Muhammad Asad Ul Rehman

Cyber Security Expert

Security Researcher

an Adventurer

Muhammad Asad Ul Rehman

Cyber Security Expert

Security Researcher

an Adventurer

Post

Phishing: the most common cyber attack

Published on APRIL 5, 2019 at "Daily Times"

Sending fraudulent messages which appear to come from reputable sources is known as a phishing attack. Just as a fisherman uses bait to catch a fish. This is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victim’s machine. Phishing is a common type of cyber-attack that everyone should learn about in order to protect themselves.

Phishing is basically an internet phenomenon. Phishers are tech-savvy con artists and identity thieves. They use spam, malicious websites, email messages, and instant messages to trick individuals into divulging sensitive information. Banking information, credit card accounts, usernames, and passwords are some of the data phishers ask for.

Phishing started around 1995. Nearly 25 years later, it continues. The 2018 Verizon Information Breach Investigations Report (VDBIR) ranks it the third most typical technique used in confirmed breaches. As many as 70 per cent of breaches related to nation-state or state-affiliated actors concerned phishing. However, low-level hackers too frequently use phishing techniques.

A typical phishing attack would entail email spoofing whereby the wrongdoer pretends to be a respected organization. The e-mail usually includes a link that takes the user to a faux web site. On the web site, one may be asked to reset a secret or enter a Social Security, MasterCard, or telephone number. The cybercriminal then captures this confidential knowledge.

The most common phishing tools are used to support malicious actions, like man-in-the-middle and cross-site scripting attacks. These attacks generally occur via email or instant message, and might be de-escalated into a couple of general classes. It’s helpful to become at home with a couple of of those completely different vectors of phishing attacks so as to identify them.

Alternatively, the phishing email would embody an Associate in a nursing attachment. Once the attachment is clicked on, a malicious file is downloaded from the web. The file then infects the user’s device.

Although phishing is currently in its third decade, organizations using networks should stay alert. Most people place thier confidence in tried and sure methods; as long as there’s even a four per cent probability that phishing techniques are going to be triple-crown, they’re going to still use them. What is more, with very-little-to-no-learning curve, we can expect a lot of threat actors to climb on board. Organizations can scale back the risk of being reeled in by taking precautions.

Do not enter personal information in a pop-up screen. Legitimate corporations, agencies, and organizations do not request personal information via pop-ups

The question is how we can protect ourselves from a phishing attack?

To protect yourself from falling victim to a phishing scam, it is vital to be cautious with your personal info as well as your usernames and passwords. Some phishing scams divert you to a deceitful web site designed to appear like your bank’s web site or an identical sure supply.

After you enter your username/password and alternative info, that info is transmitted to the chiseller.

It’s fine to click on links once you’re on sure sites. Clicking on links that seem in random emails and instant messages, however, isn’t such a sensible move. Hover over links that you are unsure of before clicking on them. Do they lead wherever they’re purported to lead? A phishing email might claim to be from a legitimate company and after you click the link to the web site, it’s going to look precisely just like the real web site. the e-mail might persuade you to fill in the info. The e-mail might not contain your name. Most phishing emails can begin with “Dear Customer” thus you must be alert after you come upon these emails.

Do not enter personal info in a pop-up screen. Legitimate corporations, agencies, and organizations do not request personal info via pop-ups.

Install a phishing filter on your email application and on your browser. These filters cannot keep out all phishing messages, however they’re going to scale back the amount of phishing attempts.

Write a comment