Phishing: Top Threat to Our Online Security

Written by sunanda35 | Published 2020/08/26
Tech Story Tags: phishing | phishing-attacks | ransomware | programming | web-development | security | information-security | cyber-security | web-monetization

TLDR Phishing is a cheap technique for hackers to steal the victim’s data. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link, which can lead to the installation of malware, the freezing of the system as part of a ransomware attack, or the revealing of sensitive information. The attacker who storing your personal data to their database to gain access to your personal social life.via the TL;DR App

Phishing is a cheap technique for hackers to steal the victim’s data. Now I am telling you because it really happened to me. It took my most online privacy.
One day, I received a mail from nearly looking like google.com. There was written that “New google service is launched, you have to upgrade this new feature by clicking a link. Otherwise, your current google account will be closed. So, they want me to open this link and log on. Actually they want to steal our account.

How does Phishing work?

Phishing is a type of social engineering attack often used to steal user's data, including their login credentials, credit card numbers, and etc. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link, which can lead to the installation of malware, the freezing of the system as part of a ransomware attack, or the revealing of sensitive information.

Some Phishing Examples —

Some spoofed emails sent that your most used website will expire your account soon. like these —
And many things can occur by clicking the link. For example —
  • User redirected to a website, that would be like the same website as the original. The attacker who storing your personal data to their database to gain access to your personal social life.
  • However, while being redirected, some malicious script activates to take the user’s browser session cookie. Using an XSS attack, hackers giving a perpetrator privileged access to the university network.
See it, the site is looking perfectly like Amazon. but take a look at the URL, it is different. right? So you have to notice this as well.

Your received email referral link would nearly similar to the original website. You have to see it very carefully to prevent phishing.

How to prevent Phishing?

Two-factor authentication — In this authentication system, to login into another session, you have to verify your authentication in another way. If hackers steal your password, but they can’t get OTP to login to other devices.
I hope you enjoyed this article and you will also be aware of your personal social security. You have any protection idea about this topic, let the world know your thoughts as a response.

Written by sunanda35 | Tech Evangelist, Polyglot Developer with a passion for innovative technology & Tech Enthusiastic
Published by HackerNoon on 2020/08/26