Phishing Scams in 2019 – How to Stay Safe

The internet has undeniably become a phenomenon, affording individuals from around the globe access to information like never before—and all from the comfort of home. Gone are the days of library visits for research, movie theater outings for watching films, or grocery store runs to shop for food.

 

This ramped-up ease of access to our world, however, is a double-edged sword. Just as we’re capable of dialing into the world with a few simple clicks, the world, in turn, is able to gain access to us with similar ease. This is where phishing scams come into play. These are cyber attack used by individuals hiding behind a computer screen to gain access to personal information, such as credit card or social security numbers.

2019 is just around the corner. As technology continues to evolve, it’s incredibly important to learn how to stay safe from cyber crimes such as phishing scams.

 

In this article, you’re going to learn how to recognize and avoid these malicious cyber attacks to guarantee the safety of your browsing experience.

 

So What Exactly Is a Phishing Scam?

 

In a nutshell, phishing scams hide behind cyber-disguises to assault unwitting victims. As its name suggests, phishing involves the use of a “lure” or “bait” to deceive targets and commonly comes in the form of an email claiming to be a trusted and known source, such as a bank.  Oftentimes, these scams will link to a website, known as a Spoof Site, that closely mimics the one of a known company.

On this page, users are asked for private information—such as their social security number, credit card details, and other pieces of sensitive data that can be stolen for profit.

Regardless of how a phishing scam is carried out, one thing is for certain—the consequences to a credit score, bank account, job security, company, and peace of mind of a person who’s fallen for the lure can be devastating.

There are Many “Phish” in the Sea

 

An important thing to keep in mind is that as technology evolves, so too do cyber crimes. Online predators are constantly crafting new schemes for fooling victims into revealing their personal details. Some of the most frequently employed attacks used by phishing scammers include cloning, spearing, and whaling.  Let’s take a closer look!

Clone Phishing

With the help of malware installed within a system, cybercriminals can “clone” a previously-delivered email and alter its contents to make it suit their purposes.

 

Oftentimes, this email will claim to offer a correction or update to a message received earlier on and will then redirect responses to a nearly-identical email address. Not only can clone attacks help gain data about a recipient, but they can serve as vectors into uninfected systems.

Spear Fishing

Spear phishing is by far one of the most common forms of scams, with over 91% of victims falling for the trap. Personalization and the authentic-looking nature of the Spoof sites used in these scams are the driving factors behind their effectiveness.

 

They’ll often include tidbits of the target’s personal information, such as their name or phone number, heightening the authentic nature of the Spoof site and making the email more convincing.

Whaling

 

In the wide world of phishing scams, targets with the most funds and resources are considered  “whales.” These bigger fish might include members of a company’s executive management team, politicians, celebrities, and others in high-profile positions.

 

Scammers that hunt “Whales” are known as “Whalers” and they typically brandish far more sophisticated methods of phishing software to draw out important information from their targets.

 

Usually, they’ll send their target an email that requests their private information with a sense of urgency, claiming that jobs or lives hang in the balance if their requests are not fulfilled.

 

Avoid Getting Hooked by a Phishing Scam

 

No matter how sophisticated the efforts are on the part of these phishing scammers, there are simple measures you can take to avoid getting hooked!

Exaggerated Urgency is a Red Flag  

 

Generally, emails that seem wildly urgent and claim to be from trusted parties are scams. Just remember, important agencies such as law enforcement or the IRS will never send important messages via email.

Call and Type to Corroborate  

 

If you’re unsure if a trusted party has reached out to you, it’s always safest to call the institution in question rather than divulge sensitive information online. Just be sure to dial the number you have saved for them or on their website and not the one provided by the email.

 

Similarly, verify information provided in an email by manually typing in the URL for the company from which it claims to be and see if you can find something substantiating the email’s claim on the official company site. Do not use links provided in the email, as they might lead to a Spoof Site.

Act Once You Know

 

The simplest rule of thumb to abide by is, if something feels fishy, it might be phishing. If your gut is telling you that something is off about a site, take the time to verify the claims. If the email is from a reputable source, they won’t mind if you take the time to follow the necessary precautions, and if the source is malignant, a little bit of research can spare you a world of discomfort further down the line.

 

If you’re in need of New York  IT services and would like to work with a reputable institution that cares about keeping your personal information safe, contact us today and speak with one of our representatives to learn more about our IT services.

 

Like this article?

Share on facebook
Share on Facebook
Share on twitter
Share on Twitter
Share on linkedin
Share on Linkdin
Share on pinterest
Share on Pinterest

Leave a comment