Understanding Phishing Scams in Computer Security

Understanding Phishing Scams in Computer Security

 

If there is one the form of security threats that some of us have fallen for, it is phishing scam.

 

Phishing occurs when you receive an email that you thought are from authentic source but such emails are cloned so that users can be deceived into believing what is not At times some have revealed confidential information to hackers not knowing they have fallen for the trick of hackers.

phishing scams in computer security

You should note that social networking sites contain user’s information like email addresses, archived messages among others.

 

The information can be used to customise email messages or take websites designed such that the victim disclose usernames, passwords, credit card numbers among others.

 

Here is an example…

 

Dear Facebook user,

In an effort to make your online experience safer and more enjoyable, Facebook will be implementing a new login system that will affect all Facebook users. These changes will offer new features account security.

 

YOU CAN ALSO READ  Ways of Setting Up Workgroup Name in Mac OS X

Before you are able to use the new login system, you will be required to update your account.

Click here to update your account online account now.

 

If you have any questions, reference our new user guide

 

Thanks,

The Facebook Team.

 

 

If a user clicks on the update button, he/she is redirected to a Facebook look-alike phishing site.

 

Users are then asked to enter a password to complete the update procedure.

 

 

Now your take on this argument.

We would also like to hear what you feel about the topic we discussed today. Your feedback is very important to us. Feel free to drop your comments and recommendations. If you have a contrary opinion, you can drop that too.

You can also join our Facebook Page CRMNigeria for more updates. You can do that by clicking on the link or searching for our page on Facebook.

Click here to Download 5 E-Books that I have taken time to prepare for you.

These E-Books contains formulas that have helped many of my students to nail the PMP Exam. You can also make use of this E-Books. While you are using it if you have questions to ask me concerning the Formulas, feel free to shoot me a mail. I am committed to assisting you to nail your PMP exam. It’s a pledge. You can always count on me as a friend. 

PS: For like seven years since I started blogging I have tried many platforms and tools. Some worked and some of them performed below expectation. Here are some of the tools that I will gladly recommend for you any day, any time.

 

 

BEST AUTO SEO FOR JUST $1

BEST HOSTING AND DOMAIN SERVICE

BEST HOSTING IN NIGERIA (AFFORDABLE)

You can also download our Mobile App here.

Click here to Like our Page on Facebook

Follow us on Twitter

Domain names for just 88 cents!3 Major Roles of PMO in Projects 1
Action Point.
You need to confirm your subscription by clicking on the link sent to you. You can check the spam folder for it. Add us to your mailing list to receive directly from us.

PS: Click on the link below to sign up for my Online E-Course CRM Training. Make sure you confirm your subscription by clicking on the link sent to you. Thanks.

 21 total views,  3 views today

Adeniyi Salau

Adeniyi Salau Scrum Master Certified , CCNA R&S , BeingCert and Scrum Certified Digital Marketing Professional, CEP, MOS, MCP, CSCU (Project 2016), Microsoft Certified Security and Networking Associate is a Google and Beingcert Certified Digital Marketer, Project Manager and SEO Expert of repute with about a decade of Blogging and online marketing experience. He is always ready to share his experience with others.

Write a Comment

Your email address will not be published. Required fields are marked *

CommentLuv badge
%d bloggers like this: