Phishing emails
PHISHING EMAILS: PREVENTIVE MEASURES
Are you encouraged to communicate important information?
Phishing is a fraudulent technique designed to trick Internet users into providing personal data (access accounts, passwords, etc.) and/or by pretending to be a trusted third party. It can be a fake message, SMS or phone call from a bank, social network, telephone operator, energy supplier, website e-commerce, administrations, etc... These attack techniques are constantly evolving. The following tips will help you determine whether a message is legitimate or not.
1- You receive a booby-trapped email
2. The attacker pretends to be a trusted person or third party
The attacker is able to:- Take control of your system.- Use your information.
Main motivations: Damage to image, Lure of profit, Claim, Espionage, Nuisance, Sabotage.
You are a victim - Don't waste a moment!
This links are relevant to reporting online harassment, abuse, or illegal activity in the USA.
5 - More advice with INFO SCAMS (toll-free number)
The Federal Trade Commission (FTC) is a reliable source for information and assistance regarding scams in the USA. They offer a toll-free number for consumers to report scams and get advice:
1-877-FTC-HELP (1-877-382-4357)
You can also file a complaint online through their website.
- Never click on a link or attachment that seems suspicious.
- Never reply to a suspicious email. If in doubt, contact the sender through another channel.
- Avoid the snowball effect! Have a unique password for each application.
(The snowball in cybersecurity refers to an incident where a small security breach or vulnerability can turn into a much larger, more damaging incident It rolls down like a snowflake, becoming larger and more damaging as it gains momentum .)
Here’s a simple guide to compromising two things:
1- Access Settings: Find your account settings or preferences section.
2- Know Security: Look for options related to security, privacy, or accounting policies.
3- Look for two-factor trust: Look for "two-factor trust" or a similar term.
4- Enable Feature: Toggle the switch to "On" or select the option to enable two-factor authentication.
5- Select a method: Select the preferred method, such as security code app, SMS, or hardware token.
6- Verify your identity: Follow the instructions provided to verify your identity, usually using a code sent in the method you have chosen.
Note: The exact steps may vary slightly depending on the platform or service you are using. If you have any problems, refer to the specific support documentation or contact Customer Support.