Archives - Phishing


Treat everything as public information

A good way to protect yourself is to limit the amount of personal information you post to social networks. This recommendation applies not only to information in your user profile, but also to any comments or photos you post. It is important that you consider information that you post about yourself and about others, particularly […]

Segment iMessages on iOS

On an iOS device with iMessage enabled, it’s possible to filter out any iMessages from senders who aren’t in your Contacts. Simply go to Settings -> Messages and enable “Filter Unknown Senders.” This can reduce the risk of phishing and harassment.

Go beyond built-in security on Windows 10

Windows 10 ships with its own integrated security tools, which do a good job at keeping basic threats at bay. However, adding more protection is prudent. Platforms like Total Defense Ultimate Security provide comprehensive protection from viruses, phishing, ransomware and more.

Unsubscribe from unwanted and possibly dangerous emails

If you’ve signed up for online accounts and services, you likely get plenty of emails, some of them interesting and others not so much. It’s important to unsubscribe from, or block outright, any emails that look like phishing attempts (e.g., asking you to reply with personal information). Most emails from mailing lists have unsubscribe buttons […]

How do you avoid being a phishing victim

Be suspicious of unsolicited phone calls or email messages from individuals asking about personal information. If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Do not use contact information provided on a website connected to the request; instead, check previous statements for contact information.

What is a phishing attack?

Phishing is a form of social engineering. Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization. For example, an attacker may send email seemingly from a reputable credit card company or financial institution that requests account information, often suggesting that there is a problem. When users respond […]