Phishing Case Study

708 Words3 Pages
EMAIL PHISHING AND ATTACKS

Phishing was a word in the beginning used to portray email attacks that were used to rob your online banking username and security password. On the other hand, the term has evolved and now refers to almost any email-based attack. Phishing uses social engineering, a method where cyber attackers try to fool you into performing an action. These attacks often start with a cyber unlawful person sending you a mail faking to be from someone or an identity you know or have faith in him, such as a friend/colleague, your bank or your favorite online website. These emails then tempt you into taking a step, such as clicking on a link/word opening an attachment or replying to a message. Cyber criminal’s technique these mails to look persuasive, sending them out to literally billions of people around the globe. The criminal’s don’t specifically target a person or have a mindset, nor do they know precisely who will fall victim of their attacks. They simply know the more emails they send, the more public they may be able to trick. Phishing attacks works in four ways:

• Harvesting Information: The cyber attacker’s aim is to prey you into clicking on a link/word and taking you to a website/blog that asks for your login and security password, or even your credit and debit card or ATM number. These websites look legitimate and lawful, with exactly the same pattern with originality, imagery and feel of your online bank, but they are frivolous websites designed by the cyber invader to steal your data.
• Infecting your computer system with malicious links: Once again, the cyber invader’s goal on you is to click on a link/word so that you fall a victim of their attack. However, instead of harvesting your information, their...

... middle of paper ...

...hat you were expecting.
• Just because you got n mail from your friend, colleague does not mean they have sent it. Your friend’s computer may have been infected with or their account may have been compromised with security and loosing password and malware is sending the mail to all of your friend’s contacts and lists. If you get a suspicious e-mail from a genuine friend, call them to verify that they sent it. Always use a contact number that you already know or can independently confirm, not the one that was included in the message for you.
If after reading an mail you are of opinion it is a phishing attack or scam might take place, simply delete the mail. Ultimately, using mail safely and secure is all about common sense. If something seems and is visible of suspicious or too good to be true, it is most likely an attack and trap for you. Simply delete the mail.
Open Document