07 Phishing
Phishing is an attempt to obtain sensitive information, such as login credentials or credit card details, by masquerading as a trustworthy entity. This usually occurs via email. The attacker often creates an email that appears to be from a reputable source, such as a bank, social media platform, or even a known contact. The email may contain a link that directs the victim to a fake website, where they are asked to enter their credentials or other sensitive information.
How to protect yourself
-
Be cautious when opening emails from unknown senders
-
Look for suspicious signs in the email, such as poor grammar or inconsistencies in branding
-
Always hover over links in emails to check the actual URL before clicking
-
Enable two-factor authentication (2FA) on your online accounts
Recommended
- CYBER SECURITY 101/UNDERSTAND COMMON HACKING TOOLS
- CYBER SECURITY 101/UNDERSTAND COMMON EXPLOIT FRAMEWORKS
- CYBER SECURITY 101/UNDERSTAND CONCEPT OF DEFENSE IN DEPTH
- CYBER SECURITY 101/BASICS AND CONCEPTS OF THREAT HUNTING
- CYBER SECURITY 101/BASICS OF REVERSE ENGINEERING
- CYBER SECURITY 101/KALI LINUX
- CYBER SECURITY 101/PARROT OS
- CYBER SECURITY 101/PHISHING
- CYBER SECURITY 101/SHOULDER SURFING
- CYBER SECURITY 101/DUMPSTER DIVING
- CYBER SECURITY 101/TAILGATING
- CYBER SECURITY 101/BRUTE FORCE
- CYBER SECURITY 101/SOCIAL ENGINEERING