carefully for misspelling.

– Enter your login credentials (username and password) only over a secure connection. Pay attention to the “https” prefix before the website URL.

– Beware of messages that ask for personal information.

– Avoid logging into your online bank account and similar services via public Wi-Fi networks. It’s better to use a secure network than to lose all of the money on your credit card or in your bank account.

– Be careful about unsolicited attachments and make sure that they come from a trusted source.

– Protect your system with a firewall, spam filters, anti-virus and anti-malware software.

Always be careful when you are on the internet, because you may be targeted at any time.

Share if you likedShare on Facebook0Share on Google+3Tweet about this on TwitterShare on LinkedIn12

Eslam Medhat

is a professional pen-tester with over 9 years of IT experience bringing a strong background in programming languages and application security, ranging from network and system administration to exploit research and development. He reported various vulnerabilities for high profile companies and vendors and was successfully acknowledged by them.

Leave a Reply