Phishing is no doubt a security term you have heard many times. You probably also know that “phishing” is something you want to avoid. But what exactly is “phishing”? Lets take a deep dive into what exactly this is – and why you don’t want to be tricked by one of these attacks.
Pronounced like fishing, phishing is a term used to describe a malicious individual or group of individuals who scam users. They do so by sending e-mails or creating web pages that are designed to collect an individual’s online bank, credit card, or other login information. Because these e-mails and web pages look like legitimate companies users trust them and enter their personal information.
Example of phishing e-mail
How to identify a phishing e-mail.
- Company – These e-mails are sent out to thousands of different e-mail addresses and often the person sending these e-mails has no idea who you are. If you have no affiliation with the company the e-mail address is supposedly coming from, it is fake. For example, if the e-mail is coming from Wells Fargo bank but you bank at a different bank.
- Spelling and grammar – Improper spelling and grammar are almost always a dead giveaway. Look for obvious errors.
- No mention of account information – If the company were sending you information regarding errors to your account, they would mention your account or username in the e-mail. In the above example, the e-mail just says “eBay customer”, if this was eBay they would mention your username.
- Deadlines – E-mail requests an immediate response or a specific deadline. For example, in the above example, the requirement to log in and change your account information within 24 hours.
- Links – Although many phishing e-mails are getting better at hiding the true URL you are visiting, often these e-mails will list a URL that is not related to the company’s URL. For example, in our above eBay example, “http://fakeaddress.com/ebay” is not an eBay URL, just a URL with an “ebay” directory. If you are unfamiliar with how a URL is structured, see the URL definition for additional information.
What to do if you are not sure if an e-mail is official.
- Never follow any links in an e-mail. Instead of following the link in the e-mail, visit the page by manually typing the address of the company. For example, in the above example, instead of visiting the fake eBay URL, you would type: http://www.ebay.com in your web browser and log in to the official website.
- Never send any personal information through e-mail. If a company is requesting personal information about your account or are saying your account is invalid, visit the web page and log into the account as you normally would.
- Finally, if you are still concerned about your account or are concerned about your personal information, contact the company directly, either through their e-mail address or over the phone.
Issues phishing e-mails commonly address
Below are some of the issues a phishing e-mail may inquire about to trick users.
- Account issues, such as account or password expiring, account being hacked, account out-of-date, or account information needing to be changed.
- Credit card or other personal information, such as credit card expiring or being stolen, incorrect social security number or other personal information, or duplicate credit card or other personal information.
- Confirming orders, such as a request that you log in to confirm recent orders or transactions.
Common companies affected by phishing
Below is a listing of companies phishers most often try to attack.
- Any major bank
- Popular websites such as Amazon, Facebook, MySpace, PayPal, eBay, Microsoft, Apple, Hotmail, YouTube, etc.
- Government: FBI, CIA, IRS, etc.
- Internet service providers such as AOL, Comcast, Cox, MSN, etc.
- Casinos and lottery.
- Online dating or community websites.
I’ve fallen for a phishing attack, what should I do?
If you’ve read this page too late and have already fallen for a phishing attack log into your account from the companies page and change your password immediately. Also, it is a good idea to scan your computer for malware in case the site has infected your computer. Finally, if the company supports two-factor authentication, it is also a good idea to enable this feature on your account.
If you believe your personal information such as your social security number, credit card number, phone number, address, or full name has been stolen it is also a good idea to watch all of your accounts for suspicious activity.