1ST PROBLEM
I have recently received emails and instant messages that look legitimate at first glance. These messages come with URLs that prompt you to input your personal information. In turn, I think It will steal my credentials and use them to access my accounts and personal data.
Problem Name
Phishing Attacks
Definition
Phishing is a type of cyberattack in which criminals send emails, messages, or links that appear legitimate to trick you into revealing sensitive information—such as usernames, passwords, credit card numbers, or other personal data.
These messages often mimic trusted companies, banks, social networks, or colleagues and attempt to direct you to a fake website designed to steal your credentials.
Reliable Resources to Learn More
These are well-known, authoritative cybersecurity resources:
-
U.S. Cybersecurity and Infrastructure Security Agency (CISA) – Phishing guidance
https://www.cisa.gov/news-events/news/avoiding-social-engineering-and-phishing-attacks -
Federal Trade Commission (FTC) – How to recognize and avoid phishing
https://www.ftc.gov/business-guidance/small-businesses/cybersecurity/phishing -
National Cyber Security Centre (NCSC – UK) – Spotting suspicious emails and texts
https://www.ncsc.gov.uk/guidance/suspicious-email-actions -
Microsoft Security – Phishing protection
https://www.microsoft.com/en-us/security/business/security-101/what-is-phishing -
Google Safety Center – Avoiding phishing attempts
https://safety.google/security/tips/
Five Good Tips to Avoid or Solve the Problem
1. Inspect the sender and the URL carefully
-
Look for slight misspellings, unusual domains, or inconsistencies.
-
Hover your mouse over links (without clicking) to preview the real destination.
2. Never enter personal information after clicking a link in a message
If you receive an email asking you to “verify your account,” go directly to the official website by typing the URL manually—never through the message link.
3. Turn on multi-factor authentication (MFA)
Even if attackers steal your password, MFA adds a second layer of protection (such as a code on your phone), making it much harder for them to access your accounts.
4. Keep your device and browser up to date
Security patches help block the latest phishing techniques and malicious redirect scripts.
5. Report suspicious messages
-
Use your email provider’s “Report phishing” option.
-
Inform your IT department if you are using a work device.
-
Blocking these senders also helps prevent future attacks.
Comments
Post a Comment