{"id":18705,"date":"2018-06-11T08:00:35","date_gmt":"2018-06-11T12:00:35","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=18705"},"modified":"2022-04-27T15:06:36","modified_gmt":"2022-04-27T19:06:36","slug":"tabnabbing-attacks-while-your-back-is-turned","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/tabnabbing-attacks-while-your-back-is-turned\/","title":{"rendered":"Tabnabbing Attacks While Your Back is Turned"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Phishing attacks have always been based on the principles of trust and deception; hackers find a way to manipulate you into giving up your private data. With these types of scams on the rise, many consumers have started following tips to prevent themselves from falling victim &#8211; <\/span><a href=\"https:\/\/www.psafe.com\/en\/blog\/the-anatomy-of-a-url\/\"><span style=\"font-weight: 400;\">carefully checking website URLs <\/span><\/a><span style=\"font-weight: 400;\">for their validity, double checking information requests, and avoiding any links that may lead to malicious content. However, a new type of attack, called tabnabbing has arrived and it waits until your back is turned to steal your sensitive information.<\/span><\/p>\n<p><b>How Tabnapping Attempts to Trick You<br \/>\n<\/b><span style=\"font-weight: 400;\">This is <\/span><a href=\"https:\/\/970wfla.iheart.com\/content\/2018-04-18-phishing-scam-takes-over-browser-shows-fake-login\/\"><span style=\"font-weight: 400;\">how tabnabbing works<\/span><\/a><span style=\"font-weight: 400;\">. Say you stumble onto a website &#8211; maybe you found an interesting web article, clicked on a link sent by a friend, or are researching a specific topic. Often when we\u2019re busy, opening several tabs to save a page or blog post to read later is normal multitasking, but this is where tabnabbers get you. When you open a new tab to work on something else, the malicious page begins to transform in the background while you\u2019re occupied and not looking.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/phishing-attacks-can-stealthier-think\/\"><b>Phishing Attacks Can Be Stealthier Than You Think<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">The bogus website\u2019s icon, known as a favicon, suddenly changes to something else like the Google logo, with the entire webpage following suit. When you tab back to where you were before, you\u2019re presented with a fake Google account login box. You quickly assume that you were automatically logged out of something and enter your credentials, but what you don\u2019t realize is you just fell for a dubious phishing attack. And now a hacker has your login information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tabnabbing are targeted attacks &#8212; hackers scour for vulnerabilities in HTML script, image loads, and various web browsers. Methods like this allow hackers to detect which site a user is visiting, or what sites a user visits regularly. For example, if you use Facebook daily, a hacker could simply switch out a tab to the Facebook login screen and ensnare you to enter personal details.<\/span><\/p>\n<p><b>There is Hope for Protection<br \/>\n<\/b><span style=\"font-weight: 400;\">Keep following necessary security standards such as always checking the website URL, not only once it loads, but whenever you&#8217;re being prompted for a password or other personal information. Implementing <\/span><a href=\"https:\/\/www.cnet.com\/news\/two-factor-authentication-what-you-need-to-know-faq\/\"><span style=\"font-weight: 400;\">two-factor authentication<\/span><\/a><span style=\"font-weight: 400;\"> can also make it more difficult for hackers to access your account even if they\u2019ve managed to get a hold of your password.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Finally, always have an antivirus software installed on all your devices, both computer, and smartphone. <\/span><a href=\"https:\/\/app.appsflyer.com\/com.psafe.msuite?pid=MKT_BLOG_US&amp;c=tabnabbing_attacks\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">dfndr security<\/span><\/a><span style=\"font-weight: 400;\"> is a well-rated app for Android devices and offers advanced technology based on AI machine learning. There is a full virus scan feature that scans your device from top to bottom and detects malware or viruses, and the anti-hacking feature blocks any malicious links before you even click on them. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The big lesson here? Your data is at risk, but the good news is you don\u2019t have to go it alone.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new phishing attack is potentially one of the most terrifying attacks yet. Find out more.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[30,259,218,358,249],"class_list":["post-18705","post","type-post","status-publish","format-standard","hentry","category-security","tag-android","tag-hackers","tag-privacy","tag-protection","tag-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=18705"}],"version-history":[{"count":3,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18705\/revisions"}],"predecessor-version":[{"id":18767,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18705\/revisions\/18767"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=18705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=18705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=18705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}