What is Phishing?
What is the fourth risk of phishing?
Fake social media posts made in your accounts
What is the second risk of phishing?
Fraudulent charges on credit cards
What is phishing?
Is a cyber attack that try's to steal your login information or install viruses to steal your personal information
What is the third risk of phishing?
Lost access to photos, videos, and files
Finally, what is phishing?!
Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source.
What can happen if you click on a phishing email link or attachment?
The email sender could gain access to company systems. The email sender could steal your personal information or company information. The email sender could distribute malware into the company network. illegal purchases or commit fraud.
What are common phishing scams?
There is many ways you can get scammed but unknown sender, sense of urgency, unexpected attachment, or too good to be true are the most common phishing scams
traditional strategies
Traditionally strategies give few visual clues in order to judge if the website is credible or not
True or False sponsored content is sources that publish articles that are sponsored and requires you to be alert and awake
True!
True or False websites use strategies to make the website look more trustworthy to trick people in giving information
True!
True or False Traditionally strategies give few visual clues in order to judge if the website is credible or not
True!
How can you detect phishing?
You can detect phishing in many ways. Emails, webpages, weird links, or try to look for misspellings because phishing try to trick you with misspellings or look-alike URLs
Vocabulary Website cleanliness
another strategy to look at a website design as a whole but some credible sources contain less visual clues.
Vocabulary!!! What is the definition of credibility
credibility is being trusted and believed
There are 5 risk to phishing. What is the first risk?
personal money being stolen from your bank account
How can a person executing a phishing attack steal someone's identity?
phishers use the information entered in the website to make illegal purchases or commit fraud.
sponsored content
sponsored content is sources that publish articles that are sponsored and requires you to be alert and awake
Website domains
website domains are like .org, .net, .edu, or .com are all website domains , but website domains like .gov or . edu are most trustworthy
Conflict of interest
when authors goals influence their ability to present fairly and honest.
What is the fifth risk of phishing
Cybercriminals impersonating you to a friend or family member, putting them at risk