{"id":5406,"date":"2015-11-13T14:31:46","date_gmt":"2015-11-13T19:31:46","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/?p=5406"},"modified":"2020-02-26T20:28:51","modified_gmt":"2020-02-26T14:58:51","slug":"how-to-protect-yourself-from-phishing-10-tips","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/how-to-protect-yourself-from-phishing-10-tips\/5406\/","title":{"rendered":"How to protect yourself from phishing: 10 tips"},"content":{"rendered":"<div class=\"entry-content\">\n<div>\n<p>If you sit and think about it for a second, online phishing is not that far from actual fishing. The one major difference is that the online fishermen are criminals. Unlike the tuna, fluke or salmon that you may recreationally fish for, the trophies that these fraudsters are after are your personal data, banking credentials and so on.<\/p>\n<p>Unfortunately there is no real cure for <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-avoid-phishing\/6145\/\" target=\"_blank\" rel=\"noopener nofollow\">phishing attacks<\/a> aside from paranoia-level vigilance on the case of the end user. This threat is like the flu \u2014 constantly evolving and changing attack approaches. Fraudsters can launch personal phishing campaigns, directed at employees of a certain organization or mothers at waiting. This reminds you of some kind of a maleficent marketing, doesn\u2019t it?<\/p>\n<p>There are numerous ways to take the bait: <a href=\"https:\/\/www.kaspersky.com\/blog\/smart-wifi-vkontakte-credentials\/8279\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">accessing public Wi-Fi<\/a>, logging into a <a href=\"https:\/\/www.kaspersky.com\/blog\/avoid-news-related-phishing\/5774\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">fake website<\/a> or following a <a href=\"https:\/\/www.kaspersky.com\/blog\/xmas-security-tips\/7079\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">link in a \u201ccool\u201d discount email<\/a> promising exclusive Black Friday or Christmas deals. It\u2019s impossible to enumerate all the cases.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Kaspersky Lab is ready to help keep your <a href=\"https:\/\/twitter.com\/facebook\" target=\"_blank\" rel=\"noopener nofollow\">@Facebook<\/a> account safe! <a href=\"http:\/\/t.co\/uokXWD3YkR\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/uokXWD3YkR<\/a> <a href=\"http:\/\/t.co\/DZIOc3uRsj\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/DZIOc3uRsj<\/a><\/p>\n<p>\u2014 Kaspersky Lab (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/613332502338490368\" target=\"_blank\" rel=\"noopener nofollow\">June 23, 2015<\/a><\/p><\/blockquote>\n<p>In fine, it\u2019s easy to get infected. But how users protect themselves?<\/p>\n<ol>\n<li>Always check the link, which you are going to open. If it has some spelling issues, take a double-take to be sure \u2014 fraudsters can try to push on a fake page to you.<\/li>\n<li>Enter your username and password only when connection is secured. If you see the \u201chttps\u201d prefix before the site URL, it means that everything is OK. If there is no \u201cs\u201d (secure) \u2014 beware.<\/li>\n<\/ol>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">RT <a href=\"https:\/\/twitter.com\/threatpost\" target=\"_blank\" rel=\"noopener nofollow\">@threatpost<\/a>: Wifiphisher Wi-Fi Hacking Tool Automates <a href=\"https:\/\/twitter.com\/hashtag\/Phishing?src=hash\" target=\"_blank\" rel=\"noopener nofollow\">#Phishing<\/a> Attacks \u2013 <a href=\"http:\/\/t.co\/AhSeYcZB2I\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/AhSeYcZB2I<\/a><\/p>\n<p>\u2014 Kaspersky Lab (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/552209220243034112\" target=\"_blank\" rel=\"noopener nofollow\">January 5, 2015<\/a><\/p><\/blockquote>\n<ol start=\"3\">\n<li>Even if you\u2019ve received a message or a letter from one of your best friends, remember: they could also have been fooled or hacked. That\u2019s why you should remain cautious in any situation.<\/li>\n<li>The same applies to the emails from official organizations, such as banks, tax agencies, online-shops, travelling agencies, airlines and so on. Even from your own office. It\u2019s not that hard to fabricate a fake letter that looks like a real one.<\/li>\n<\/ol>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">A FIFA-related phishing site included a downloadable ticket, which was really a malicious form of the Banker Trojan: <a href=\"http:\/\/t.co\/YJ0FIfZtFv\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/YJ0FIfZtFv<\/a><\/p>\n<p>\u2014 Kaspersky Lab (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/472407588945293313\" target=\"_blank\" rel=\"noopener nofollow\">May 30, 2014<\/a><\/p><\/blockquote>\n<ol start=\"5\">\n<li>Sometimes emails and websites look just the same as real ones. It depends on how decently fraudsters did their \u201chomework.\u201d But the hyperlinks, most likely, will be incorrect \u2014 with spelling mistakes, or they can address you to a different place. You can look for these tokens to tell a reliable site from a fraud.<\/li>\n<li>It\u2019s better not to follow links in such letters at all. Instead you can open a new window and enter the URL of your banks or online shop manually. In this case you\u2019ll not miss a discount or a special offer (if there is one) \u2014 and will not become a fraudsters\u2019 victim.<\/li>\n<\/ol>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">New <a href=\"https:\/\/twitter.com\/hashtag\/TeslaCrypt?src=hash\" target=\"_blank\" rel=\"noopener nofollow\">#TeslaCrypt<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Ransomware?src=hash\" target=\"_blank\" rel=\"noopener nofollow\">#Ransomware<\/a> Targets Gaming Files: <a href=\"https:\/\/t.co\/bfsXP4ctXO\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/bfsXP4ctXO<\/a> <a href=\"http:\/\/t.co\/dLUlv7S6ix\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/dLUlv7S6ix<\/a><\/p>\n<p>\u2014 Kaspersky Lab (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/580037644039659521\" target=\"_blank\" rel=\"noopener nofollow\">March 23, 2015<\/a><\/p><\/blockquote>\n<ol start=\"7\">\n<li>When discovering a phishing campaign, you should report it to the bank (if the fraud imitates the bank emails) or to the support desk of your social media network (if malicious links are sent by one of the users) and so forth. This really helps to catch criminals.<\/li>\n<li>If you can, don\u2019t log in to online banks and similar services via public Wi-Fi networks in cafes or on the streets. It\u2019s better to use mobile connection or wait a bit then lose all the money on your credit card. The thing is that these networks can be created by fraudsters, who spoof website addresses during the connection and thereby redirect you to a fake page.<\/li>\n<\/ol>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Q3 2015, the percentage of <a href=\"https:\/\/twitter.com\/hashtag\/spam?src=hash\" target=\"_blank\" rel=\"noopener nofollow\">#spam<\/a> in email traffic accounted for 54.2% <a href=\"https:\/\/twitter.com\/hashtag\/KLreport?src=hash\" target=\"_blank\" rel=\"noopener nofollow\">#KLreport<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/infosec?src=hash\" target=\"_blank\" rel=\"noopener nofollow\">#infosec<\/a> <a href=\"https:\/\/t.co\/nKGjX6CH3N\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/nKGjX6CH3N<\/a> <a href=\"https:\/\/t.co\/Sxs0wM7my7\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/Sxs0wM7my7<\/a><\/p>\n<p>\u2014 Kaspersky Lab (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/664829203410526208\" target=\"_blank\" rel=\"noopener nofollow\">November 12, 2015<\/a><\/p><\/blockquote>\n<ol start=\"9\">\n<li>Files sent by you massively multiplayer online role-playing game comrades <a href=\"https:\/\/www.kaspersky.com\/blog\/security-tips-for-gamers\/7116\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">may be malicious ransomware<\/a> or even spyware, just like attachments to messages and emails. So be vigilant!<\/li>\n<li>Install <a href=\"https:\/\/www.kaspersky.com\/advert\/multi-device-security?redef=1&amp;THRU&amp;reseller=gl_KDpost_pro_ona_smm__onl_b2c_kasperskydaily_lnk____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a> and follow its recommendations. Our AV solution will solve the majority of problems automatically and alarm you if necessary.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>If you sit and think about it for a second, online phishing is not that far from actual fishing. The one major difference is that the online fishermen are criminals.<\/p>\n","protected":false},"author":522,"featured_media":5407,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1897,191,1022,617,363,76,192,97,1898],"class_list":{"0":"post-5406","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-advice","9":"tag-data","10":"tag-fraudsters","11":"tag-kaspersky-internet-security-multi-device","12":"tag-personal-data","13":"tag-phishing","14":"tag-protection","15":"tag-security-2","16":"tag-tips"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/how-to-protect-yourself-from-phishing-10-tips\/5406\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing-10-tips\/6275\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/how-to-protect-yourself-from-phishing-10-tips\/3680\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/advice\/","name":"#advice"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/5406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=5406"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/5406\/revisions"}],"predecessor-version":[{"id":19302,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/5406\/revisions\/19302"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/5407"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=5406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=5406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=5406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}