One in ten people is a victim of Internet fraud, according to the Office for National Statistics of the United Kingdom. The network is full of threats invisible to the average user and is increasingly likely to fall into any of the thousands of cheats found there. Navigating resembles walking on unstable streets where - if you are not careful - it is possible to fall and get hurt, the difference is that the damages of this type of crimes derive in the loss of all the money that is possessed, the incorrect handling Of your personal data and even identity theft.
The main form used by criminals is Phishing, a term that comes from the word "fish" in English. If users do not take enough precaution, they will immediately sting the hook.
What is Phishing?
Since the conception of the Internet different ways have been developed to deceive people using traditional methods transferred to technological planes. False mail scams giving non-existent prizes or requesting a certain amount of money in order to receive profits became spam emails. Although for the eye trained or accustomed to looking at traps on the Internet are often obvious, 10% of users have been victims.
Phishing seeks to directly obtain useful information from anyone in order to take their money. The difference with other computer crimes is that criminals using this technique do not attack users directly by asking them for money or by interacting too much. They choose to simulate fishing. They throw the bait and the bait waiting for somebody to bite him. They use e-mails, fake websites, replicas of bank pages, or create more eye-catching illusions, such as "get sex free" or "earn easy money on the Internet" ads that make the user Need for direct impulses.
Can you hack me?
Criminals also use malicious software (malware) to obtain information by other means. It is possible that they send flashy emails to the user and with just two clicks, it is possible that the computer will become infected and change its configuration. At this point the malicious program can gather information or know what is being typed with the keyboard and in this way get emails, passwords, card numbers and the places you surf. Also, in other types of crime, they may take control of the webcam and begin to watch their victims seizing even more information and leading to blackmail.
The number of Phishing victims between 2015 and 2016 is around 15 million. The disadvantaged range from the most innocent users, to the customers of large companies. The transactions that are made exceed millions of dollars a day and it is virtually impossible to locate the criminals. They use different means to hide their location and in many cases it is impossible to start lawsuits because the same individuals offer their information.
Here are the different types of Phishing:
Spear Phishing: He is the best-known type and focuses on attracting different, specific audiences. For example, if someone searches too much for music, they may try to capture it using audio software or sound production. The same happens with porn, sex, money, baldness, beauty and other elements that people want vehemently.
Cloning Phishing: This refers to the cloning or imitation of a website in which users usually insert their personal data. That is why there are so many levels of security in the pages of banks and the official websites try to acquire any site that can be confused, avoiding that they can be used for malicious purposes.
Whaling: "Fishing for a whale" is just what it seems. Criminals plan attacks targeted at high-profile users, who have large amounts of money and are not very careful about their online activity. These crimes often have more complex productions to deceive more easily.
Phone Phishings: This works with mobile phones through text messages. The user is alerted that he has problems with his account and is advised to proceed by offering security codes or account numbers. It is the most obvious way to do this and works with individuals with little security.
Phishing
Phishing is the most obvious technique and perhaps the most absurd for those who usually surf the web finding all kinds of misleading advertising. However, there are millions of registered cases a year without counting the others that are not reported. Victims have lost all their money and it is extremely difficult to get them back or to find their criminal.
Yeah I really believe Bitcoin and people losing Bitcoins through nefarious methods has led to most of us being better educated on cyber security.
I had no idea what 2FA was 2 years ago, now I feel like I am walking around in public naked if I don't use it.
And storing my private keys on another site is super scary, holding my private keys on my Trezor is the only way I feel safe these days.
I think everyone is learning cyber security fast! Nothing hurts more than losing money and learning the hard way!
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
You are so right
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit