Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

Tips To Secure Your Personal Data And How to Avoid Phishing Scams

535 visualizaciones

Publicado el

Phishing is a scam used by identity thieves to trick you into providing your sensitive personal or financial information under false pretense. Tips for securing your personal data & credit card information over the web.

Publicado en: Tecnología
  • Sé el primero en comentar

  • Sé el primero en recomendar esto

Tips To Secure Your Personal Data And How to Avoid Phishing Scams

  1. 1. ‘§| IIIII| |i HOWTUAVDID SCAMS/ (“all y The SSL Store” presents this infographic explaining how you can avoid phishing and other threatening scams. Phishing is a scam used by identity thieves to trick you into providing your sensitive personal or financial information under false pretense. Identify Official Looking Phishing Emails Thieves create and use official-looking emails in order to impersonate trusted entities such as banks, credit ca rd companies, and even wel| —known online resources like eBay or PayPal. VCd%1j| I-Olbl Qreoofigroasorrpanrranear-n. uIanraooelhot1oorIAIIolAnoflaI HSBC (D oeooarrlnnoruorebaoaaoooaudoyaoanmortaolturloarwwvotaatlng T ---~----~----v--—'----- pravuflutoa-aanrro. eoInnIaupor-fiyhihdnooanhaor-tslvo aeoonunhnrroa. hm: -ovD coo-ran: -«not-Os: Y-nanny-rauonnutloocaomv-strove-It-II-Ii-It: g, .y; ¢.§“_(—_. , , T:. :IaavaInoa¢uoarIebIo¢rlIoInIIa0aur-ulpnuoollooorlrrn $: :.‘J‘. '2.': '.: .'. .‘.1»! -.'T¢‘. ".‘: “.2.“. ‘t; ".. "2.1‘.2.L. -—'-~--vv----v«---wv-v-nw-vw-- ldarudaahorlnlanturwuaruaiudaott: 7‘. -’. _.""‘“‘. ‘.~'~. _'. .'h'““‘”'““_“ QrLhLIhdtnl3l‘_tr. llJ Yhnalipu. mggugpg Voannhbtaaororthyo--Dlhllaolrotavullhhrnldoo g. _., .‘_, tfllrrgamooloallatafioayouroaolprobrooooa. "S(<lov«4‘1c A-Iotooornapueanounoaeotoalanyialo. &uauIar. Io¢0llnonaalaoorI-Illodloyouraooimty fofiIIaatnon. &aIootaIauIraIarrndIanIooutfi oniarfiweaynolloaornyoolhafiballa mu to-nrnvur--9-unoaotrra-wanna, -mugs-nu-manor lo IIQOQV-an-A-n ca. no-at --vb-fin-a-uncul-email from, PayPal Blllrfifl Delliflrnent <BuIinoQPayPal. oom> Sublect cnawouau GHQ 096$ Date my 4. aoosoazrsoo PDT To u—--- aOousIsparnmers. corn Roplyfio. BlIinqQPayPal. eom l Du-var-use-vvarrieooc-aurlrl--nu-up--oomtrrn-Irwtvwmrn-Iv-vurho-was-A-outlay M I anal. -c, s~: (rrv-crow-vreyann-vpuu-¢14c-proyrrvu L‘g_& ‘acu-uproar. """"""""V"""""""""“""“"°°“"‘ ""“Y"‘»°°" . Imo-tar»-1 c-u-omit-ans. -an--4- sruv M W ym mgyg u- I»-ea nlamflltm -nu-. mumm : uu u. .w¢q. ¢¢. g_r¢yrrg. u¢y. .¢u. ..«yarn. p.yp. | ‘WW _‘. ,,¢gmg. accourltvnhave-ssuodtt-srrarruiamessaoo Ofllhuunlnflxl Ir-auu-n0n21')a-. ha-ainu trhascornatoouratlari-ontnuyouaccouilrlorrnatlonnaaos I-uv-n -’v. t~-Ia-n Iaaoupaaraoaraio lnaelrvemomtnts. mun: andspoot rapons ‘*"‘v'“""*"‘”‘*‘°~"""v‘l °'“"'3”‘““‘-"‘""v"" l1youcouopIaautaka5-IomHauaouolyauorImaaupa6erIcam¢ranoa _ youraoorasyoumlnotnnlrlourylinuanrnuunsvdthtrnoririasuvica. ljn-nu-nnqrr. ' rbweuv, mum to upaarayouv records votl mm In accoum suspension 0 u‘n¢_m. ,-u. hcuwpryhlor-I-flhralhurndalvlvrvvytlnohiuvn(n, I4'Aa1VVvI| OIN T'“'¢l'¢""‘°‘9l'“°"‘a' Distinguish the Fraudulentfmm Legitimate Websites Some phishing scams will go as far as to divert you to a fraudulent website designed to look exactly like your own bank's website or a similarly trusted source. However, when you enter your username/ password and other sensitive information it is transmitted directly to a con artist who intends to abuse it. Take some time to view the examples below, can you spot the difference? <: ..»s; - Lu Sites that have an Extended Validation (EV) SSL display a Always check the URL in the address bar. Suspicious or odd prominent QEEN HIGHUGHTWITHIN THE ADDRESS BAR. This addresses such as the example at the right are a clear indication obvious visual cue entirely removes the guessworkout of r'denti- that you are likely not on the site you thinkyou are. The URL may fying legitimate websites due to the thorough process required even look correct in an email but it is quite easy edit the to receive one. destination so that you are taken to a completely different place. Jim? h I . I2:j"“""" -nrszoana-an-unaaam, -ha---onto--sear. --won . pggg&'num, Learn to spot the telltale signsof a secure site. At the absolute At first glance many websites look to be the genuine real thing. minimum, a website should have a URL that starts with https: // — But ifyou look closely at the text once more, you may begin to not only http: // — and it should also display a padlock icon in the spot misspellings and other typos that will certainly indicate the browser frame as well — NOT on the site's page. These factors will site you are looking at is fake. help you determine how secure a site actually is. Recognize Common Phishing Language in Emails Be on the lookout for common phishing language in emails such as "Verify your account. " Legitimate businesses absolutely will not send you an email requesting your login credentials (username/ password) or any other sensitive personal information. Also, lookout for emails that try to convey a sense of urgency. 20 Most Common Words Used in Phishing Attacks in the First Half of 2012. Verify your account Invoice Label Document A Calculations Post L Postal Copy 4 FedEx . Statement I Financial ‘ DHL USPS if Notification ‘ IRS K‘ UPS 7 Delivery Ticket L Won Credit Card Tips for Securing your personal Data & Credit card Information Create a Strong Password Always include special characters within your passwords, especially those for email and banking purposes, and never use your birth date or name. Avoid Phishing Emails Don't open emails with subjects such as You Won the SSS Lottery or Verify yourCredit card Details and never click on a link included within spam emails. Be Wise About lNi-Fi Before you send sensitive personal information over your laptop or smartphone on a public wireless network in a coffee shop, library, airport, hotel, or other public places, deeply consider whether your information will be protected. Lock Up Your Laptop Only keep financial information on your laptop when absolutely necessary. Avoid using an automatic login feature that saves your login credentials and always be sure to log off when you are finished. That way, if your laptop is stolen, it will be much harder for a thief to get their hands on your personal information. Always Prefer https: // Websites for Online Transactions Always check that a website is secured with a SSL (Secure Socket Layer) Certificate and that it displays the padlock symbol in the frame or address bar ofa trusted browser such as the example below. 0 6000 (- 0 rm ssr mm more woo sen- Ms) hltpa thesslstorexom c Sources’ Eu, '."l: -’1'. E'i. CC-lT‘lUdl. ‘l / ~|lspav'm1edup SS I re ©2014 The SSL Store”