It has become easy enough to identify and dismiss e-mails from people pretending to be relatives who get in trouble abroad, or from do-gooders asking for help for victims of calamities. These “appeals” have been exposed for what they are — scams.

 

However, this, and the sense of security derived from advanced features in most mobile phones and messaging apps make vigilance against phishing even more relevant and indispensable. After all, scammers are experts at evolving with the times.

 

According to Internet security firm Kaspersky Lab, phishing attempts increased by 27.5% by third quarter of 2018, recorded at 107,785,069. The financial segment bore the brunt of the attacks, with over a third aimed at banks, payment systems, and e-commerce organizations.

 

Jon Paz, Bank of the Philippine Islands (BPI)’s Data Protection Officer and Enterprise Information Security Officer, explains the common phishing scams and shares some tips to protect against such attacks, especially during long weekends and holidays when criminals take advantage of increased activity online.

 

“Often, fraudulent e-mail will alert you to a problem that may be fixed if you ‘verified’ your information by clicking on a link, or ask you to support disaster relief efforts or even a political campaign by providing your information using a form embedded in the message,” Paz says.

 

Common phishing schemes to watch out for

 

Spear phishing – Social engineers target and focus on a specific individual or organization. They use information that is particular to the recipient, usually sourced from social media accounts, to appear legitimate and gain the person’s trust. Because these attacks are specific, their chances of success are generally high.

 

Malvertising – Derived from “malicious” and “advertising,” social engineers create a malicious advertisement which aims to spread malware that would later on damage the system. That way, social engineers can get access to sensitive information.

 

Whaling scam – Impersonating the name of the CEO or company executive is another way for social engineers to steal information. They send out emails to its victims using the name of the CEO or executive to make it seem like a genuine request.

 

Vishing – Also known as voice phishing, social engineers use fake caller IDs and ask the victim to key in his or her personal information.

 

Smishing – Social engineers would usually send out text messages containing a phishing website link to many different numbers with hopes of victimizing as many as they can.

 

Protect yourself against phishing

 

Make sure to double check e-mails from your bank and online sellers. “Banks will never e-mail to ask you to verify your personal information. If any action is requested by the bank through e-mail, you should contact the bank through their official channels,” Paz says.

 

Paz also cautions against posting personal information and updates on social media. These may be used by scammers already in possession of your log in credentials to steal your identity and pass security checks by your bank and credit card companies.

 

“Leave out your birthday, contact details, and even vacations plans on social media,” he says.

 

Those who think of themselves as wise in the ways of fraudsters may grow lax and in the process become easier targets for scammers and phishers, Paz warns. It’s always good to pause and check for the telltale signs of phishing, like incorrectly spelled URLs in e-mail links and requests for personal data and confidential information.

 

And if you receive an e-mail from a source that you know but it looks suspicious — for instance, the e-mail was unsolicited, it contains grammatical errors, or it redirects you to another site — write that source with a new e-mail, instead of just hitting reply.

 

“Vigilance is key to protecting yourself from phishing,” Paz says. “This way, we can stay a step ahead of scams and cyber-attacks.”

 


RECOMMENDED ARTICLE FOR TECHWORLD


 
Quiet please: two-thirds of industrial organizations don’t report cybersecurity incidents to regulators
Techworld Date Posted: 16 October 2019 9:00 AM | 275 Views
Quiet please: two-thirds of industrial organizations don’t report cybersecurity incidents to regulators. See More
 
Quiet please: two-thirds of industrial organizations don’t report cybersecurity incidents to regulators
Techworld Date Posted: 9:00 AM | 275 Views
Quiet please: two-thirds of industrial organizations don’t report cybersecurity incidents to regulatorsSee More

 
Smart Unveils New Giga Data Promos for Prepaid Customers, Includes Giga Video+ Data Plus Unlimited Calls and Texts
Techworld Date Posted: 27 April 2019 11:22 AM | 314 Views
Smart is boosting its data-packed prepaid bundles with their newly enhanced Giga offers including Giga Video+ 149.. See More
 
Smart Unveils New Giga Data Promos for Prepaid Customers, Includes Giga Video+ Data Plus Unlimited Calls and Texts
Techworld Date Posted: 11:22 AM | 314 Views
Smart is boosting its data-packed prepaid bundles with their newly enhanced Giga offers including Giga Video+ 149.See More

 
Building a Safer World with Kaspersky: The Company Unveils New Branding and Visual Identity
Techworld Date Posted: 11 June 2019 10:01 AM | 115 Views
For more than two decades, Kaspersky Lab has been offering the best security solutions to customers in pursuit of its mission to save the world. As the world has become more digitized and globalized,.... See More
 
Building a Safer World with Kaspersky: The Company Unveils New Branding and Visual Identity
Techworld Date Posted: 10:01 AM | 115 Views
For more than two decades, Kaspersky Lab has been offering the best security solutions to customers in pursuit of its mission to save the world. As the world has become more digitized and globalized,...See More

 
Transcend®’s DrivePro 550 Dashcam Provides Added Protection with Its Dual Lenses
Techworld Date Posted: 27 June 2018 1:17 PM | 728 Views
Transcend® Information, Inc. (Transcend®), a leading manufacturer of storage and multimedia products, is proud to announce the release of the DrivePro 550 Dashcam. Featuring a dual lens camera and a large viewing angle, the.... See More
 
Transcend®’s DrivePro 550 Dashcam Provides Added Protection with Its Dual Lenses
Techworld Date Posted: 1:17 PM | 728 Views
Transcend® Information, Inc. (Transcend®), a leading manufacturer of storage and multimedia products, is proud to announce the release of the DrivePro 550 Dashcam. Featuring a dual lens camera and a large viewing angle, the...See More

Rafael Aquino
The Threadripper’s Simple Complexity
Techworld • By: Rafael Aquino | Date Posted: 29 July 2017 4:30 PM | 192 Views
The AMD Ryzen Threadripper is by far the most powerful processor to date. 12 cores and 24 threads each, that is absolutely dwarfing any other processor ever created in the history of mankind. But.... See More
Rafael Aquino
The Threadripper’s Simple Complexity
Techworld • By: Rafael Aquino | Date Posted: 4:30 PM | 192 Views
The AMD Ryzen Threadripper is by far the most powerful processor to date. 12 cores and 24 threads each, that is absolutely dwarfing any other processor ever created in the history of mankind. But...See More

 
Swinging by the Spider-Man: Far From Home Movie Screenings with Philips Monitors
Techworld Date Posted: 6 July 2019 4:12 PM | 151 Views
Swinging by the Spider-Man: Far From Home Movie Screenings with Philips Monitors. See More
 
Swinging by the Spider-Man: Far From Home Movie Screenings with Philips Monitors
Techworld Date Posted: 4:12 PM | 151 Views
Swinging by the Spider-Man: Far From Home Movie Screenings with Philips MonitorsSee More

 
Kaspersky Lab Challenges Whitehats to Find Flaws of IoT Devices in Global Competition
Techworld Date Posted: 25 October 2018 1:49 PM | 289 Views
Kaspersky Lab is inviting ethical hackers, known as whitehats, from across the world to test the security of smart devices and industrial systems as it launches its fourth international industrial Capture the Flag (CTF).... See More
 
Kaspersky Lab Challenges Whitehats to Find Flaws of IoT Devices in Global Competition
Techworld Date Posted: 1:49 PM | 289 Views
Kaspersky Lab is inviting ethical hackers, known as whitehats, from across the world to test the security of smart devices and industrial systems as it launches its fourth international industrial Capture the Flag (CTF)...See More

 
Synology® Announces DiskStation DS1618+
Techworld Date Posted: 21 May 2018 4:45 PM | 90 Views
Synology® Inc. today launched DiskStation DS1618+, a 6-bay NAS featuring the Intel Atom® C3538. For tech enthusiasts and small to medium sized businesses, DS1618+ is the perfect all-in-one solution for file serving, application hosting,.... See More
 
Synology® Announces DiskStation DS1618+
Techworld Date Posted: 4:45 PM | 90 Views
Synology® Inc. today launched DiskStation DS1618+, a 6-bay NAS featuring the Intel Atom® C3538. For tech enthusiasts and small to medium sized businesses, DS1618+ is the perfect all-in-one solution for file serving, application hosting,...See More

 
Kaspersky Lab Publishes Results of Internal Investigation Related to Incident with Equation APT Source Code
Techworld Date Posted: 17 November 2017 11:24 AM | 475 Views
In early October, a story was published in The Wall Street Journal alleging Kaspersky Lab software was used to download classified data from an NSA employee’s home computer. . See More
 
Kaspersky Lab Publishes Results of Internal Investigation Related to Incident with Equation APT Source Code
Techworld Date Posted: 11:24 AM | 475 Views
In early October, a story was published in The Wall Street Journal alleging Kaspersky Lab software was used to download classified data from an NSA employee’s home computer. See More

Rafael Aquino
The Computer Age Gap
Techworld • By: Rafael Aquino | Date Posted: 13 July 2017 9:13 AM | 605 Views
I remember more than once hearing a person of higher age saying “...too many computers.” It gives me a feeling of insecurity. What about computers? Are computers bad? Did they ever hurt anyone directly?. See More
Rafael Aquino
The Computer Age Gap
Techworld • By: Rafael Aquino | Date Posted: 9:13 AM | 605 Views
I remember more than once hearing a person of higher age saying “...too many computers.” It gives me a feeling of insecurity. What about computers? Are computers bad? Did they ever hurt anyone directly?See More


Power by

Download Free AZ | Free Wordpress Themes