SECTIONS
Sunday, May 26, 2019
PAMPANGA

Catap: How to cope with cyber and social networking threats (Part 2: Phishing)

Providentia

THE main reason why I thought of writing about cyber scams and privacy threats is because, recently, my sister fell prey to a phishing scam sent to her email address.

In the email, she received a notification from the bank where she has a savings account advising her to update her personal information to proceed with an alleged cancelled purchase of a mobile phone in the US. Having returned from her vacation trip, she thought it was a credible email, thus making her encode her username and password of her online mobile banking account. Having realized that this was a bogus email, she was forced to report the incident to the bank and found out that it was indeed an email scam.

This incident is an example of phishing, which according to phishing.org is “a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.”

The information gathered from unsuspicious and innocent victims is then used to access important accounts and can result in identity theft and financial loss. Phishing experts have successfully made a lucrative business out of luring people using the internet and technology.

To help people become more aware of this cyber crime and prevent them to become helpless victims, here are some common features of phishing according to phishing.org.

If your guts tell you it’s such a great deal that it seems to be too good to be true, then 90% that it’s a scam waiting for you. These people use lucrative offers and eye-catching marketing techniques that will instantly make you excited that you can’t seem to resist the email. Text messages and emails from suspicious senders saying you won an instant prize are indeed phishing techniques.

If you receive an urgent notice saying that your account will be cancelled if you don’t update your information, then you might have to verify the origin of the message to know of it’s legitimate or not. You should also be cautious in clicking the links embedded in the message as these websites are intended to instantly get passwords and other information.

Suspicious attachments especially those that you don’t expect to receive are somewhat also risky to be opened. Whenever visiting a website or if you were redirected into another page, then you mist carefully check the domain name if it’s correct or not.

If you receive a message or email from someone you do not know, then might as well just directly move to the trash folder.

At the same time, you can always prevent phishing and other cyber scams by being extra vigilant in al your online accounts and transactions. One of the easiest things to do is to use spam filters in your web browsers and always check if the site you are visiting is secured or not at the uppermost left portion of the screen.

According to phishing.org, “many websites require users to enter login information while the user image is displayed. This type of system may be open to security attacks.” This is why using the same password for all your accounts is not advisable, and it is also recommended to think of a unique code not related to your personal details such as your birthdate or the name of your kids.

You should also be wary of emails sent that appear to be credible enough for you to enter your personal information. As an important note to remember, phishing.org says that “a bank will not ask for personal information via email or suspend your account if you do not update your personal details within a certain period of time. Most banks and financial institutions also usually provide an account number or other personal details within the email, which ensures it’s coming from a reliable source.”

To sum it up, strict prevention is necessary for us to prevent phishing and other cyber threats from happening. As the cliché says, we must always “think before we click.”


VIEW COMMENTS
DISCLAIMER:

SunStar website welcomes friendly debate, but comments posted on this site do not necessarily reflect the views of the SunStar management and its affiliates. SunStar reserves the right to delete, reproduce or modify comments posted here without notice. Posts that are inappropriate will automatically be deleted.


Forum rules:

Do not use obscenity. Some words have been banned. Stick to the topic. Do not veer away from the discussion. Be coherent. Do not shout or use CAPITAL LETTERS!