How To Stop Phishing Emails

How To Stop Phishing Emails.Phishing email is a technique that consists of tricking the user to steal confidential information, access codes, bank details, among others, making them believe that they are on a trusted site.

How To Stop Phishing Emails

Recently, business email users in Colombia began to receive messages from so-called “fotomultas”, requesting to open an attachment containing Malware that is installed on the receiving user’s computer.Until now, hackers have used emails to launch these types of attacks, but with the massive use of social networks and smartphones with an Internet connection, the attack channels are multiplying.

These emails or messages include attachments or links that take the user to a website that is theoretically known, but which is a copy of the original where confidential information is requested.In this way, overly trusting users who do not have adequate antivirus protection could be involved in this type of attack whose main objective is to steal personal data.

Tips to prevent Phishing attacks/How To Stop Phishing Emails

1. Clearly identify suspected phishing emails

There are some aspects that unequivocally identify this type of email attack:

– They use names and adopt the image of real companies.
– They bear the name of the company or that of a real employee of the company as sender.
– They include websites that are visually the same as those of real companies.
– As a hook they use gifts or the loss of their own existing account.

2. Verify the source of information for incoming emails

A bank will never ask for passwords or personal data by mail. Never answer these types of questions and if you have a minimum doubt, call the bank directly to clarify it.

3. Do not enter the bank’s website by clicking on links included in emails.

Ideally, type the web address directly into the browser.

4. Enter confidential data only on secure websites

Secure websites begin with ‘https: //’ and the icon of a small closed padlock should appear in the browser.

5. Strengthen computer security

It is essential to keep your computer protected with a good antivirus that blocks this type of attack. In addition, the operating system and web browsers should always be updated.It is important to check that the email address and the sender’s name match . You can also check if the email is authenticated so that its accurate content can be verified.

If it contains access links , you can hover over them without clicking on the URL. If your description does not match, it is possible that there is phishing.By reviewing the message headers, you can check if the ” from ” header does not have an incorrect name. Similar to the cases of fake emails on an iPhone , the solutions are quite simple to establish.

What can happen when a Gmail spoof occurs?

Through advertisements or supposed emails from sites that you usually use, these cases of impersonation can occur . These can request information regarding bank accounts, social networks and even contain links full of viruses.

To open the Gmail account from an Android device , could also endanger information contained in the device. Emails requesting personal information could ask for:

  • Usernames, passwords or request password changes.
  • Number of personal identification.
  • Bank account numbers.
  • PIN (personal identification numbers).
  • Credit card numbers.
  • Challenge questions for bank accounts.
  • Birthdate.

If you receive these emails, they must be deleted immediately since Google will never issue these emails. If it is considered that the Gmail account is at risk, it is important to go to Google’s security tools.There, you will find the options to report the compromised account, something that should be done immediately. Otherwise, the account hacked or in which the identity theft occurs, could be used to affect others.

If this mishap has been suffered, it is recommended to notify other people with whom you have constant contact by Gmail. Well, they could receive these emails from your account and thus also become part of those who cheat.Failure to attack these cases immediately can result in a complete identity disadvantage. Well, whoever has the information provided, would have access to different accounts or confidential information.

by Abdullah Sam
I’m a teacher, researcher and writer. I write about study subjects to improve the learning of college and university students. I write top Quality study notes Mostly, Tech, Games, Education, And Solutions/Tips and Tricks. I am a person who helps students to acquire knowledge, competence or virtue.

Leave a Comment