Phishing Emails: Recognize and Keep Malicious Emails at Bay

Cybercriminals or hackers target the personal information of their victims by sending out emails. Otherwise known as a phishing scam, this tactic aims to fraudulently obtain and use personal information such as Social Security Number, credit card information, and other bank details.Here are the common characteristics of a phishing email:

  • Usually includes downloadable attachments or links
  • Appears to be coming from a phone company, bank, store/retail establishments, or agencies
  • Calls for an action like clicking a link or downloading an item

According to the Data Breach Investigations Report of 2013, most hackers resort to email as a means of attacking victims. In fact, more than 95% of state-affiliated espionage utilized phishing mails to establish a foothold in the targets’ systems, the report says.Both big companies and ordinary folks can fall prey to this malicious technique. Cyber hackers normally go for the people who have higher positions in a company. One common method used in corporate data hacks is spear phishing.This method characteristically uses names of trusted source to ask for confidential information like a manager’s subordinates or the company’s associates.Despite tighter online security measures employed by companies, web masters, and even the government, there are still many people who take the bait of phishing emails and other tactics used by hackers to compromise privacy.

Researches indicate that for every six malicious email campaigns, the probability of people clicking on these links goes to 80% and even up to 100% for ten emails.Hacking has also been made easy when some sites such as Paypal or social networks utilize a user’s email address as the username. Cyber hackers only need to learn a person’s email address and they can already attempt access to many websites by cracking their password.Email and Online Vulnerabilities: What to Do About ItThe attempts of invading one’s privacy through online means may be becoming more and more aggressive and ingenious but the good news is, it is still up to the target to determine if these attempts succeed or not.Here are tried and proven ways to deter hacking attempts and keep one’s private files private:Calling Before Clicking

Some cyber criminals may pretend to be a company’s human resource team and ask the recipients of their emails to download a certain attachment in order to update their personnel files. This attachment may possibly be an executable malware file. It is therefore wise to call the company and inquire with the human resource team if the email is legitimate or not. Inquiring with other associates and with one’s direct supervisor is also wise. For emails claiming to come from banks and threatening to shut one’s account down if the file is not downloaded immediately, recipients should also call and verify with their banks first.Throw it Out When in DoubtOnline advertising URLs, social media posts, and email links are often utilized by cyber criminals to compromise the victims’ computer. Keep viruses and malwares at bay by being discriminative of these tactics.Even if the source is familiar or known, so long as the posts look suspicious, one should never click the links and simply mark the post or email as Spam or Junk.Utilizing Specialized Email AccountsAn email account for work, an email address for social media, and an email account especially setup for Paypal use – this technique is also a smart move to keep hackers out. Online criminals will find it hard to pin down a victim if they are using different emails for work, socialization, and online purchase.Report Phishing Incidents Immediately

The AWPG, a worldwide coalition which attempts to respond to cybercrimes, welcomes phishing reports in the efforts of minimizing, if not exterminating, privacy invasion online. They can easily be contacted through reportphishing@apwg.org.Reporting hacking attempts should also be done locally by calling one’s bank or company’s network administrators of any suspicious activities.Taking Advantage of Antivirus Software or Security CheckupsBecause more people are becoming aware of phishing mails and other hacking tactics, there are many anti-hacking tools, file shredder software, and email protection programs to help people build strong walls of defence to keep cyber criminals out.

Could Your Workspace be Leaking out Corporate Data? Know the Real Score about Spy Monitoring

One of the most basic things you need to consider when doing business online is that the World Wide Web is an open arena with no established security. Once you have learned to appreciate that the inte ... [Read more]

Think Your MAC is Safe? Learn These Insider Tips to Identify and Remove MacDefender Trojans

Macintosh is well-known for being safe, secure, and smooth-running. However, hackers and cyber spies are becoming more and more ingenuous in tapping into private networks and computers that even what ... [Read more]

What Security Companies Won’t Tell You: Pro Reveals Exclusive Scoop on Best Internet Security Practice

Most people think that tight security measures mean spending thousands upon thousands on high-tech gizmos. Some misleading companies may even lure you into buying their services by intimidating you wi ... [Read more]

Are You Well-Equipped Against Hackers? Know the Different Weapons of Computer Protection

People store up important information in their PCs but not many take measures to make sure it is well-guarded from spy monitoring. Computers are almost indispensable to work now but few protect their ... [Read more]

How to Tell the Difference between Anti-Virus and Anti-Malware Tools

People are wiser nowadays when it comes to taking care of their computers. In fact, most computers come with software for protecting the device.Because there are different kinds of threats that can co ... [Read more]

The Only Password Strategy You Need to Know

Managing different accounts online can be quite a daunting task. For one thing, people are now prone to log on online to do what traditionally are done personally such as paying bills, shopping, sendi ... [Read more]

The Right to be forgotten: How a File Shredder Can Wipe out All Data You Want Gone

It has been said that nothing in the internet is lost forever. The price of living in the digital world is that deleting files from your computer or phone is not a permanent fix. Even if you have clea ... [Read more]

Why Strong Firewalls are Not Enough: Debunking File Transfer Misconceptions

A typical business enterprise transfers thousands of files every day. Because this is an essential productivity tool, misconceptions abound as much as the practices associated to it. Could your file t ... [Read more]

Domain Security: Why You Need to Know About SEO Poisoning

Hacking is not only exclusive to obtaining private files and compromising networks. Cyber criminals have now found a way to take hacking to a whole new level, which is, targeting the SEO value of a do ... [Read more]

Experts Release Comprehensive Business Cyber Security Plan

Business owners should not depend on luck or precautions to keep their services safe. Experts agree that every business should have a strategic plan to implement and ensure cyber security. This includ ... [Read more]

Security for E-Commerce: Every Business Person’s Guide to Customer Protection

If you are running a business online, you know that trust is an essential foundation of your trade. It is the element that can make or break your customer relations and ultimately, the stability of yo ... [Read more]

Phishing Emails: Recognize and Keep Malicious Emails at Bay

Cybercriminals or hackers target the personal information of their victims by sending out emails. Otherwise known as a phishing scam, this tactic aims to fraudulently obtain and use personal informati ... [Read more]

How to Use Apple's iCloud Keychain

The latest update to the Mac OS and iOS included a new feature called “iCloud Keychain.” In a nutshell, Keychain allows you to securely store account information like user IDs and passwords, alon ... [Read more]

Is Your Password Really Protecting You?

The definition of “pwned,” according to the online UrbanDictionary, is “to be dominated by an opponent or situation.” Telling someone they’ve been “pwned” or “owned” after an account ... [Read more]

The Future of Passwords

It seems to be the general consensus these days that passwords as we know them are on the way out. As far back as November of last year, Wired’s Mat Honan declared that, “The age of the password i ... [Read more]

25 Worst Passwords of 2012

In 2012, you’d hope the majority of people now know to stay away from common and easily hackable passwords, but with new research from SplashData we unfortunately find this is not the case. Amazingl ... [Read more]

Majority of People and Businesses are Cybercrime Victims [Infographic]

A new survey performed by the Ponemon Institute shows that both businesses and private computer users frequently deal with security issues from hackers and other malicious attackers.The research insti ... [Read more]

QuickLock App Screen Locks Your Mac

/image/quicklock.jpeg ... [Read more]

Why Cybersecurity Is Scary [Infographic]

Are you paying enough attention to online security?If you’re like most computer users, probably not. Trend Micro, a security software producer, performed some research to see how people view online ... [Read more]

Using Your Smartphone for Work? That’s Risky for Your Company

Many companies allow employees to bring smartphones, tablets and other personal devices to work with them. According to a new survey from IT risk & compliance company Coalfire, employers might be putt ... [Read more]

Dropbox Adds Two-Step Verification to All Accounts

Dropbox users can now take advantage of a secure two-step verification process to protect their accounts from unauthorized access. The process requires a cell phone and should help to prevent identity ... [Read more]

38% of People Would Rather Clean a Toilet Than Create a New Password

A new poll shows that people don’t really enjoy thinking of new passwords for their favorite websites. It’s not surprising information until you consider the tasks that respondents preferred over ... [Read more]

The 20 Most Common ATM PINs: Is Yours Leaving You Vulnerable?

You’re probably aware of the importance of selecting a strong password, but you might not realize that you need to exercise similar care when choosing your PIN number. A new analysis shows that many ... [Read more]