Phishing Attacks: Common Ones to Watch Out For
In 2017, phishing attacks rose by 59%. As cybercriminals keep using more ingenious methods, it can be difficult to tell what’s real and what’s not. With the number of attacks rising every day, you need to take precautions and use phishing prevention methods to better safeguard your credentials.
To help you out, here are some common phishing attacks to look out for whenever you’re on the internet.
Nigerian prince scams
This is one of the original phishing scams and goes back decades. Although there are several variations on this scam, the main point is to trick people into paying advanced fees. The sender will claim to have a significant amount of cash tied up that only you can help with. If you help them out, they’ll split part of the money with you after they get access to it.
As you can guess, you’ll never see the money, and they’ll walk away with your bank account information.
MORE : Example of Spear Phishing
Deactivation scams
Cybercriminals will scare you into taking action with deactivation scams. Usually, the emails say your account will be deactivated if you don’t log in within a certain time period.
In the moment, victims panic, click on the malicious link in the email then enter their login details on the spoofed site. Their credentials are then delivered straight to the scammers.
MORE : Learn About Spear Phishing vs Phishing
“Friend in need” scams
This one also plays on a sense of urgency to get you to act. What the cybercriminals do is spoof your friend’s email address. They’ll claim to be your friend in a foreign country, stuck in horrible circumstances. Then, they’ll ask for money to alleviate the situation.
People don’t want to turn away friends in need, this phishing attack has a high success rate.
MORE : Prevent Spear Phishing
Tech support scams
In a tech support scam, the scammer will either call or email you, saying there’s been a breach in your computer’s security. They will pose as IT and ask to install remote access software so they can help you out.
Once you’ve installed it, they’ll pretend to find problems that are only fixable with the software they have. Since you’ll have to pay for it, they’ll get your credit card information.
MORE : How Does Phishing Work??
Don’t fall for phishing attacks
Although these are some of the more common spear phishing attacks, there are plenty more lurking out there. Hence it is essential to know how to protect from phishing as well as how to identify a phishing email. Always be wary when you’re online and be sure to report and block anything that seems suspicious. Follow phishing prevention best practices to keep your data safe.
Enterprise-class email protection without the enterprise price
For flexible per-user pricing, PhishProtection’s integrated email security solution protects your employees from business email compromise (BEC) and many other email threats. 24×7. On any device. With features you’d expect in more expensive solutions:
All Plans Come With
- Stops business email compromise (BEC)
- Stops brand forgery emails
- Stop threatening emails before they reach the inbox
- Continuous link checking
- Real-time website scanning
- Real time alerts to users and administrators
- Protection with settings you control
- Protection against zero day vulnerabilities
- Complete situational awareness from web-based console
Join 7500+ Organizations that use Phish Protection
Phish Protection works with System Administrators, IT Professionals and IT Executives in thousands of companies worldwide. Sign up and protect your organization from phishing attacks in less than 5 minutes