1. Phishing is a form of fraud where attackers deceive people into sharing sensitive information like passwords and credit card numbers by masquerading as reputable entities.
2. To avoid phishing scams, people should not trust display names, check for spelling and grammar mistakes, analyze salutations, and be wary of pop-ups.
3. It is also important to verify a site's security, use antivirus software, install anti-phishing toolbars, and check online accounts regularly.
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
0 ratings0% found this document useful (0 votes)
81 views1 page
MIL Phishing
1. Phishing is a form of fraud where attackers deceive people into sharing sensitive information like passwords and credit card numbers by masquerading as reputable entities.
2. To avoid phishing scams, people should not trust display names, check for spelling and grammar mistakes, analyze salutations, and be wary of pop-ups.
3. It is also important to verify a site's security, use antivirus software, install anti-phishing toolbars, and check online accounts regularly.
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 1
Think before you click
Phishing is a crime of deceiving
1. Do not trust the people into sharing sensitive display name Never give out your information like password and Personal Information credit card numbers 2. Check for spelling Check your online and grammar accounts regularly mistakes How to Detect How to Avoid Be wary of pop-ups 3. Analyze the salutation Verify a site’s security (legitimate businesses will often use a personal Use an Antivirus salutation with your Software first and last name ) Install an anti- Phishing toolbar
Elements Common Phishing
Attacks The “From Field” appears to be from the legitimate company mentioned in the e- Deceptive Phishing A “suspicious link” this Phishing is a form of fraud in Drop box Phishing mail links are often which an attacker masquerades shortened or formatted as a reputable entity or person Spear Phishing Google Docs Phishing to look like a legitimate in email or other communication The “To Field” are often link channels impersonal, addressing the CEO Fraud recipient as a “user” or Pharming “customer”