A type of malware that tricks you into opening it by substituting itself for a legitimate program
by Gosafeonline | 28 June 2021 Show
When you learn to spot the signs of phishing, you can better protect yourself and your loved ones against phishing scams. Phishing is a method in which cyber criminals use to fraudulently obtain your personal and financial information such as your login details, bank account numbers and credit card numbers. They often disguise themselves as a legitimate individual or reputable organisation in email, instant messaging and other communication channels. Once cyber criminals obtain your personal information, they could gain access to your online accounts, and even impersonate you to scam the people around you, such as your family, friends and business partners. As cyber criminals come up with increasingly convincing and sophisticated methods of phishing, we must be prepared for what might come our way. To prevent yourself from becoming a victim of phishing scams, learn to spot the signs of phishing. How to Spot the Signs of Phishing Here are six signs to look out for when you encounter a potential phishing scam:
By keeping these six signs in mind and remaining vigilant at all times, you can avoid falling for phishing scams. If you are a victim of a phishing scam, here’s what you can do:
For resources on spotting signs of phishing, click on the links below to download the high-resolution image files. Posters English: Seniors | Adults | Youth Poster for Seniors are also available in Chinese, Malay and Tamil Click on the image to access the high-resolution PDF Videos "How to" spot signs of phishing - English
Marketing
To get more cyber tips, check out the following articles:
What is the type of malware that tricks?A Trojan horse, commonly known as a “Trojan,” is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware.
What are 4 type of malware attacks?The most common types of malware include viruses, keyloggers, worms, trojans, ransomware / crypto-malware, logic bombs, bots/botnets, adware & spyware, and rootkits.
Which type of malware pretends to be a legitimate use but does something malicious?Trojans masquerade as legitimate programs, but they contain malicious instructions. They've been around forever, even longer than computer viruses, but have taken hold of current computers more than any other type of malware. A Trojan must be executed by its victim to do its work.
What are the 3 types of malware attacks?The Most Common Types of Malware Attacks. 1) Adware. Adware serves unwanted or malicious advertising. ... . 2) Fileless Malware. ... . 3) Viruses. ... . 4) Worms. ... . 5) Trojans. ... . 6) Bots. ... . 7) Ransomware. ... . 8) Spyware.. |