1ST PROBLEM



FIRST PROBLEM

I have recently received emails and instant messages that look legitimate at first glance. These messages come with URLs that prompt you to input your personal information. In turn, I think It will steal my credentials and use them to access my accounts and personal data.

Problem Name

Phishing Attacks


Definition

Phishing is a type of cyberattack in which criminals send emails, messages, or links that appear legitimate to trick you into revealing sensitive information—such as usernames, passwords, credit card numbers, or other personal data.
These messages often mimic trusted companies, banks, social networks, or colleagues and attempt to direct you to a fake website designed to steal your credentials.


Reliable Resources to Learn More

These are well-known, authoritative cybersecurity resources:

  1. U.S. Cybersecurity and Infrastructure Security Agency (CISA) – Phishing guidance
    https://www.cisa.gov/news-events/news/avoiding-social-engineering-and-phishing-attacks

  2. Federal Trade Commission (FTC) – How to recognize and avoid phishing
    https://www.ftc.gov/business-guidance/small-businesses/cybersecurity/phishing

  3. National Cyber Security Centre (NCSC – UK) – Spotting suspicious emails and texts
    https://www.ncsc.gov.uk/guidance/suspicious-email-actions

  4. Microsoft Security – Phishing protection
    https://www.microsoft.com/en-us/security/business/security-101/what-is-phishing

  5. Google Safety Center – Avoiding phishing attempts
    https://safety.google/security/tips/


Five Good Tips to Avoid or Solve the Problem

1. Inspect the sender and the URL carefully

  • Look for slight misspellings, unusual domains, or inconsistencies.

  • Hover your mouse over links (without clicking) to preview the real destination.

2. Never enter personal information after clicking a link in a message

If you receive an email asking you to “verify your account,” go directly to the official website by typing the URL manually—never through the message link.

3. Turn on multi-factor authentication (MFA)

Even if attackers steal your password, MFA adds a second layer of protection (such as a code on your phone), making it much harder for them to access your accounts.

4. Keep your device and browser up to date

Security patches help block the latest phishing techniques and malicious redirect scripts.

5. Report suspicious messages

  • Use your email provider’s “Report phishing” option.

  • Inform your IT department if you are using a work device.

  • Blocking these senders also helps prevent future attacks.



Let a comment


Comments

Popular posts from this blog

WHAT IS THE PROCESSOR

2ND PROBLEM

WHAT ARE PERIPHERALS