• About Us
    • Contact Us
    • Write for US
  • Terms
    • Newsletter
    • Affiliate Link Policy
    • DMCA
  • Privacy
  • Forums
    • African History
    • African Walk of Fame
  • Nyosake Ltd
    • Car Head
    • Business Today
    • Android News
    • Afrobays
    • The Sun
    • NS Sports
    • PodCast
    • Gadget
    • Travel
    • Play IT
    • Invest News
    • Start A Blog Easily Here
  • Advertise
Monday, August 8, 2022
Ask Anything
  • News
    • Africa
      • Uganda
      • East African Community
    • African Inventions
    • African History
    • Qatar
    • Quotes
    • Politics
    • Counties
      • Mega Projects in Kenya
    • National
    • Health
    • Family
  • How To
    • Made In Africa
    • Education
    • Facts
    • Science
  • Business
    • Sponsored
    • Manufacturing
    • Real Estate
    • Forex
    • World Billionaires
    • Finance
    • Wealth
    • Bank Swift Codes
    • Affiliate
    • PayPal
    • Cryptocurrency
    • Advertisement
  • Apple
    • iPad
    • Artists
    • iPhone
    • Apple Watch
    • Mac Specs
    • Apple TV
  • Windows
    • Windows 10
    • Surface
    • PC Components
    • Laptops
    • ChromeBooks
  • Tech
    • Tech Terms
    • Phones
    • Phone Rumors
    • Android News
    • Top Deals
    • Gadget Reviews
    • Gift Guides
    • VPN
  • Autos
    • Car Showrooms
    • Electric Vehicle
    • Petrol Stations
    • Car News
    • Latest Cars
    • Auto Sport
    • Car Facts
  • Top 100
    • Business Directory
  • Sports
    • Soccer LiveScores
    • Basketball Scores
    • WRC Safari Rally
  • Entertainment
    • Celebrities
    • Lyrics
    • Theaters
    • Artists
    • Biography
  • HSE
    • Hazards
    • NEBOSH
    • IOSH
    • Construction Safety
    • General Industry
    • Oil & Gas Safety
    • All Safety Courses
  • Forums
    • Ask Anything
No Result
View All Result
  • News
    • Africa
      • Uganda
      • East African Community
    • African Inventions
    • African History
    • Qatar
    • Quotes
    • Politics
    • Counties
      • Mega Projects in Kenya
    • National
    • Health
    • Family
  • How To
    • Made In Africa
    • Education
    • Facts
    • Science
  • Business
    • Sponsored
    • Manufacturing
    • Real Estate
    • Forex
    • World Billionaires
    • Finance
    • Wealth
    • Bank Swift Codes
    • Affiliate
    • PayPal
    • Cryptocurrency
    • Advertisement
  • Apple
    • iPad
    • Artists
    • iPhone
    • Apple Watch
    • Mac Specs
    • Apple TV
  • Windows
    • Windows 10
    • Surface
    • PC Components
    • Laptops
    • ChromeBooks
  • Tech
    • Tech Terms
    • Phones
    • Phone Rumors
    • Android News
    • Top Deals
    • Gadget Reviews
    • Gift Guides
    • VPN
  • Autos
    • Car Showrooms
    • Electric Vehicle
    • Petrol Stations
    • Car News
    • Latest Cars
    • Auto Sport
    • Car Facts
  • Top 100
    • Business Directory
  • Sports
    • Soccer LiveScores
    • Basketball Scores
    • WRC Safari Rally
  • Entertainment
    • Celebrities
    • Lyrics
    • Theaters
    • Artists
    • Biography
  • HSE
    • Hazards
    • NEBOSH
    • IOSH
    • Construction Safety
    • General Industry
    • Oil & Gas Safety
    • All Safety Courses
  • Forums
    • Ask Anything
No Result
View All Result
No Result
View All Result

Protect yourself from phishing

July 26, 2022
in Webmaster
Reading Time: 7 mins read
A A
ShareTweetShareShareScanEmail
ADVERTISEMENT
Advertisements
ADVERTISEMENT

Phishing (pronounced: fishing) is an attack that attempts to steal your money, or your identity, by getting you to reveal personal information — such as credit card numbers, bank information, or passwords — on websites that pretend to be legitimate. Cybercriminals typically pretend to be reputable companies, friends, or acquaintances in a fake message, which contains a link to a phishing website.

Phishing is a way crooks try to bait you
into giving up your personal
or financial information.
When you see an email
that seems a little fishy,
you can sniff it out.
Let's look at some of the
common features of phishing.
There's a sense of urgency
something is gonna be canceled,
money is due, or maybe there's a reward,
and it's imperative
that you act right now!
Although it may say it's
from a company you know,
look carefully.
(buzz)
That email address certainly
doesn't look right.
There's a lot of bad email out there now.
Major email providers filter
and block dozens a day
before they reach your inbox.
But still, some get through.

That's one reason phishing emails
may look sloppy with bad
grammar or strange formatting.
They're trying to get through the filters.

Some phishing emails will
include an attachment.
Never open attachments
you weren't expecting,
even if they appear to be from
somebody you know and trust.
If you receive a surprise
attachment, reach out to them.
Confirm the attachment is
legitimate before you open it.
The same is true for links in email.
If you mouse over one, you can
see where the link is going.
That looks fishy!

Instead of clicking the email link,
it's safer to go to the company homepage
through your browser.
So, what should you do?
Reporting it will help block
other attacks like this,
and should move the
email out of your inbox.
If not, you know what to do!

Delete it.

For more, go to
http://www.support.microsoft.com/security.
(chill music)

Learn to spot a phishing message

Phishing is a popular form of cybercrime because of how effective it is. Cybercriminals have been successful using emails, text messages, direct messages on social media or in video games, to get people to respond with their personal information. The best defense is awareness and knowing what to look for.

Here are some ways to recognize a phishing email:

  • Urgent call to action or threats – Be suspicious of emails that claim you must click, call, or open an attachment immediately. Often, they’ll claim you have to act now to claim a reward or avoid a penalty. Creating a false sense of urgency is a common trick of phishing attacks and scams. They do that so that you won’t think about it too much or consult with a trusted advisor who may warn you.

    Tip: Whenever you see a message calling for immediate action take a moment, pause, and look carefully at the message. Are you sure it’s real? Slow down and be safe.

  • First time or infrequent senders – While it’s not unusual to receive an email from someone for the first time, especially if they are outside your organization, this can be a sign of phishing. When you get an email from somebody you don’t recognize, or that Outlook identifies as a new sender, take a moment to examine it extra carefully before you proceed.
  • Spelling and bad grammar – Professional companies and organizations usually have an editorial staff to ensure customers get high-quality, professional content. If an email message has obvious spelling or grammatical errors, it might be a scam. These errors are sometimes the result of awkward translation from a foreign language, and sometimes they’re deliberate in an attempt to evade filters that try to block these attacks.
  • Generic greetings – An organization that works with you should know your name and these days it’s easy to personalize an email. If the email starts with a generic “Dear sir or madam” that’s a warning sign that it might not really be your bank or shopping site.
  • Mismatched email domains – If the email claims to be from a reputable company, like Microsoft or your bank, but the email is being sent from another email domain like Gmail.com, or microsoftsupport.ru it’s probably a scam. Also be watchful for very subtle misspellings of the legitimate domain name. Like micros0ft.com where the second “o” has been replaced by a 0, or rnicrosoft.com, where the “m” has been replaced by an “r” and a “n”. These are common tricks of scammers.
  • Suspicious links or unexpected attachments – If you suspect that an email message is a scam, don’t open any links or attachments that you see. Instead, hover your mouse over, but don’t click, the link to see if the address matches the link that was typed in the message. In the following example, resting the mouse over the link reveals the real web address in the box with the yellow background. Note that the string of numbers looks nothing like the company’s web address.

 

ADVERTISEMENT

Tip: On Android long-press the link to get a properties page that will reveal the true destination of the link. On iOS do what Apple calls a “Light, long-press”.

Cybercriminals can also tempt you to visit fake websites with other methods, such as text messages or phone calls. Sophisticated cybercriminals set up call centers to automatically dial or text numbers for potential targets. These messages will often include prompts to get you to enter a PIN number or some other type of personal information.

For more information see How to spot a “fake order” scam.

Are you an administrator or IT pro?

If you have a Microsoft 365 subscription with Advanced Threat Protection you can enable ATP Anti-phishing to help protect your users. Learn more

If you receive a phishing email

  • Never click any links or attachments in suspicious emails. If you receive a suspicious message from an organization and worry the message could be legitimate, go to your web browser and open a new tab. Then go to the organization’s website from your own saved favorite, or via a web search. Or call the organization using a phone number listed on the back of a membership card, printed on a bill or statement, or that you find on the organization’s official website.
  • If the suspicious message appears to come from a person you know, contact that person via some other means such as text message or phone call to confirm it.
  • Report the message (see below).
  • Delete it.

How to report a phishing scam

  • Microsoft Office Outlook – With the suspicious message selected, choose Report message from the ribbon, and then select Phishing. This is the fastest way to report it and remove the message from your Inbox, and it will help us improve our filters so that you see fewer of these messages in the future. For more information see Use the Report Message add-in.
  • Outlook.com – Select the check box next to the suspicious message in your Outlook.com inbox. Select the arrow next to Junk, and then select Phishing.

Note: If you’re using an email client other than Outlook, start a new email to phish@office365.microsoft.com and include the phishing email as an attachment. Please don’t forward the suspicious email; we need to receive it as an attachment so we can examine the headers on the message.

If you’re on a suspicious website:

While you’re on a suspicious site in Microsoft Edge, select the Settings and More (…) icon towards the top right corner of the window, then Help and feedback > Report unsafe site.  Or click here.

Tip: ALT+F will open the Settings and More menu.

For more information see Securely browse the web in Microsoft Edge.

What to do if you think you’ve been successfully phished

If you’re suspicious that you may have inadvertently fallen for a phishing attack there are a few things you should do.

  1. While it’s fresh in your mind write down as many details of the attack as you can recall. In particular try to note any information such as usernames, account numbers, or passwords you may have shared.
  2. Immediately change the passwords on those affected accounts, and anywhere else that you might use the same password. While you’re changing passwords you should create unique passwords for each account, and you might want to see Create and use strong passwords.
  3. Confirm that you have multifactor authentication (also known as two-step verification) turned on for every account you can. See What is: Multifactor authentication
  4. If this attack affects your work or school accounts you should notify the IT support folks at your work or school of the possible attack. If you shared information about your credit cards or bank accounts you may want to contact those companies as well to alert them to possible fraud.
  5. If you’ve lost money, or been the victim of identity theft, report it to local law enforcement. The details in step 1 will be very helpful to them.
ADVERTISEMENT
Was this article helpful?
YesNo
ShareTweetSendShareScanSend
Previous Post

Ciala Resort Hotels In Kisumu

Next Post

List of Best Windows Apps for Internet

Related Posts

Bluehost Affiliate Program Review

List of Best managed DNS providers

23 hours ago
Bluehost Affiliate Program Review

What is a DNS management software?

23 hours ago
Next Post
How to Repair Corrupted BIOS Firmware

List of Best Windows Apps for Internet

JATU PLC

JATU PLC

Search NyongesaSande.com


Follow Nyongesa Sande


Follow @nyongesasande

Subscribe to Nyongesa Sande

Editorial policy

Permission to use quotations from any article is granted subject to appropriate credit of the source being given by referencing the direct link of the article on Nyongesa Sande. However, reproducing any content on this site without explicit permission is strictly prohibited.

  Twitter   Instagram     Youtube  Facebook 
Make sure to check out our social media to keep track of the latest content.
Disclaimer: We aim to present the most accurate information possible. Through this website, you might link to other websites which are not under our control. We have no control over the nature, content and availability of those websites. Inclusion of any links does not necessarily imply a recommendation or endorsement of the views expressed within them. All content on this website is copyright to the website’s owner and all rights are reserved. We take no responsibility for, and will not be liable for, the website being temporarily unavailable due to technical issues beyond our control.
 
ADVERTISEMENT
Facebook Twitter Instagram Pinterest LinkedIn Youtube RSS

Categories

About Us

Nyongesa Sande is a site that brings you a daily dose of well-articulated up to date facts, news, opinions, and important updates from Kenya, Africa, and around the World.

© 2022 Nyongesa Sande - So Much More To Read Now. A Nyosake Investment Inc.

No Result
View All Result
  • News
    • Africa
      • Uganda
      • East African Community
    • African Inventions
    • African History
    • Qatar
    • Quotes
    • Politics
    • Counties
      • Mega Projects in Kenya
    • National
    • Health
    • Family
  • How To
    • Made In Africa
    • Education
    • Facts
    • Science
  • Business
    • Sponsored
    • Manufacturing
    • Real Estate
    • Forex
    • World Billionaires
    • Finance
    • Wealth
    • Bank Swift Codes
    • Affiliate
    • PayPal
    • Cryptocurrency
    • Advertisement
  • Apple
    • iPad
    • Artists
    • iPhone
    • Apple Watch
    • Mac Specs
    • Apple TV
  • Windows
    • Windows 10
    • Surface
    • PC Components
    • Laptops
    • ChromeBooks
  • Tech
    • Tech Terms
    • Phones
    • Phone Rumors
    • Android News
    • Top Deals
    • Gadget Reviews
    • Gift Guides
    • VPN
  • Autos
    • Car Showrooms
    • Electric Vehicle
    • Petrol Stations
    • Car News
    • Latest Cars
    • Auto Sport
    • Car Facts
  • Top 100
    • Business Directory
  • Sports
    • Soccer LiveScores
    • Basketball Scores
    • WRC Safari Rally
  • Entertainment
    • Celebrities
    • Lyrics
    • Theaters
    • Artists
    • Biography
  • HSE
    • Hazards
    • NEBOSH
    • IOSH
    • Construction Safety
    • General Industry
    • Oil & Gas Safety
    • All Safety Courses
  • Forums
    • Ask Anything

© 2022 Nyongesa Sande - So Much More To Read Now. A Nyosake Investment Inc.