Gone Phishing

6

 

Recently, we had a frantic customer call up and tell us that her email had been hacked! We understood her plight as most people store important information in their email and rely on it to confirm their identity with various institutions, such as banking and technology accounts. However, many people do not know that more often than not, their email accounts have not actually been “hacked” in the colloquial sense of the word, instead, they actually willingly provided some third-party their password!

Each and every day, countless people fall for the trap known as Phishing. In this type of deception, a third-party will attempt to gain access to accounts or information of unsuspecting internet-goers by disguising themselves (or their web-pages) as trustworthy; while in reality, they are in fact capturing your information. For example, one may receive an email from an address that looks like it originated from Gmail or Chase Bank, the email would say something convincing, often something (and ironically) about the security of one of your accounts. The email would contain a link or shortcut with which you can change/update your password. However, while the link may look harmless and secure, it is secretly recording the data and information that is inputted and relays that data to the attacker. One may think they are securing their accounts when in just a few short moments, they succeeded in doing the exact opposite. They have just willingly given over their sensitive information to a third-party.

There are various versions of the Phishing attack and it is important that one is wary that they can be the target of such attacks at any given moment. Even if a website seems legitimate, it is of paramount importance that the identity of the site or email in question is verified. Often, “hackers” do not actually subvert security protocols and break their way into online accounts, they merely fool online users into providing their usernames and passwords.

Ultimately, when using the internet, one must never let down their guard and always maintain a sense of skepticism when approached by notices, email, or other forms of electronic communication in an attempt to have one change their online information. Once one is acquainted with the various Phishing methods, it becomes second-nature and much easier to defend against such attacks. Do not fall prey to nefarious internet schemers! Read up on the various Phishing methods and train yourself to keep an eye out for them!

Did you fall prey to a Phishing attack or noticed some unusual activity on your accounts? Unsure who to trust and what precautions are needed? Computer Rabbis are available over the phone, email, and Whatsapp to help you with any questions or needs! Reach us at 845 202 0077

 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: