Joke Collection Website - Blessing messages - Deciphering phishing scams gives you advice on how to prevent being cheated.

Deciphering phishing scams gives you advice on how to prevent being cheated.

Nowadays, with the development of network economy, criminals begin to look to the Internet. Now, even if it is really a dog sitting on the other side of the network, criminals will try their best to defraud illegal interests, and their fraudulent means are varied and hard to prevent. We usually call this behavior "phishing". Recently, Kaspersky Lab released a report on online fraud decryption, detailing how to prevent all kinds of online fraud. Next, let's take a closer look. E-mail phishing E-mail includes false information sent by fake banks, electronic payment systems, e-mail service providers, social networking sites and online games. The purpose of these emails is to obtain confidential data of users (such as user name and password). ). Among them, impersonating a bank for phishing fraud is the most common phenomenon, and its purpose is to obtain and control users' online bank accounts or electronic payment system accounts. Once cybercriminals have mastered the user's login name and password, they can directly access the user's account. Fishermen are very good at disguising phishing emails as very similar to those sent by real organizations, and they also copy official content in overall style. Usually, these emails will prompt recipients to click on the link in the email to visit their websites and enter their personal information, which will then be sent to cyber criminals who commit phishing. Not only that, many times these fake websites also contain exploit programs. Even if the user clicks on the link out of curiosity without entering the user name and password, spyware can be installed on the user's computer. These malicious programs will be secretly installed without the user's knowledge, and finally steal the user's personal data. So, how to identify phishing emails? You receive an email from a bank, electronic payment system or mailbox service provider. If you don't use the above-mentioned bank, electronic payment system or email service provider, then this email is definitely fraudulent spam, please delete it as soon as possible; If you do use the above-mentioned banks, electronic payment systems or mail services, and you receive an email claiming to be sent by these institutions, you must read the email. If the user is required to enter the login name and password in the email, then the email must be fraudulent, because legitimate companies and organizations will never obtain the login information and password of the user in this way. In addition, you need to be wary of emails with attachments. Some emails may not be phishing emails, so you can't get your personal information, but the attachments they carry are likely to be malicious, so you must think twice. Social phishing social networks are becoming more and more popular, and many people have accounts on social networking sites such as Facebook and Twitter. Sometimes, we will find some false reminder emails, and the purpose of these false emails is to steal users' personal data and obtain users' social network accounts, which is very similar to phishing scams against banks. First of all, users will receive a reminder email claiming to be from social networking sites, which claims that someone has left you a message or wants to add you as a friend, or you need to update your account information. If you click on the link, you will be directed to a fake website. If users enter their user names and passwords on this website, they will be sent to online fraudsters. Of course, there are also some fake prompt emails on social networking sites that don't require users to enter their user names and passwords, and these emails are similar to real emails 100% except for links. However, if users carefully look at the address of the link, they will find that the address they direct users to is not the official address of the social networking site. Internet fraudsters often make these fake fraudulent websites very similar to real websites. For example, a fake website will use hxp://fasebook.com/,while the real address is hxp://Facebook.com/. Online game fishing can be said to be pervasive, and online games that are deeply loved by teenagers are no exception. At present, there are more and more frauds against online games, and they are also very standardized, that is, to lure gamers to fake websites. So, be sure to remember one thing. Real official emails never let users enter their user names and passwords in the clicked links. In addition to fake websites, online scammers will use some other means. For example, to invite users to participate in the beta test of a new game or get a free gift, all users need to do is click a link. However, if users click on a link, they may fall into their trap and be directed to a fake website. Therefore, personal data is stolen by online fraudsters. It may also be directed to an infected website, which may cause users' computers to be downloaded and installed with various malicious software. The proverb "knowledge is power" in other traditional scams is very practical for protecting yourself from online scams. Sometimes, you need to know that cyber criminals will use many different fraud methods, and then you can judge who is trying to cheat you. The most common types of fraud are as follows: (1) False winning tips Some emails will tell users that they have won the lottery prize. The purpose of online scammers is to trick users into paying a certain fee and transfer their bonuses to their accounts. (2)4 19 email, or Nigerian scam email. Some emails will ask the recipient to remit money to a remote country, mostly a country in Africa. In return, the swindler will promise a high reward. After that, the fraudster will ask the user's bank account number and claim to transfer the money due to the user to the account. But in fact, they will not transfer money to their accounts at all, but will withdraw money from them. There will be other variants of this scam. For example, a fraudster may ask you to remit a sum of money, claiming that the money is used to pay for legal services or transportation expenses. After the money is remitted, they will cut off contact with the victims. (3) MLM, making money quickly. In this kind of scam, the fraudster will ask the potential victim to invest a small sum of money and then get a high return. But in fact, the victim will not get any reward at all. (4) E-mails used for online begging fraud look very much like those from charities or other organizations in need of help. However, these emails are actually completely forged. Or although it contains links to real charities, the payment details will ensure that all the money received will eventually fall into the pockets of fraudsters. (5) Spam SMS fraud. This kind of fraud will involve e-mail, and fraudsters will use various methods to persuade users to send short messages to paid numbers. This fraudulent email sometimes contains a link to a website, and when users visit the website, they will be prompted to send a short message to pay for the service. Avoid being "fished" After we "decrypted" various fishing methods, I believe that everyone has a deeper understanding of various scams, so how should we guard against them? Here are eight suggestions of great practical value. (1) Use antivirus software: The current antivirus software can be updated regularly, thus providing reliable protection against various Internet threats. (2) Download and install system and software updates on a regular basis: System and software vulnerabilities can be exploited by cyber criminals, thus causing users' computers to be infected. These vulnerabilities can be fixed by downloading and installing updates. (3) Don't post your personal information to public resources: the information and data posted on the Internet will be collected by automatic robots and finally handed over to cyber criminals. Cybercriminals can use this data in a targeted way (for example, sending a lot of spam to users' email addresses). (4) Don't download anything from unknown websites: No matter downloading programs, books or movies from unknown websites, malicious software may be downloaded at the same time. (5) Don't click on the links in the e-mail: because these links often lead users to fraudulent websites or websites infected by malicious programs. (6) If you have doubts about the sender of the email, never open the email attachment: it is likely that the attachment contains malicious programs (even if the attachment is only a Word document). (7) Don't try to "unsubscribe" from spam (especially if there is an "unsubscribe" link in spam): Doing so won't get you rid of spam. On the contrary, you will actually receive more spam. There may be two reasons for this phenomenon: first, your address may be added to the database of people who actually read these emails, and then you will receive more and more spam. Or, after you click the "unsubscribe" link, you will be directed to the infected website, which will eventually cause your computer to be infected. (8) Don't believe any investment advice that looks very attractive, especially those that promise to make easy money: these investment suggestions are actually scams. Cybercriminals will cheat you of your money, or manipulate the victims to engage in illegal activities, and the victims will ultimately bear legal responsibility. Although the current information security solutions are very powerful, it is certain that all kinds of online scams will not disappear, and cyber criminals will come up with more tricks to obtain illegitimate interests.