{"id":389,"date":"2012-10-18T16:58:51","date_gmt":"2012-10-18T16:58:51","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=389"},"modified":"2020-02-26T18:56:00","modified_gmt":"2020-02-26T14:56:00","slug":"phishing-101-your-official-guide","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/phishing-101-your-official-guide\/389\/","title":{"rendered":"Phishing 101: Your Official Guide"},"content":{"rendered":"<p>If you\u2019ve used the Internet for more than seven minutes, you\u2019ve probably been targeted by <a title=\"Phishing Attacks\" href=\"https:\/\/threatpost.com\/en_us\/blogs\/unstoppable-new-phishing-attacks-blanket-facebook-twitter-hotmail-102909\" target=\"_blank\" rel=\"noopener nofollow\">several hundred phishing attacks<\/a>. Phishing, when attackers try to pry bank account numbers, codes and passwords away from users via deceptive emails, links and attachments, is nearly as old as the Web itself.<\/p>\n<p>These emails can come in many forms to fool unsuspecting users, disguised as social media notifications, banking statements and anti-virus alerts. The ploys attackers use have become even more covert lately as they try to get their scams to resemble actual alerts. In the last few years, scams have tried to mimic legitimate notifications from <a title=\"Facebook Phishing\" href=\"https:\/\/threatpost.com\/en_us\/blogs\/facebook-security-phishing-attack-wild-011312\" target=\"_blank\" rel=\"noopener nofollow\">Facebook<\/a>, <a title=\"Paypal Phishing Attacks\" href=\"https:\/\/threatpost.com\/en_us\/blogs\/new-phishing-scam-targets-paypal-users-022411\" target=\"_blank\" rel=\"noopener nofollow\">PayPal<\/a> and <a title=\"Mac Phishing\" href=\"https:\/\/threatpost.com\/en_us\/blogs\/new-mac-phishing-attack-111809\" target=\"_blank\" rel=\"noopener nofollow\">Apple<\/a> and since the start of this year, have swindled users out of $687 million.<\/p>\n<p>One of these phishing scams made the rounds earlier this year on Facebook and tried to convince users their accounts had been compromised. Attackers sent messages to all of the infected Facebook account\u2019s friends to get them to click through a suspicious looking link. Once users clicked through, the scam tried to get them to enter their personal information, including their credit card number and the card\u2019s expiration date.<\/p>\n<p>To stay safe online, users need to remain vigilant when it comes to interacting with strange emails. Thinking, or even better, reading, before clicking is the key to avoiding getting duped.<\/p>\n<p>Often times, phishing messages try to get your attention through fear. \u201cWe suspect an unauthorized transaction on your account,\u201d is a common phishing e-mail headline. Attackers are constantly trying to get their victims to log-in to fake versions of sites to get them to part with important information like passwords and log-ins for bank accounts and email addresses.<\/p>\n<p>Twitter users should also be on the lookout for phony phishing tweets and avoid clicking on questionable links tweeted to them from unfamiliar users. Just like email, attackers have taken to the popular social network as of late, tweeting out malicious links that can be easily obscured by URL shorteners, making it nearly impossible to gauge whether they\u2019re safe.<\/p>\n<p>In general, users should exercise caution before clicking on suspicious links in emails and tweets from unknown senders and ignore, delete or report these messages. <a title=\"Twitter Phishing\" href=\"https:\/\/threatpost.com\/en_us\/blogs\/twitter-deploys-new-anti-phishing-service-031010\" target=\"_blank\" rel=\"noopener nofollow\">Twitter<\/a> allows users to block malicious users or report them for spam while Gmail allows users to report emails as spam or phishing.<\/p>\n<p>If you\u2019ve been <a title=\"Phony iPhone Images\" href=\"https:\/\/threatpost.com\/en_us\/blogs\/phishing-fanboys-phony-iphone-5-images-082112\" target=\"_blank\" rel=\"noopener nofollow\">led astray<\/a> and feel like you may have clicked a phishing link, be careful to not enter any valuable personal information, like passwords. If you suspect you\u2019ve been duped, immediately change your password for the site (and any other sites that may share that password).<\/p>\n<p>The <a title=\"FTC Phishing Tips\" href=\"http:\/\/www.ftc.gov\/bcp\/edu\/pubs\/consumer\/alerts\/alt127.shtm\" target=\"_blank\" rel=\"noopener nofollow\">Federal Trade Commission<\/a> encourages the use of up to date anti-virus and anti-spyware software and firewalls to prevent phishing while <a title=\"Anti Phishing Tips\" href=\"http:\/\/www.us-cert.gov\/cas\/tips\/ST04-014.html\" target=\"_blank\" rel=\"noopener nofollow\">U.S. Computer Emergency Readiness Team<\/a> reminds users to pay attention to URLs when entering personal information. It\u2019s easy to assume you\u2019re on the right site but if you\u2019ve been duped by a phisher, there might be a slight misspelling in the website address (i.e. www.faceboook.com).\u00a0 On most browsers, secure connections that are encrypted using SSL are marked by a green padlock in the far left side of the URL bar, which is another indication of their legitimacy.<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019ve used the Internet for more than seven minutes, you\u2019ve probably been targeted by several hundred phishing attacks. Phishing, when attackers try to pry bank account numbers, codes and<\/p>\n","protected":false},"author":32,"featured_media":434,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[20,34,104,76,83],"class_list":{"0":"post-389","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-facebook","9":"tag-mac","10":"tag-paypal","11":"tag-phishing","12":"tag-twitter"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/phishing-101-your-official-guide\/389\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/phishing-101-your-official-guide\/389\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/phishing-101-your-official-guide\/389\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/phishing-101-your-official-guide\/389\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/phishing-101-your-official-guide\/389\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/phishing-101-your-official-guide\/63\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/phishing-101-your-official-guide\/389\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/phishing-101-your-official-guide\/389\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/facebook\/","name":"Facebook"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=389"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/389\/revisions"}],"predecessor-version":[{"id":15444,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/389\/revisions\/15444"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/434"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}