Search This Blog

Thursday, April 4, 2013

Know more about email SPAM vs. PHISHING (more dangerous in 2013)

SPAM vs. PHISHING in 2013


This is my fourth blog on computes security. In this one you will learn more about SPAM vs. PHISHING in 2013.
Both SPAM vs. PHISHING are easy way to infect your computers/laptop/cell phones.
Malware, short for malicious software, is used by attackers to disrupt computers, gather information, or gain access to private computer systems. Many of these attacks come through a combination of deceitful e-mails and compromised Web pages. Two types of e-mails are often used: SPAM and PHISHING.  It’s important that you know how to deal with each of them.  The differences between the two are highlighted in the table below:

SPAMPHISHING
What is it?
    • Distributed in bulk, unsolicited e-mails with fake links or attachments;
    • Attempt to trick you into opening links or attachments, which may be infected with malware;
    • The first phase for a cyber-attack, messages are sent anonymously to confirm e-mail address and to get more information about address owner;
    • Fake e-mails, text messages and websites created to look like authentic sources (e.g. Canada Post or Bank of Montreal);
    • Sent to “phish” for and steal your personal and financial information;
    • More targeted and personal because sent specifically to a person ; leverages any information available about them;
    • Makes an offer or claim that appears legitimate and requires validation;
    What does it look like?
    • Vague or nonsensical subject line;
    • Addressed to many in an organization ;
    • Usually trying to sell something;
    • Looks official;
    • Asks you to update, validate or confirm account or personal information;
    What not to do
    • Do not open the e-mail;
    • Do not reply to the e-mail;
    • Do not click on links or open attachments;
    • Do not click “Unsubscribe”, which validates your e-mail address;
    • Do not open the e-mail;
    • Do not reply to the e-mail;
    • Do not click on links or open attachments;
    What to do
    • Delete the message unread;
    • If it is particularly concerning or you have noticed an increase in the number of messages you receive, report it to the National Service Desk;
    • Eearly detection is important as the longer a phishing site is active, the greater the impact on people and organizations;
    Best practices for both
    • Do not click on links in e-mails from unknown sources;
    • Do not open files with enticing names such as "sexy", "secret", "passwords";
    • Be suspicious of unexpected e-mail attachments from any source;



    How to protect

    Smart online usage means taking steps to avoid falling victim to online fraud. Online fraud occurs when criminals try to obtain your personal information, such as credit card and account numbers, get you to pay for items that are either non-existent or misrepresented to you and/or steal your identity.

    Secure firewalls help prevent unauthorized access to your internal systems.

    Constant monitoring maintains the quality of our systems, proactively identifies unusual customer account activity and helps provide you with around-the-clock peace of mind.

    128-bit encryption, the highest level of encryption generally available, helps assure that your data can only be decoded and read by our secure online environment.

    Email safety. Don’t reply to authentic-looking emails that attempt to get you to release personal and financial information. Email is not secure. TD Bank Group will ask you to call us at a verifiable telephone number for such a discussion.
    Passwords & login pages. Guard your usernames, passwords and login information – they’re the keys that let you in to your accounts

    No comments:

    Popular Posts

    new

    Related Posts Plugin for WordPress, Blogger...