Başlıca Kimlik Avı Dolandırıcılıkları ve Bunlara Karşı Kendinizi Nasıl Korursunuz?

Phishing is a subset of a social engineering attack that has been wreaking havoc since the ’80s. Phishing can be done in many forms, but the end goal is the same – users are tricked into giving out sensitive information by fraudulent actors who masquerade as being legitimate. Many methods are used by these fraudulent actors to trick their users, and the common ones include spoofing, email links, pop-ups, and even phone calls. The sensitive information they seek includes usernames and passwords, social security numbers, credit cards, and other bank related information. Here are some major phishing scams you should know and various solutions on how to protect yourself against them;

E-posta kimlik avı dolandırıcılığı

This is one of the most common and most utilized phishing scams. An email phishing scam involves a malicious actor masquerading as someone important in a company or even some known celebrity who sends a fraudulent email to unsuspecting users. The email usually contains a link to a fake or spoofed website designed in a way that it looks similar to for instance the company website.

This fake website will then ask users to provide sensitive or Personally Identifiable Information (PII). Since it seems real, unsuspecting users will give out the information which might later be used for fraud and identity theft.

Koruma:

  • Do not open spam emails or even click links in emails without scrutiny
  • Dikkatli olun ve bağlantı adreslerini inceleyin ve ziyaret ettiğiniz web sitelerinin HTTPS ile başladığından emin olun.

Vishing dolandırıcılığı

This is another popular phishing scam similar to email phishing, but this involves voice hence the name vishing. This occurs through phone calls in which malicious actors trick unsuspecting users into giving out sensitive information.

Koruma:

  • Kişisel bilgilerinizi vermeden önce numaranın yasal olup olmadığını her zaman teyit edin. Çoğu şirketin web sitesinde numaraları bulunmaktadır.
  • Arayan kişi size başka bir numarayı aramanızı söylerse, bunu yapmayın.

Teknik destek dolandırıcılığı

This is some type of vishing in which malicious actors call unsuspecting individuals claiming that they are from a tech/security organization. They then trick the individual into believing that there’s malware in their system and that they will take care of the problem if the individual installs some remote desktop connection software.

Kurban yazılımı yüklerse, dolandırıcılar daha sonra kötü amaçlı yazılım yükleyecek ve ardından kurbandan kötü amaçlı yazılımı kaldırmak için bir ücret isteyecektir.

Koruma:

  • Kimlik avına benzer şekilde, daha fazla talimat kabul etmeden önce telefon numarasını onaylayın.
  • Hiç kimsenin bilgisayarınıza uzaktan erişmesine asla izin vermeyin.

Pop-up dolandırıcılığı

Açılır pencereler, internette gezinirken grafiklerle zenginleştirilmiş küçük bir pencerenin göründüğü bir tür reklamdır. Genellikle diğer ilgili içeriklere bağlantılar içerirler.

Pop-ups can be dangerous especially when they are malicious. They can be intrusive, refuse to close and in turn open up several webpages. Other pop-ups may display a message warning you that your device is infected and entice you to click it for a free scan. They usually look legitimate, and most people fall for the trap.

Koruma:

  • Bir reklam engelleyici/pop up engelleyici yükleyin.
  • Yalnızca güvenilir sitelerden gelen açılır pencerelere izin verin.
  • Pop-up'lara asla tıklamayın.

Dolandırıldıysanız, aşağıdakileri yapın;

  • Tüm şifrelerinizi değiştirin,
  • Uygun önlemleri almak için bankanızla iletişime geçin; ve
  • Cihazınızı kötü amaçlı yazılım ve virüslere karşıtarayın.

VPN kullanın - IPBurger VPN

Malicious actors may intercept your internet traffic especially on public Wi-Fi and propagate phishing attacks via various methods such as spoofing. To be secure on public Wi-Fi, always use IPBurger VPN. IPBurger VPN uses best in class encryption standard – the AES 256 bit to encrypt your internet traffic and tunnel it through a secure server till it reaches its destination. This encryption ensures your internet traffic is not visible to prying eyes, such scammers.

In this Article:
Leave behind the complexities of web scraping.
Opt for IPBurger’s advanced web intelligence solutions to effortlessly collect real-time public data.
Kaydolun

daha da derinlere dalın

Proxyler
AJ Tait
The Best HydraProxy Alternative for Reliability, Speed & Transparency

Why More Users Are Looking for a HydraProxy Alternative At first glance, HydraProxy seems like a solid choice. It’s affordable.It offers rotating and static residential proxies.And it gives users flexibility with pay-as-you-go pricing. For casual users? That’s enough. But for data scrapers, sneaker coppers, SEO specialists, and automation users who

Proxyler
AJ Tait
The Best Storm Proxies Alternative: Faster, Safer & More Affordable Proxies

Looking for a Storm Proxies Alternative? Storm Proxies sells the dream: simple, affordable proxies that “just work.” And for some users? It kind of delivers. Until it doesn’t. Because here’s the reality—if you’re pulling small data sets, running light scraping jobs, or dipping your toes into sneaker copping, Storm Proxies

Scale Your Business
With The Most Advanced
Proxies On Earth
1 Numaralı Ödüllü Proxy Ağına Katılın