what are the most used fraud attempts by hackers

0
1
Facebook
Twitter
Pinterest
Linkedin
ReddIt
Tumblr
Telegram
Mix
VK
Digg
LINE


phishing and smishing fraud attemptsKnow what types of online scams can affect our personal data and how to avoid them is now essential as the gimmicks and tricks exploited by hackers are very varied in order to proceed with deceptions. Surely among the numerous attempts at fraud used by cyber-criminals and the techniques devised those that deserve greater attention as they are disproportionately widespread are the phishing and it smishing. We discover, therefore, how to prevent the two attempts at fraud.

Phishing: the fraud attempt that arrives via email!

The first fraud attempt we referred to is phishing. A deception that occurs through fictitious emails and aims at extort sensitive data through unfounded communications; exploiting the name of companies or banking institutions as sender, which are normally outside the intent of the hackers. The initiatives of the Postal Police and various agencies, in order to disseminate useful advice to recognize and avoid these scams, were not few. In fact, frequently there are posts on the official page of the institution, in which the typical tricks to keep in mind are reiterated. Or, all are urged to proceed carefully, to detect the presence of links or files, without using them; and to ignore the ever present request to provide sensitive data.

Smishing: even text messages can be dangerous!

Smishing does not present particular differences from phishing. In fact, only the tool used by cyber criminals to spread the scam, which in this case arrives, varies via SMS. Here too, therefore, the purpose is to use links and files to add to the communications created and then use them in an inappropriate way to obtain the victims' codes and credentials.

How to avoid the two online fraud attempts: phishing and smishing!

The two attempts at online fraud despite the slight differences can be addressed in the same way. Therefore, it is sufficient to identify the request to enter your data and the invitation to use links or files to suspect deception. In this case, theelimination of the e-mail or text message will be more than sufficient in order to protect data and passwords by the evildoers



Source link
https://www.tecnoandroid.it/2019/11/07/tentativi-di-frode-phishing-smishing-620504

Dmca

LEAVE A REPLY

Please enter your comment!
Please enter your name here

12 + eight =