SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
Phishing is the attempt to obtain sensitive
information such as usernames, passwords,
and credit card details (and sometimes,
indirectly, money), often for malicious
reasons, by masquerading as a trustworthy
entity in an electronic communication. (WiKi)
SOME EXAMPLES
10 Tips to Prevent Phishing Attacks
1. Learn to Identify Suspected Phishing Emails
There are some qualities that identify an attack through an email:
 They duplicate the image of a real company.
 Copy the name of a company or an actual employee of the company.
 Include sites that are visually similar to a real business.
 Promote gifts, or the loss of an existing account.
2. Check the Source of Information from Incoming Mail
Your bank will never ask you to send your passwords or personal information by mail. Never respond to these
questions, and if you have the slightest doubt, call your bank directly for clarification.
3. Never Go to Your Bank’s Website by Clicking on Links Included in Emails
Do not click on hyperlinks or links attached in the email, as it might direct you to a fraudulent website.
Type in the URL directly into your browser or use bookmarks / favorites if you want to go faster.
4. Enhance the Security of Your Computer
Common sense and good judgement is as vital as keeping your computer protected with a good antivirus to block this
type of attack.
In addition, you should always have the most recent update on your operating system and web browsers.
5. Enter Your Sensitive Data in Secure Websites Only
In order for a site to be ‘safe’, it must begin with ‘https://’ and your browser should show an icon of a closed lock.
6. Periodically Check Your Accounts
It never hurts to check your bank accounts periodically to be aware of any irregularities in your online transactions.
7. Phishing Doesn’t Only Pertain to Online Banking
Most phishing attacks are against banks, but can also use any popular website to steal personal data such as eBay,
Facebook, PayPal, etc.
8. Phishing Knows All Languages
Phishing knows no boundaries, and can reach you in any language. In general, they’re poorly written or translated, so
this may be another indicator that something is wrong.
If you never you go to the Spanish website of your bank, why should your statements now be in this language?
9. Have the Slightest Doubt, Do Not Risk It
The best way to prevent phishing is to consistently reject any email or news that asks you to provide confidential data.
Delete these emails and call your bank to clarify any doubts.
10. Check Back Frequently to Read About the Evolution of Malware
If you want to keep up to date with the latest malware attacks, recommendations or advice to avoid any danger on the
net, etc … you can always read our blog or follow us on Twitter and Facebook . Happy to answer any questions you
may have!
 www.Facebook.com/D3pak
 Twitter @D3pak
Src: Pandasecurity.com
For more: Sans
D3pak Kumar
Digital Forensics | Cyber Intelligence

Más contenido relacionado

La actualidad más candente

Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime finalHarsha Matta
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Phishing
PhishingPhishing
Phishingdefquon
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposedtamfin
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 

La actualidad más candente (18)

Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Phishing
PhishingPhishing
Phishing
 
My presentation
My presentationMy presentation
My presentation
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Destacado

How to social/official network
How to social/official networkHow to social/official network
How to social/official networkDeepak Kumar (D3)
 
IT Certification's top Ten Benefits
IT Certification's top Ten BenefitsIT Certification's top Ten Benefits
IT Certification's top Ten BenefitsDeepak Kumar (D3)
 
Proactive Defense: Understanding the 4 Main Threat Actor Types
Proactive Defense: Understanding the 4 Main Threat Actor TypesProactive Defense: Understanding the 4 Main Threat Actor Types
Proactive Defense: Understanding the 4 Main Threat Actor TypesRecorded Future
 
Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016Equiinet
 
Smartphone Forensic Acquisition guide
Smartphone Forensic Acquisition guideSmartphone Forensic Acquisition guide
Smartphone Forensic Acquisition guideDeepak Kumar (D3)
 

Destacado (10)

C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
How to social/official network
How to social/official networkHow to social/official network
How to social/official network
 
Sexting
SextingSexting
Sexting
 
Facebook Security Tips
Facebook Security TipsFacebook Security Tips
Facebook Security Tips
 
DDOS
DDOS DDOS
DDOS
 
IT Certification's top Ten Benefits
IT Certification's top Ten BenefitsIT Certification's top Ten Benefits
IT Certification's top Ten Benefits
 
Proactive Defense: Understanding the 4 Main Threat Actor Types
Proactive Defense: Understanding the 4 Main Threat Actor TypesProactive Defense: Understanding the 4 Main Threat Actor Types
Proactive Defense: Understanding the 4 Main Threat Actor Types
 
Edward Snowden Data-Breach
Edward Snowden Data-BreachEdward Snowden Data-Breach
Edward Snowden Data-Breach
 
Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016
 
Smartphone Forensic Acquisition guide
Smartphone Forensic Acquisition guideSmartphone Forensic Acquisition guide
Smartphone Forensic Acquisition guide
 

Similar a 10 Tips Prevent Phishing

10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacksNamik Heydarov
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?Ankush Sarkar
 
Phishing
PhishingPhishing
PhishingSyahida
 
3 pervasive phishing scams
3 pervasive phishing scams3 pervasive phishing scams
3 pervasive phishing scamsSafeSpaceOnline
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidanceDavid Atkinson
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharmingDawn Hicks
 
Cyber Security for Everybody
Cyber Security for EverybodyCyber Security for Everybody
Cyber Security for Everybodyavahe
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackersseema Vishwakarma
 

Similar a 10 Tips Prevent Phishing (20)

10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Phishing
PhishingPhishing
Phishing
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?
 
Phishing
PhishingPhishing
Phishing
 
3 pervasive phishing scams
3 pervasive phishing scams3 pervasive phishing scams
3 pervasive phishing scams
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Phishing
PhishingPhishing
Phishing
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidance
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
Cyber Security for Everybody
Cyber Security for EverybodyCyber Security for Everybody
Cyber Security for Everybody
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers
 

Más de Deepak Kumar (D3) (20)

Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
Cyber Threat Intel : Overview
Cyber Threat Intel : OverviewCyber Threat Intel : Overview
Cyber Threat Intel : Overview
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
Cyber Forensics
Cyber Forensics Cyber Forensics
Cyber Forensics
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
THINK
THINKTHINK
THINK
 
Cyber Security Tips
Cyber Security TipsCyber Security Tips
Cyber Security Tips
 
CISSP INFORGRAPH MINDMAP
CISSP INFORGRAPH MINDMAPCISSP INFORGRAPH MINDMAP
CISSP INFORGRAPH MINDMAP
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
21st Century Cyber Forensics
21st Century Cyber Forensics21st Century Cyber Forensics
21st Century Cyber Forensics
 
IoT
IoTIoT
IoT
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Ransomware
Ransomware Ransomware
Ransomware
 
Success Mantra
Success MantraSuccess Mantra
Success Mantra
 
Registry Registrar Registrant
Registry Registrar RegistrantRegistry Registrar Registrant
Registry Registrar Registrant
 
Whatsapp
WhatsappWhatsapp
Whatsapp
 
Phishing Scam
Phishing ScamPhishing Scam
Phishing Scam
 
Information Security : A look
Information Security : A lookInformation Security : A look
Information Security : A look
 
Cryptography & Digital certificate
Cryptography & Digital certificateCryptography & Digital certificate
Cryptography & Digital certificate
 

10 Tips Prevent Phishing

  • 1. Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. (WiKi)
  • 2.
  • 4.
  • 5.
  • 6. 10 Tips to Prevent Phishing Attacks 1. Learn to Identify Suspected Phishing Emails There are some qualities that identify an attack through an email:  They duplicate the image of a real company.  Copy the name of a company or an actual employee of the company.  Include sites that are visually similar to a real business.  Promote gifts, or the loss of an existing account. 2. Check the Source of Information from Incoming Mail Your bank will never ask you to send your passwords or personal information by mail. Never respond to these questions, and if you have the slightest doubt, call your bank directly for clarification. 3. Never Go to Your Bank’s Website by Clicking on Links Included in Emails Do not click on hyperlinks or links attached in the email, as it might direct you to a fraudulent website. Type in the URL directly into your browser or use bookmarks / favorites if you want to go faster. 4. Enhance the Security of Your Computer Common sense and good judgement is as vital as keeping your computer protected with a good antivirus to block this type of attack. In addition, you should always have the most recent update on your operating system and web browsers. 5. Enter Your Sensitive Data in Secure Websites Only In order for a site to be ‘safe’, it must begin with ‘https://’ and your browser should show an icon of a closed lock. 6. Periodically Check Your Accounts It never hurts to check your bank accounts periodically to be aware of any irregularities in your online transactions. 7. Phishing Doesn’t Only Pertain to Online Banking Most phishing attacks are against banks, but can also use any popular website to steal personal data such as eBay, Facebook, PayPal, etc.
  • 7. 8. Phishing Knows All Languages Phishing knows no boundaries, and can reach you in any language. In general, they’re poorly written or translated, so this may be another indicator that something is wrong. If you never you go to the Spanish website of your bank, why should your statements now be in this language? 9. Have the Slightest Doubt, Do Not Risk It The best way to prevent phishing is to consistently reject any email or news that asks you to provide confidential data. Delete these emails and call your bank to clarify any doubts. 10. Check Back Frequently to Read About the Evolution of Malware If you want to keep up to date with the latest malware attacks, recommendations or advice to avoid any danger on the net, etc … you can always read our blog or follow us on Twitter and Facebook . Happy to answer any questions you may have!  www.Facebook.com/D3pak  Twitter @D3pak Src: Pandasecurity.com For more: Sans D3pak Kumar Digital Forensics | Cyber Intelligence