{"id":531,"date":"2019-07-09T19:43:39","date_gmt":"2019-07-09T19:43:39","guid":{"rendered":"https:\/\/www.computerfixx.biz\/blog\/?p=531"},"modified":"2019-11-14T15:31:41","modified_gmt":"2019-11-14T15:31:41","slug":"phishing-scams","status":"publish","type":"post","link":"https:\/\/www.computerfixx.biz\/blog\/2019\/07\/09\/phishing-scams\/","title":{"rendered":"Phishing Scams"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-585\" src=\"https:\/\/www.computerfixx.biz\/blog\/wp-content\/uploads\/2019\/07\/Phishing-Username-Password.jpg\" alt=\"\" width=\"300\" height=\"200\" \/>Phishing is a term used to describe several very effective methods of stealing personal information online. It\u2019s called phishing because criminals use electronic bait to hook a fish\/victim and reel them in.<\/p>\n<p>Phishing targets may be contacted in a variety of ways, including email, phone calls, or text messages by someone posing as a legitimate company to lure people into giving out personal information like bank and credit card details and passwords.<\/p>\n<p>For example, criminals may trick you into opening up a malicious email attachment by putting a compelling message in the subject line like:<\/p>\n<ol>\n<li>photos you have to see to believe<\/li>\n<li>your bank needs additional information<\/li>\n<li>Suspicious activity has been detected on your account<\/li>\n<li>Invoice past due<\/li>\n<li>Are you available<\/li>\n<li>Urgent<\/li>\n<li>You must confirm your account<\/li>\n<\/ol>\n<p>When the victim opens the attachment, it installs malware on their computer which gives the hacker access to their computer or network.<\/p>\n<p>Many email systems now block out a lot of the malicious email attachments, so criminals sometimes use malicious links in their emails that direct a victim to an infected web page instead.<\/p>\n<p>Most people just automatically click on links without thinking about it, and this makes the technique quite effective.<\/p>\n<p>Just becoming aware of how these criminal operate will help you be safer online. So your first and best defense is to be aware.\u00a0 Be suspicious and treat any message from someone you don\u2019t know as highly suspect.<\/p>\n<p>Any email program will show you the destination of a hyperlink if you mouse over it without clicking. This can help you spot suspicious links.\u00a0 If the visible link and the underlying destination don\u2019t match exactly, don\u2019t click it!<\/p>\n<p>Check the URL, aka the name of the website you\u2019re visiting. Phishers constantly put up websites using the almost identical spelling of a legitimate website so victims think they\u2019re safe.<\/p>\n<p>Never open attachments from people you don\u2019t know, and if you receive a request for information that seems strange or a little too personal, visit the website directly via your browser or call the company on the phone. But never use the phone numbers supplied in the email you receive.<\/p>\n<p>Also very popular with criminals is the old fashioned phone call. Many of my customers are reporting that they receive numerous phone calls from people who pretend to be Microsoft, power companies, IRS, banks, and many other legitimate companies.\u00a0 None of these companies would ever call a customer and ask for personal information over the phone.\u00a0 Just hang up!<\/p>\n<p>Last but not least, malicious text messages are also on the rise. The criminals will text you with a link requesting personal information from your bank, etc\u2026 Never follow these links.<\/p>\n<p>No one will ever be completely safe from hackers online but becoming more aware of how these scams work will go a long way toward keeping you safe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing is a term used to describe several very effective methods of stealing personal information online. It\u2019s called phishing because criminals use electronic bait to hook a fish\/victim and reel them in. Phishing targets may be contacted in a variety of ways, including email, phone calls, or text messages by someone posing as a legitimate [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/www.computerfixx.biz\/blog\/wp-json\/wp\/v2\/posts\/531"}],"collection":[{"href":"https:\/\/www.computerfixx.biz\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.computerfixx.biz\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.computerfixx.biz\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.computerfixx.biz\/blog\/wp-json\/wp\/v2\/comments?post=531"}],"version-history":[{"count":13,"href":"https:\/\/www.computerfixx.biz\/blog\/wp-json\/wp\/v2\/posts\/531\/revisions"}],"predecessor-version":[{"id":586,"href":"https:\/\/www.computerfixx.biz\/blog\/wp-json\/wp\/v2\/posts\/531\/revisions\/586"}],"wp:attachment":[{"href":"https:\/\/www.computerfixx.biz\/blog\/wp-json\/wp\/v2\/media?parent=531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.computerfixx.biz\/blog\/wp-json\/wp\/v2\/categories?post=531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.computerfixx.biz\/blog\/wp-json\/wp\/v2\/tags?post=531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}