Skip to content
Permalink
master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time
In the last section, we discussed Phishing, what it is, why it occurs
and examined some of the techniques that are used. In this section,
we look at how you can protect yourself against Phishing attacks.
# Avoiding Phishing
This is one area where there are no "rules" to follow. A well
structured phishing attack should look genuine, and as a social
engineering attack there are few "technical" signs that can be picked up.
[Phishing.org](http://www.phishing.org/what-is-phishing) has a nice PDF summarising the common social engineering
techniques found in Phishing emails.
However, there are still a few *rules of thumb* that can be applied to
help spot and avoid Phishing attacks.
## Trust your instincts
It may sound like something the POTUS would say, but this is our first port of call.
Looking for stuff that is different than normal.
- Do you know who is sending the email?
- If so:
- Are they asking anything that is out of character?
- Do you have anything to do with the emails originator? As a rule - if it's from someone you don't know, don't trust it.
- It's unlikely that a web service will appear *out of the blue* and ask you to confirm credentials.
> Always apply some common sense here, think about why that link is
> asking you for your login details, It may be because your session
> has expired. Login on the genuine version (away from any link in a
> message) and try to conform if there is a genuine problem with your account.
## Think before you click
Trying to persuade the target to click on links in emails is the first
stage of a phishing attack. Hover the mouse over a link before you
click, it should show the address the link points to. Does the address
displayed seem legitimate? Are there strange characters, or lots of
subdomains in the link? These are all signs that the email is not
legitimate.
## Use a password manager
Having different passwords for all your online accounts is good
security practice. Keeping track of all these passwords is made simpler
by using a password manager. Then even if one account gets
compromised, your other accounts are safe. The best password is one
that you don't remember.
## Keep firewalls and AV up to date
Firewalls and antivirus systems can help prevent consequences of
installing malware, by either blocking the program from running, or
stopping any external network traffic. Be wary of opening an
attachment that prompts to disable AV or firewall.
# Task
Give Google's Phishing Quiz a go:
https://phishingquiz.withgoogle.com/