What is Phishing
Phishing is an illegal technique used to steal confidential information relating to a person or company with the intent to carry out fraudulent operations.
The confidential information that can be stolen concerns: username and password, access codes, current account numbers, ATM, and credit card details.
How Phishing works
The method consists in sending an email that is the same as the one sent or could send by a regular institution, such as a bank. The email usually explains technical problems for which you are asked to click on a link. Through the link, the cybercriminal gets hold of the victim’s data.
How the phishing scam happens
The scam is usually done via email, but text messages, chat, and social media can also be used. The data thus stolen can then be used to make purchases at the victim’s expense, withdraw money from her account, or even carry out illegal activities using her name and credentials.
How to defend against Phishing
The Privacy Guarantor recommends a series of attention ranging from being wary of any email that requires the inclusion of confidential data to knowing how to recognize scams by paying attention to a series of signals.
It is essential to refrain from replying to these emails because even with the reply, the issuer may be able to trace specific personal and confidential data.
Phishing: the vademecum of the Guarantor
Here is the information provided by the Privacy Guarantor in the infographic published on its website. To find out more, download the Phishing handbook: beware of personal data “fishermen.”Personal data, access codes, and passwords should never be disclosed to strangers.
If you receive suspicious messages, do not click on the links contained in them, and do not open any extensions.
It is helpful to pay attention to the sender or his email address.
You better be wary of messages with harsh tones.
It is helpful to install and revise an antivirus program on your PC or smartphone that protects against Phishing.
Better not to store personal data and access codes in the browsers used to browse online.
For online purchases to be made insecure, it is good to use prepaid credit cards or other payment systems that allow you to avoid data sharing.
Check your movements and activate automatic alert systems that notify the user of each operation performed.
You can find amazing wireless facts here