Tips for Avoiding Phishing Email Traps

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Tips for Avoiding Phishing Email Traps-2 Next

If in doubt, don't open the email attachment

Go to the website from your browser and look for the promotion. Unless the website has been hijacked, which the business hopefully notices soon, this is the safer route. While not perfect, going directly to a website is preferable to clicking on links in emails.

When the holidays come around, many of us are busy with planning, gift buying and decorating, oftentimes forgetting to be diligent when accessing the web. Cyber criminals are well aware of this and are getting sneakier and changing tactics –  moving from malicious attachments to "watering hole" style attacks that lure victims to a trusted (but compromised) URL destination.

During this time of year, people make more online transactions than usual, so it's essential to be extra careful when sending financial and/or personal information, even to sources you think are reputable. While you may think you are saving time having a website save your details or registering with a website, make sure you think about how many new ways you are opening yourself up to having those details stolen should those sources become compromised by attackers. Not taking these steps to protect yourself could turn a morning of building your sweet new Lego Millennium Falcon into months of picking up the pieces of your now-stolen identity.

In this slideshow, AlienVault has identified common phishing traps users should avoid.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.