Get to Know Phishing – Cyber crime often occurs in the midst of internet user communities, especially in Indonesia. The police are also trying to crack down on this cyber crime by forming a special cyber team. There are many types of cyber crimes such as phishing, carding, DoS, Sql Injection, Malware, and many more.
Before reading further, for those of you who are interested in our services, you can contact us directly by clicking the link below.
Consultation Via Whatsapp ” letter_case=”lowercase” color=”success” icon=”icon-checkmark” link=”https://api.whatsapp.com/send?phone=628112017588″ target=”_blank”]
Each of these cyber crime activities will certainly be very detrimental to the victims, these victims will suffer losses both financially and wasted time to be able to return the stolen data. One of them that we will discuss this time is phishing, so let’s get to know phishing and how to avoid it? Let’s look at the following explanation.
Yang Mungkin Kamu Cari
What is Phishing
The meaning of phishing is an attempt to steal data by hackers by tricking other people. So that the other person unknowingly becomes a victim and hands over their data to the hacker. The value of the stolen data can be very valuable, ranging from personal data, social media account data, to financial data such as credit card information from the victim.
The word phishing comes from the word fishing which means fishing. By analogy, this phishing activity aims to lure people to voluntarily provide personal information without realizing it.
Why doesn’t the victim realize that he is handing over his personal data to other people? Phishing perpetrators make themselves look like the authorities. By using a fake website and e-mail address, he tries to convince the victim to enter data on a website that the victim thinks is genuine. So indirectly the victim is deceived and used by the perpetrator.
According to reports that 32% of data theft consists of phishing activities. In 2020 only
As for the 4 types of phishing that we need to know, let’s study the types of phishing below.
As the name suggests, phishing emails use email media to deceive victims by sending emails containing phishing links to direct victims. According to phishing data using e-mail, there have been 3.4 billion fake e-mails sent every day. Imagine if only one percent how many people were victims of this criminal activity.
This phishing web is a type of phishing that displays a website like a website that looks like the original to deceive the victim. This phishing website looks like an official website and uses a similar domain name. This can also be called spoofing.
For example, there is a website that resembles the Facebook.com social media login page, the domain used for phishing uses the Facebook.net domain or other.
Whaling is a type of phishing that not only targets specific individuals but also targets individuals with high authority within an organization such as business owners, directors, managers and others.
If the whaling action is successful, there are many advantages for the phisis who can take advantage of the access they get.
Spear phishing is part of a phishing email. Instead of sending lots of emails and targeting random victims. Spear phishing only targets certain people, usually after obtaining basic information such as the victim’s name and address.
Phishing Characteristics You Must Know
Phishing is a type of cyber crime that can harm the victim financially and the reputation of the victim. But we as ordinary people would be nice to know the characteristics of phishing itself such as:
URL Links in Emails are Too Short and Foreign
The first phishing traits are links that are too short and unfamiliar. Phishing actors usually only use free links because they don’t have to bother thinking about security. Therefore they usually choose links with only 4 to 8 characters.
Apart from being short, the url link used does not contain the name of the official institution. Before being given, there are usually lots of texts or narratives with the lure of gifts or money to attract the attention of the victim.
Bad Spelling Or Grammar
In addition to unclear links, phishing characteristics can also be seen from unclear spelling and grammar. There are some cases of phishing that don’t use punctuation at all or even language that can’t be read at all.
Unknown Email Address
The email address of the person sending the phishing email is usually unknown to the victim and unfamiliar, for example —–@xxx.cg and the like.
Website Issues Warning When Clicked
Usually a browser that has strong protection will prevent phishing by giving a warning not to access the website.
Website Template Similar to Official Site
One of the characteristics of deceptive phishing is a website acting in the name of an official site, with a design similar to the information inside is suspicious.
How to Avoid Phishing
After we know the characteristics of phishing above, we will discuss how to avoid phishing below.
Beware of Receiving Unknown Calls
If someone calls from a number we don’t know, we shouldn’t take it for granted. Even though we accept it, we should listen to the person what his interests are. When it comes to matters of privacy or money then we should just ignore it.
Install Phishing Protection App
To be even more secure, we can install various phishing protection applications that can be installed on computers or smartphones.
Store Login Information with Care
Do not distort or leave login information anywhere, such as on an internet cafe’s computer, or on someone else’s cell phone. And you should use a password that is not easy to guess, if it’s hard to remember then you can write it in a personal note.
Accessing Websites with SSL
SSL or Secure Socket Layer is a protective protocol that is installed on websites so that access can be protected online. To avoid phishing, you can make sure whether the website has SSL or not, that’s where you have to know phishing, if not, then you should leave the website.
Routinely Check Gadget Security
Phishing crimes can target all applications in gadgets including mobile banking applications. If you are someone who likes to store information on your gadget, you should make sure that there are no suspicious applications or files, and you must learn how to recognize Phishing properly.
Not Following Suspicious Email/Text Message Instructions
Often, if you receive a suspicious message or email, never follow the instructions from the email.
It’s not easy to be tempted by gifts offered by e-mails/text messages
If you receive a suspicious email or text message, you should delete the message immediately and not be tempted by the lure of the prizes being offered.
If you are interested in our service offerings, please contact us via this link or you can also use our contact form here.