By now we’re all aware of the dangers of opening e-mail attachments or clicking links from unknown sources – but what about e-mails which appear to be legitimate? When fraudsters pose as a company, brand, or e-mail address you recognize, it’s called phishing – and it’s the most common type of cyberattack.
A play on the word fish, the perpetrators are fishing for someone to fall for their scam by sending e-mails (usually with a link to a website) purporting to be from a reputable company. They’re hoping to trick people into giving out sensitive or personal information such as passwords or banking information.
The fraudsters disguise their messages so that they look legitimate. As they learn what is most effective at tricking people, their methods evolve – which makes it difficult to identify when you are being phished.
Phishing is usually done through e-mail, as that is the easiest way for the fraudsters to disguise themselves; however, it can be done through a phone call or a text message (called smishing).
Signs an e-mail is a phishing attack:
How to prevent phishing:
Other types of phishing:
Spear Phishing: the e-mail contains information unique to the recipient – your name, title, or other information easily found online
Whaling: is the same as Spear Phishing, but targets upper management – CEO, CFO, business owner, board members
Business Email Compromise: when the attackers pose as the business owner or CEO and ask for money or gift cards. It will look like an urgent request for help.
Take a look at your browser – how many tabs do you have open? And how long have they been that way? Using code, fraudsters can change the content and label of an open but inactive tab to look like the log-in for a bank, an online store, or even your e-mail provider. When you click back to the tab and find the log-in screen you assume the session has timed out and so you log back in – giving your personal information to the hackers. This is called tabnapping (or tabnabbing) and it’s a more sophisticated version of phishing.
How can you stop it happening?
Keep anti-malware software installed and updated and always second-guess before sharing personal information to help protect you and your business from cyber crime.