What is a Phishing Attack?

A phishing attack is basically an attack that can be used by a hacker to obtain information about you simply by asking for it. This is a rather simplified definition. What actually happens is that the attacker typically throws bait and waits for you to catch it. If you do, you are hacked. You can infer that this attack is a lot like fishing, hence the name.

The easiest form of such an attack is one that you have probably seen many times in your mailbox. You would receive an email from for example [email protected] saying that Google has noticed that it is time for you to change your password and you are asked to click on a link to go ahead and do so. What happens is that you are redirected to a fake page created by the attacker. This page looks a lot like the original Google page with fields to enter your old and new password. Once you enter your password, the attacker receives it and is able to access your account. This can happen on your e-mail account, Facebook, twitter, or anything else.

In order to be safe and avoid such attacks firstly you must understand that your service providers typically never ask for your confidential information in an e-mail or through a phone call for that matter. Online service providers go through extreme lengths to provide security for your accounts but the easiest way to hack your account is to simply ask you for your password.

EXEO advice against phishing attacks:

  1. Never click on links from untrusted users
  2. In case you receive a link from a trusted user verify it through asking if the link was intentionally sent.
  3. In many cases attackers who compromise an account ask friends for money or phone recharge cards. If you notice such activity on a friend’s account contact them to verify and report it.
Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn

More Posts

Benefits of Password Complexity

We’re sorry, your password must contain an uppercase letter, a number, a metaphor, a graffiti, a hieroglyph and the blood of a witch. Yes, but

Reach out

Re-Architect

This methodology requires the most effort to implement but it results in the most optimised recurring cost and will provide the best scalability for apps. This involves re-adapting the code of applications and the heavy use of SAAS solutions in order to replace existing hosted applications.

Re-Platform

This method utilizes the power of  PAAS services, like transferring a database to an as-a-service model,  the use of containers for some apps or the use of network/security functions as a service. Greater scalability and lower cost of operation is achieved.

Re-Host (Lift & Shift)

the migration of workloads from  to the cloud without changing the architecture. Machines get to keep their  OS and apps. This is the quickest and easy way to migrate, but since its  utilising IAAS, its is also the most expensive on the long term.