{"id":6452,"date":"2015-11-13T11:58:39","date_gmt":"2015-11-13T16:58:39","guid":{"rendered":"https:\/\/kasperskydaily.com\/uk\/?p=6452"},"modified":"2020-02-26T15:11:23","modified_gmt":"2020-02-26T15:11:23","slug":"phishing-ten-tips","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/phishing-ten-tips\/6452\/","title":{"rendered":"How to protect yourself from phishing: 10 tips"},"content":{"rendered":"<p>If you sit and think about it for a second, online phishing is not that far from actual fishing. The one major difference is that the online fishermen are criminals. Unlike the tuna, fluke or salmon that you may recreationally fish for, the trophies that these fraudsters are after are your personal data, banking credentials and so on.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.co.uk\/blog\/files\/2015\/11\/phishing-10x10-FB-1024x1024.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10551 size-full\" src=\"https:\/\/www.kaspersky.co.uk\/blog\/files\/2015\/11\/phishing-10x10-FB-1024x1024.png\" alt=\"How to protect yourself from phishing: 10 tips\" width=\"1280\" height=\"1280\"><\/a><\/p>\n<p>Unfortunately there is no real cure for <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-avoid-phishing\/6145\/\" target=\"_blank\" rel=\"noopener nofollow\">phishing attacks<\/a> aside from paranoia-level vigilance on the case of the end user. This threat is like the flu \u2014 constantly evolving and changing attack approaches. Fraudsters can launch personal phishing campaigns, directed at employees of a certain organization or mothers at waiting. This reminds you of some kind of a maleficent marketing, doesn\u2019t it?<\/p>\n<p>There are numerous ways to take the bait: <a href=\"https:\/\/www.kaspersky.com\/blog\/smart-wifi-vkontakte-credentials\/8279\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">accessing public Wi-Fi<\/a>, logging into a <a href=\"https:\/\/www.kaspersky.com\/blog\/avoid-news-related-phishing\/5774\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">fake website<\/a> or following a <a href=\"https:\/\/www.kaspersky.com\/blog\/xmas-security-tips\/7079\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">link in a \u201ccool\u201d discount email<\/a> promising exclusive Black Friday or Christmas deals. It\u2019s impossible to enumerate all the cases.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Kaspersky Lab is ready to help keep your <a href=\"https:\/\/twitter.com\/facebook?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@Facebook<\/a> account safe! <a href=\"http:\/\/t.co\/uokXWD3YkR\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/uokXWD3YkR<\/a> <a href=\"http:\/\/t.co\/DZIOc3uRsj\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/DZIOc3uRsj<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/613332502338490368?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">June 23, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>In fine, it\u2019s easy to get infected. But how users protect themselves?<\/p>\n<ol>\n<li>Always check the link, which you are going to open. If it has some spelling issues, take a double-take to be sure \u2014 fraudsters can try to push on a fake page to you.<\/li>\n<li>Enter your username and password only when connection is secured. Look for the \u201chttps\u201d prefix before the site URL, indicating the connection to the site is secure.<\/li>\n<\/ol>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">RT <a href=\"https:\/\/twitter.com\/threatpost?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@threatpost<\/a>: Wifiphisher Wi-Fi Hacking Tool Automates <a href=\"https:\/\/twitter.com\/hashtag\/Phishing?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Phishing<\/a> Attacks \u2013 <a href=\"http:\/\/t.co\/AhSeYcZB2I\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/AhSeYcZB2I<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/552209220243034112?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 5, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<ol start=\"3\">\n<li>Even if you\u2019ve received a message or a letter from one of your best friends, remember: they could also have been fooled or hacked. That\u2019s why you should remain cautious in any situation.<\/li>\n<li>The same applies to the emails from official organizations, such as banks, tax agencies, online-shops, travelling agencies, airlines and so on. Even from your own office. It\u2019s not that hard to fabricate a fake letter that looks like a real one.<\/li>\n<\/ol>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">A FIFA-related phishing site included a downloadable ticket, which was really a malicious form of the Banker Trojan: <a href=\"http:\/\/t.co\/YJ0FIfZtFv\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/YJ0FIfZtFv<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/472407588945293313?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">May 30, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<ol start=\"5\">\n<li>Sometimes emails and websites look just the same as real ones. It depends on how decently fraudsters did their \u201chomework.\u201d But the hyperlinks, most likely, will be incorrect \u2014 with spelling mistakes, or they can address you to a different place. You can look for these tokens to tell a reliable site from a fraud.<\/li>\n<li>It\u2019s better not to follow links in such letters at all. Instead you can open a new window and enter the URL of your banks or online shop manually. In this case you\u2019ll not miss a discount or a special offer (if there is one) \u2014 and will not become a fraudsters\u2019 victim.<\/li>\n<\/ol>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">New <a href=\"https:\/\/twitter.com\/hashtag\/TeslaCrypt?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TeslaCrypt<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Ransomware?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Ransomware<\/a> Targets Gaming Files: <a href=\"https:\/\/t.co\/bfsXP4ctXO\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/bfsXP4ctXO<\/a> <a href=\"http:\/\/t.co\/dLUlv7S6ix\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/dLUlv7S6ix<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/580037644039659521?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 23, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<ol start=\"7\">\n<li>When discovering a phishing campaign, you should report it to the bank (if the fraud imitates the bank emails) or to the support desk of your social media network (if malicious links are sent by one of the users) and so forth. This really helps to catch criminals.<\/li>\n<li>If you can, don\u2019t log in to online banks and similar services via public Wi-Fi networks in cafes or on the streets. It\u2019s better to use mobile connection or wait a bit then lose all the money on your credit card. The thing is that these networks can be created by fraudsters, who spoof website addresses during the connection and thereby redirect you to a fake page.<\/li>\n<\/ol>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Q3 2015, the percentage of <a href=\"https:\/\/twitter.com\/hashtag\/spam?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#spam<\/a> in email traffic accounted for 54.2% <a href=\"https:\/\/twitter.com\/hashtag\/KLreport?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#KLreport<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/infosec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#infosec<\/a> <a href=\"https:\/\/t.co\/nKGjX6CH3N\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/nKGjX6CH3N<\/a> <a href=\"https:\/\/t.co\/Sxs0wM7my7\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/Sxs0wM7my7<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/664829203410526208?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 12, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<ol start=\"9\">\n<li>Files sent by you massively multiplayer online role-playing game comrades <a href=\"https:\/\/www.kaspersky.com\/blog\/security-tips-for-gamers\/7116\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">may be malicious ransomware<\/a> or even spyware, just like attachments to messages and emails. So be vigilant!<\/li>\n<li>Install <a href=\"https:\/\/www.kaspersky.com\/advert\/multi-device-security?redef=1&amp;THRU&amp;reseller=gl_KDpost_pro_ona_smm__onl_b2c_kasperskydaily_lnk____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a> and follow its recommendations. Our AV solution will solve the majority of problems automatically and alarm you if necessary.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Sometimes even cybercriminals go fishing. They hunt for a special goldfish \u2014 our personal data. So, what can you do to protect yourself from phishing?<\/p>\n","protected":false},"author":522,"featured_media":6453,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2026],"tags":[2412,191,979,442,363,76,192,97,131],"class_list":{"0":"post-6452","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-advice","10":"tag-data","11":"tag-fraudsters","12":"tag-kaspersky-internet-security-multi-device","13":"tag-personal-data","14":"tag-phishing","15":"tag-protection","16":"tag-security-2","17":"tag-tips"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/phishing-ten-tips\/6452\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/phishing-ten-tips\/5153\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/phishing-ten-tips\/3606\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/phishing-ten-tips\/6375\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/phishing-ten-tips\/7242\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/phishing-ten-tips\/6913\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/phishing-ten-tips\/9744\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/phishing-ten-tips\/10550\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/phishing-ten-tips\/5032\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/phishing-ten-tips\/5819\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/phishing-ten-tips\/6422\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/phishing-ten-tips\/9556\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/phishing-ten-tips\/9744\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/phishing-ten-tips\/10550\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/phishing-ten-tips\/10550\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/advice-2\/","name":"advice"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=6452"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6452\/revisions"}],"predecessor-version":[{"id":19239,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6452\/revisions\/19239"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/6453"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=6452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=6452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=6452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}