- Author Aaron Addison
- Published October 12, 2010
- Word count 440
Phishing can be defined as an activity to obtain private information from a person using electronic communication. This may easily lead you to a critical condition considering that the information taken out can be very confidential such as bank account or credit card details. This fraudulent activity is many times performed by using email technology. The content, although it seems originate from a legitimate business such as Paypal, actually can send someone to a false domain.
In addition to electronic mail, another common medium that often used by phishers to conduct this activity include instant messaging. A trick termed keylogging is also many times implemented by phishers. Making use of keylogging software, a special tool designed to track your keyboard operations, a phisher can uncover your username, password or other vital info without difficulty. There are even programs that come with a capability to capture all the things displayed on your pc screen.
The growing number of software mainly created to gain access to confidential data has proven that such a danger cannot be taken lightly. Worse, the stolen details are often stored in FTP hosts meaning it can be found by lots of people around the globe. Quite simply, your private details such as your email account information could end up in cyberspace.
To secure your personal machine from this kind of threat, you should install a reliable anti virus software. Other sorts of security programs you should utilize are spam blocker and personal firewall. A spam blocker can help you avoid receiving phishing emails. A firewall, as the name indicates, can minimize unwanted access to or from a PC. There are also web browser toolbars that include a feature to help you recognize phishing websites.
Other than setting up such protection tools, there are some other practices you should take. For instance, it is strongly advised to never generating the exact same password and also username for different sites. An additional protection is to never click on hyperlinks in an email message. Simply type the link directly into the web browser. Such links in many cases are employed by scammers to direct you to false websites.
Also remember that it is uncommon for financial institutions to request personal data via electronic mail. Just contact them directly via phone in order to verify. Furthermore, fraudulent emails normally do not personalize their messages. One additional habit you should build is to close your web browser whenever you arrive at a site where its security certificate number fails to match. As a final point, for no reason be in doubt to report each and every phishing attempt promptly to qualified organizations.