{"id":10550,"date":"2015-11-13T10:56:46","date_gmt":"2015-11-13T15:56:46","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=10550"},"modified":"2020-02-27T03:59:48","modified_gmt":"2020-02-26T16:59:48","slug":"phishing-ten-tips","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/phishing-ten-tips\/10550\/","title":{"rendered":"How to protect yourself from phishing: 10 tips"},"content":{"rendered":"<p>If you think about it for a second, online phishing is not that far from actual fishing. The major difference is that the online fishermen (phishermen?) are criminals. Unlike the trout, fluke, or bass\u00a0that you may fish for recreationally, the trophies that these fraudsters are after are your personal data, banking credentials, and so on.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/11\/06023721\/phishing-10x10-FB.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10551 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/11\/06023721\/phishing-10x10-FB.png\" alt=\"How to protect yourself from phishing: 10 tips\" width=\"1280\" height=\"1280\"><\/a><\/p>\n<p>Unfortunately there is no real cure for <a href=\"https:\/\/www.kaspersky.com.au\/blog\/how-to-avoid-phishing\/6145\/\" target=\"_blank\" rel=\"noopener\">phishing attacks<\/a> aside from paranoia-level vigilance on the case of the end user. This threat is like the flu \u2014 constantly evolving and changing attack approaches. Criminals can launch targeted phishing campaigns directed at employees of a certain organization \u2014 or expectant mothers. It\u2019s a bit like a marketing campaign \u2014 a malicious, criminal marketing campaign.<\/p>\n<p>There are numerous ways to take the bait: <a href=\"https:\/\/www.kaspersky.com.au\/blog\/smart-wifi-vkontakte-credentials\/8279\/\" target=\"_blank\" rel=\"noopener noreferrer\">accessing public Wi-Fi<\/a>, logging into a <a href=\"https:\/\/www.kaspersky.com.au\/blog\/avoid-news-related-phishing\/5774\/\" target=\"_blank\" rel=\"noopener noreferrer\">fake website<\/a> or following a <a href=\"https:\/\/www.kaspersky.com.au\/blog\/xmas-security-tips\/7079\/\" target=\"_blank\" rel=\"noopener noreferrer\">link in an e-mail<\/a> promising exclusive Black Friday or Christmas deals. It\u2019s impossible to enumerate all the cases.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Kaspersky Lab is ready to help keep your <a href=\"https:\/\/twitter.com\/facebook?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@Facebook<\/a> account safe! <a href=\"http:\/\/t.co\/uokXWD3YkR\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/uokXWD3YkR<\/a> <a href=\"http:\/\/t.co\/DZIOc3uRsj\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/DZIOc3uRsj<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/613332502338490368?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">June 23, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>In short, it\u2019s easy to get infected. But how can users protect themselves?<\/p>\n<ol>\n<li>Always check the link before clicking. Hover over it to preview the URL, and look carefully for misspelling or other irregularities.<\/li>\n<li>Enter your username and password only over a secure connection. Look for the \u201chttps\u201d prefix before the site URL, indicating the connection to the site is secure.<\/li>\n<\/ol>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">RT <a href=\"https:\/\/twitter.com\/threatpost?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@threatpost<\/a>: Wifiphisher Wi-Fi Hacking Tool Automates <a href=\"https:\/\/twitter.com\/hashtag\/Phishing?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Phishing<\/a> Attacks \u2013 <a href=\"http:\/\/t.co\/AhSeYcZB2I\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/AhSeYcZB2I<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/552209220243034112?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 5, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<ol start=\"3\">\n<li>Even if a message or a letter came from one of your best friends, remember that they could also have been fooled or hacked. That\u2019s why you should remain cautious in any situation. Even if a message seems friendly, treat links and attachments with suspicion.<\/li>\n<li>Messages from official organizations, such as banks, tax agencies, online shops, travel agencies, airlines, and so on, also require scrutiny. Even internal messages from your own office. It\u2019s simply not that hard to fabricate a fake letter that looks like a real one.<\/li>\n<\/ol>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">A FIFA-related phishing site included a downloadable ticket, which was really a malicious form of the Banker Trojan: <a href=\"http:\/\/t.co\/YJ0FIfZtFv\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/YJ0FIfZtFv<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/472407588945293313?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">May 30, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<ol start=\"5\">\n<li>Sometimes e-mails and websites look just like real ones. It depends on how well the criminals\u00a0did their homework. But the hyperlinks, most likely, will be incorrect \u2014 with spelling mistakes, or they can redirect\u00a0you to a different place.<\/li>\n<li>It\u2019s better not to follow links from e-mails at all. Instead you can open a new tab or window and enter the URL of your bank or other destination manually.<\/li>\n<\/ol>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">New <a href=\"https:\/\/twitter.com\/hashtag\/TeslaCrypt?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TeslaCrypt<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Ransomware?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Ransomware<\/a> Targets Gaming Files: <a href=\"https:\/\/t.co\/bfsXP4ctXO\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/bfsXP4ctXO<\/a> <a href=\"http:\/\/t.co\/dLUlv7S6ix\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/dLUlv7S6ix<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/580037644039659521?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 23, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<ol start=\"7\">\n<li>If you discover a phishing campaign, report it to the bank, the support desk of your social media network, or whatever other entity the phishing message claims to represent. Reporting really helps in the pursuit of criminals.<\/li>\n<li>Avoid logging in to online banks and similar services via public Wi-Fi networks. Hotspots are convenient, but it\u2019s better to use a mobile connection or wait to get to a secure network\u00a0than to lose all of the money on your credit card or in your bank account. Open networks can be created by criminals\u00a0who, among other things, spoof website addresses over the connection and thereby redirect you to a fake page.<\/li>\n<\/ol>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Q3 2015, the percentage of <a href=\"https:\/\/twitter.com\/hashtag\/spam?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#spam<\/a> in email traffic accounted for 54.2% <a href=\"https:\/\/twitter.com\/hashtag\/KLreport?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#KLreport<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/infosec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#infosec<\/a> <a href=\"https:\/\/t.co\/nKGjX6CH3N\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/nKGjX6CH3N<\/a> <a href=\"https:\/\/t.co\/Sxs0wM7my7\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/Sxs0wM7my7<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/664829203410526208?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 12, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<ol start=\"9\">\n<li>Do not open unexpected files sent by you massively multiplayer online role-playing game comrades or other online buddies. They\u00a0<a href=\"https:\/\/www.kaspersky.com.au\/blog\/security-tips-for-gamers\/7116\/\" target=\"_blank\" rel=\"noopener noreferrer\">may be malicious ransomware<\/a> or even spyware, just like attachments from official-looking e-mails. So be vigilant!<\/li>\n<li>Install <a href=\"https:\/\/www.kaspersky.com\/advert\/multi-device-security?redef=1&amp;THRU&amp;reseller=gl_KDpost_pro_ona_smm__onl_b2c_kasperskydaily_lnk____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a> and follow its recommendations. Our AV solution will solve the majority of problems automatically and alert you if necessary.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Sometimes even cybercriminals go fishing. They hunt for a special goldfish \u2014 our personal data. So, what can you do to protect yourself from phishing?<\/p>\n","protected":false},"author":522,"featured_media":10552,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,9],"tags":[1852,1853,191,1069,641,363,76,192,97],"class_list":{"0":"post-10550","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-tips","9":"tag-advice","10":"tag-tips","11":"tag-data","12":"tag-fraudsters","13":"tag-kaspersky-internet-security-multi-device","14":"tag-personal-data","15":"tag-phishing","16":"tag-protection","17":"tag-security-2"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/phishing-ten-tips\/10550\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/phishing-ten-tips\/5153\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/phishing-ten-tips\/3606\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/phishing-ten-tips\/6452\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/phishing-ten-tips\/6375\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/phishing-ten-tips\/7242\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/phishing-ten-tips\/6913\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/phishing-ten-tips\/9744\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/phishing-ten-tips\/10550\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/phishing-ten-tips\/5032\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/phishing-ten-tips\/5819\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/phishing-ten-tips\/6422\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/phishing-ten-tips\/9556\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/phishing-ten-tips\/9744\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/phishing-ten-tips\/10550\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/advice\/","name":"#advice"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/10550","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=10550"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/10550\/revisions"}],"predecessor-version":[{"id":26780,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/10550\/revisions\/26780"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/10552"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=10550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=10550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=10550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}