Phishing and Malware

| 2 minutes

This SOP will explain the following points:

  • What is Phishing and Malware?
  • How Phishing and Malware Attack Occurs?
  • What is Phishing and Malware Kit?
  • Phishing and Malware Attack Example.
  • Social Media Email Subjects Chart.
  • Security Measures We Should Adopt To Prevent Phishing And Malware Attacks.
  • Spot Suspicious Activities.

What is Phishing and Malware?

Phishing is a type of social engineering attack used to steal data, login credentials and credit card numbers, etc.

How Phishing and Malware Attack Occurs?

The phishing malware attack occurs when an attacker pretends to be a trusted entity of some kind, deceives a victim into opening an email, instant message, link, and signing up.

What is Phishing and Malware Kit?

Phishing and Malware Attack Example

Social Media Email Subjects Chart

This is the most updated chart of email subjects you might end getting in your inbox.

Security Measures We Should Adopt To Prevent Phishing And Malware Attacks

1. Be careful with emails and surfing the sites
Opening suspicious emails, clicking on links, downloading apps or files can easily cause malware attacks. Be careful with the sources you find online and the ones you receive. Take every warning box very seriously.
The more sophisticated phishing emails that mimic user associates and trusted businesses have become common, so be very careful with anything that looks or sounds suspicious.
2. Establish strong passwords
Users must put together a strong combination of capital letters, lower-case letters, numbers, and symbols to create a strong password.
The more characters you put, the better.
Don't use the same password for more than one site.
3. Ignore spam folder
Ignore the spam folder as much as you can.
Email spam filters have gotten pretty good at catching the most conspicuous spam. Beware of email messages from unknown parties, and never click on links or open attachments that accompany them.
4. Check URLs before log in
Check links before login into websites like FaceBook, Instagram, etc.
Please be extra careful with it.
Do not connect your Gmail account or log in before checking the link.
5. Shut it down
Always keeping the computer on makes the computer a more visible and available target for hackers; shutting down breaks the connection a hacker may have established with the network.
6. Clear your browsing history
Clear the browsing history quite often including cookies and cached files to give hackers as little information as possible to work with.

Spot Suspicious Activities

With all the precautions, please also keep an eye for the following signs on your computer.

  • New apps or programs suddenly appear.
  • Strange pop-ups during startup, normal operation, or before shutdown
  • The device slows down
  • New extensions or tabs in the browser
  • Loss of control of the mouse or keyboard

Please report suspicious signs immediately. Even if it turns out to be a false alarm, it is still beneficial in clearing up errors in the device.

Did this article help you?
 0
 0