My Tech Talk Topic: Phishing Attacks

Since our childhood, we have been told not to talk to strangers. Why? Some strangers might use the information in the conversations to do something harmful. We should not share our personal information with others. However, phishing attack is a “high-tech” form of talking to strangers. Scammers usually use emails, text messages or even social media to trick the victim giving his or her personal information.

The personal information here can be credit card number, bank account information, passwords etc. The first phishing attack happened sometime around 1994. A hacker named “Da Chronic” developed a windows application, which could automatically send direct messages requesting account number and passwords American Online users. Phishing attacks happen when someone pretends to be someone else requesting information.

Phishing attack is not only harmful to people, but also harmful to companies. Even the internet giants like Google and Facebook got duped out of $100 million through an email phishing scheme (Yakowicz, 2018). Most of the phishing attacks are sent through emails. The scammers may send people links and ask the victims to enter their personal information. The reason phishing attacks mostly happen through emails is that everyone uses emails.

With a rapid development of technology, cyber security professionals, who are the first line against phishing attack, also improve their skills as well. People also aware of protecting their personal information. However, the scammers also get evolutions of phishing attacks. The scammers develop clone phishing and clone websites. The hackers hack into a real website and change the link to redirect people to their clone websites. This kind of clone websites can not last very long time, but they are difficult for people to tell if they are real or not.

There are some ways through which people could protect themselves from phishing attacks.

  1. Install a security software.
  2. Set up automatically updates.
  3. Use multi-factor authentication.
  4. Change passwords frequently.
  5. Back up data.

The first two methods keep the software in the recent version to avoid phishing attacks the most. The third and the fourth ones could keep the passwords strong. Passwords such as “password123”, “Iloveu”, etc. are too easy to guess. Backing up data make the data safe in case the device is hacked. Other than these methods, being aware of phishing attack is important.

NEVER give information to someone requesting it.

Gershwin, A. (2019, May 30). The evolution of phishing attacks: why are they still effective? Retrieved from https://hackernoon.com/the-evolution-of-phishing-attacks-why-are-they-still-effective-44bdb8f458c2

Federal Trade Commission Consumer Information (2019, May 19). How to Recognize and Avoid Phishing Scams. Retrieved from https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams

Yakowicz, W. (2018, July 6). The 3 Biggest Phishing Scams of 2018. Retrieved from https://www.inc.com/will-yakowicz/biggest-email-phishing-scams-2018.html

Leave a comment

Design a site like this with WordPress.com
Get started