{"id":12045,"date":"2017-06-23T12:00:41","date_gmt":"2017-06-23T17:00:41","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=12045"},"modified":"2017-10-19T15:32:49","modified_gmt":"2017-10-19T20:32:49","slug":"phishing-attacks-can-stealthier-think","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/phishing-attacks-can-stealthier-think\/","title":{"rendered":"Phishing Attacks Can Be Stealthier Than You Think"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The consequences of a phishing attack can be devastating: both on an individual and business level, it can result in being barred from your account, financial losses, and even identity theft. Chances are when you think of a phishing scam, you think of an email full of typos or a website with a long and erratic URL. But nowadays a phishing attack\u2014any attempt to lure you to a fake version of a real website to get you to give away your information\u2014can be well disguised, fooling even the most informed person. To best protect yourself from phishing scams, use the Anti-Hacking feature to thwart any attempts.<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/safe_navigation\" rel=\"attachment wp-att-11173\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11173\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/05\/Deeplink_Activate-Anti-Hacking.png\" alt=\"Deeplink_Activate-Anti-Hacking\" width=\"392\" height=\"79\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/05\/Deeplink_Activate-Anti-Hacking.png 392w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/05\/Deeplink_Activate-Anti-Hacking-300x60.png 300w\" sizes=\"auto, (max-width: 392px) 100vw, 392px\" \/><\/a><\/center><span style=\"font-weight: 400;\"><br \/>\nWith Anti-Hacking, you will receive warnings of dangerous sites and have your passwords protected. By reading through the following sophisticated types of phishing, you can better understand why you should be vigilant about protecting against them.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/5-things-can-prevent-phishing-scams-work\/\"><b>5 Things You Can Do To Prevent Phishing Scams At Work<\/b><\/a><\/p>\n<p><b>Deceptive Phishing<br \/>\n<\/b>This is probably the most common type of phishing. It employs an email with urgent language that prompts you to enter your credentials to be safe from a non-existent threat. Even though the clearest indicator is strange wording or grammar and spelling errors, such an email can redirect you to a website with a URL that\u2019s only a little different from the website it\u2019s pretending to be. Be extra careful, then, with any non-direct way of accessing a website.<\/p>\n<p><b>Spear Phishing<br \/>\n<\/b>Even more deceptive, spear phishing uses the same strategy except it personalizes the message, and attackers customize the email to include your name, position, company, etc. It\u2019s important to be familiar with how this type of phishing looks, but investing in an antivirus software, such as the Anti-Hacking feature of DFNDR, recognizes malicious links and ensures total safety.<\/p>\n<p><b>Pharming<br \/>\n<\/b>Pharming is another type of phishing that can easily go undetected. In this case, an attacker skips the baiting email and simply redirects alphabetical website names to a malicious link using a method called domain naming system (DNS) cache poisoning. This can occur even if you\u2019ve entered in the correct website URL.<\/p>\n<p><b>SMS Phishing<br \/>\n<\/b>Phishing doesn\u2019t only happen in the domain of emails and incorrect URLs. Attackers can now target people via SMS by sending a fake text message from your cellular provider, or another mobile service you use, that prompts you to give your login information. They then lead you to a fake verification process that first might ask for your phone number and zip code, and then email login, and later bank information. What\u2019s sneaky about this method is that even if you don\u2019t go through with the entire phish, they can gain your personal information in increments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s hard to believe that it could happen to you until it does. Protect yourself against phishing scams by educating yourself on the different types.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[301,303,308,312,4457],"class_list":["post-12045","post","type-post","status-publish","format-standard","hentry","category-security","tag-app2","tag-app3","tag-app6","tag-app8","tag-phishing-attacks"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12045","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=12045"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12045\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=12045"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=12045"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=12045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}