Phishing is a method through which criminals try to steal personal and financial information from Internet users. The most common method used by Internet fraudsters is using email lures to "fish" for sensitive information, such as passwords and financial data.
This section contains a set of rules and examples that will help you steer clear of this problem.
Rule #1. Use common sense
Never give confidential information in an email message, instant message, or pop-up window if you cannot verify that the one you are talking to is a legitimate person.
Banks, auction sites like eBay, online stores such as Amazon or online payment solutions like PayPal won't ask you by email to provide your account information or any other financial information.
Phishing emails and websites often have misspellings and bad grammar. Others may load pictures from the original sites and include links that target legitimate websites, making it harder for you to determine whether that email is a scam or not.
When you receive an email from a company or business, examine it carefully first:
Why was it sent?
Is the name of the organization misspelled?
Have you recently made any transactions with that company?
If an email appears to be fraudulent or suspicious, please contact the company which the email supposedly came from or forward it to the legal authorities.
Remember! Do NOT take immediate action as requested in the email.
Not sure whether the email is a fake one or not, ask for help! Our Support Team can be contacted 24/7.
You can also forward phishing emails to this dedicated email address: email@example.com. Your feedback will be used to protect other Internet users from being scammed.
Rule #2. Reduce the risks
Apart from the above, the risk of phishing can be lowered by basic security measures:
Always keep your software updated: from your operating system to security software such as your antivirus or firewall.
Filter your emails: use a spamfilter or create email rules within your email client. Ask your network administrators to set additional server filters.
Browse safely: check for data encryption. Verify if the key or padlock sign is present in the lower right corner of your browser window and double click on it to verify the security certificate. The certificate should be valid and match the webaddress you accessed.
Rule #3. Educate yourself
Test your vigilance by taking the online phishing quiz offered by SonicWALL and look at the examples of phishing scams presented within the next pages.
Note: All of the examples used within this guide were taken from fraudulent emails and websites discovered by or forwarded to BullGuard Ltd.
Page 1 | Page 2 | Page 3