Protect Yourself from Phishing Scams

2 min. readlast update: 11.30.2023

DESCRIPTION: Phishing is when scammers pretend to be real people or companies to steal personal info. They send convincing emails that take you to fake websites, where you might unknowingly share sensitive data like passwords or bank info.

RESOLUTION STEP: The following are the various types of phishing:

  1. Clone Phishing - This attack imitates legitimate emails and replaces their attachments/links with malware.
  2. Spear Phishing - Attackers gather information on users and create content that persuades them to visit a harmful website or install malicious filles.
  3. Whaling - A variant of spear phishing, where targets are wealthy and influential people
  4. Email Spoofing - Emails that seem legitimate are sent to users, directing them to pages designed to collect their personal information.
  5. SMS Phishing and Vishing - The text message and voice call versions of phishingfor personal information.
  6. Impressions and Giveways - Scammers impersonate social media influencers and personalities to advertise giveways, collecting personal information of the supposed 'winners'.
  7. Pharming - Hackers send malicious codes through phising emails that cause users' devices/servers/system to redirect them to fraudulent websites.
  8. Typosquatting - The practive of directing traffic to a fake website by using foreign language spellings, typing errors that you may make, or slight changes to popular domain names to confuse users.
  9. Watering Hole - Frequesntly visited sites are scanned for vulnerabilities, and corrupted scripts are embedded to track userv visits.
  10. Website Redirects - Users are redirected to a URL other than the one they intended to visit, and malware is installed on their device.
  11. Malicious Application - Malware is installed through malicious apps to monitor user behaviour or steal sensitive information.
  12. Fake Advertisements - Fake advertisements using typosquatted, paid-for domains appear as top results when users search for legitimate companies and services.

For further check refer to https://blog.deriv.com/posts/how-to-protect-your-online-trading-account/

Was this article helpful?