Tutorials

The best tips and recommendations to avoid identity theft or phishing

Today, technology is so deeply ingrained in us that it is very easy to perform any kind of action through it, talking to any kind of person and a thousand other things.

With the technological advances that exist today and taking advantage of the trust we place in them, many unscrupulous individuals have multiplied the new technics to do their wicked things and get others to deceive them by saying or performing actions intentionally.

Basically people take advantage of the lack of security , in this case, Internet portals, to be able to assume someone else's identity, or manipulate other people through them to obtain information or whatever, by taking advantage of their trust.

In this article, we will tell you all about this method to cheat people. You will also find everything you need for prevent a phishing attack .

What is phishing?

Phishing is a somewhat "modern" method used by pirates to deceive other individuals using non-legitimate accounts or outside entities, to manipulate third parties to get what they want.

People who practice Phishing are known as phishers and usually use it to get information that they usually can't access. Phishing can be used to steal data with which you can access a victim's accounts.

Phishers, or cybercriminals , that is, those who apply this technique to deceive people, need some social engineering knowledge to get the other individual to throw the data or perform the action they want.

To use this method, phishers "hide" behind a supposedly official account of a company or after the identification of a third party, in this way they manipulate their victims and take advantage of their trust to obtain or obtain some type of personal information. the victim does any type of thing that may generate losses in the future or immediately, such as obtaining personal data allowing the phisher to gain access to the victim's bank or personal accounts.

The mode of operation of the phisher is not always to interact directly with the victim, another very common method is to use malware or malicious software , term used to identify computer codes or programs for malicious purposes, which intend to cause damage to systems or automatically steal your data.

Types of phishing

Thieves and crooks are increasingly creating more and more up-to-date techniques to carry out their despicable deeds, taking advantage of the trust we can instill in third parties via social networks or any other form of communication. Then we will name the types of phishing the most common at the moment.

  • Le spear phishing is when the Phisher Investigates of the victim and the media with known created data is recognized by the victim. This in order to manipulate it and obtain useful information to sell on the black market
  • Whaling or identity theft , it is said that when the hacker uses an identity with an authority recognized by the victim, it is generally used to manipulate them and make them contribute money for the benefit of the phisher.
  • Le pharming occurs when the manipulation occurs via an email received containing the address of another page known to the victim. To access it, however, this web page is only a facade for the victim to enter their data and so the hacker can take advantage of it to subsequently steal their identity.

Tips and recommendations to avoid identity theft or phishing

  • Do not open or access unknown emails or links
  • To access a website that has reached you via email or message, as a link, it is best to access it manually by entering the address in the browser and not directly from the link provided.
  • Constantly configure the security and privacy of your PC
  • Do not respond to messages or emails requesting any type of personal data or data with which they can access some of their accounts
  • Use anti-malware security software

Similar items

Leave your comment

Your email address will not be published. Required fields are marked with *

Button back to top