Phishing is a subset of a social engineering attack that has been wreaking havoc since the ’80s. Phishing can be done in many forms, but the end goal is the same – users are tricked into giving out sensitive information by fraudulent actors who masquerade as being legitimate. Many methods are used by these fraudulent actors to trick their users, and the common ones include spoofing, email links, pop-ups, and even phone calls. The sensitive information they seek includes usernames and passwords, social security numbers, credit cards, and other bank related information. Here are some major phishing scams you should know and various solutions on how to protect yourself against them;
電子郵件網路釣魚詐騙

This is one of the most common and most utilized phishing scams. An email phishing scam involves a malicious actor masquerading as someone important in a company or even some known celebrity who sends a fraudulent email to unsuspecting users. The email usually contains a link to a fake or spoofed website designed in a way that it looks similar to for instance the company website.
This fake website will then ask users to provide sensitive or Personally Identifiable Information (PII). Since it seems real, unsuspecting users will give out the information which might later be used for fraud and identity theft.
保護:
- Do not open spam emails or even click links in emails without scrutiny
- 謹慎檢查鏈接位址,並確保您訪問的網站以HTTPS開頭。
釣魚詐騙
This is another popular phishing scam similar to email phishing, but this involves voice hence the name vishing. This occurs through phone calls in which malicious actors trick unsuspecting users into giving out sensitive information.
保護:
- 在提供 PII 之前,請務必確認該號碼是否合法。大多數公司在其網站上都有他們的號碼。
- 如果呼叫者告訴您撥打另一個號碼,請不要這樣做。
技術支持詐騙
This is some type of vishing in which malicious actors call unsuspecting individuals claiming that they are from a tech/security organization. They then trick the individual into believing that there’s malware in their system and that they will take care of the problem if the individual installs some remote desktop connection software.
如果受害者安裝了該軟體,詐騙者將安裝惡意軟體,然後要求受害者付費刪除惡意軟體。
保護:
- 與釣魚類似,請在接受進一步說明之前確認電話號碼。
- 切勿允許任何人遠端存取您的電腦。
彈出式詐騙
彈出視窗是某種形式的廣告,當您上網時,會出現一個富含圖形的小視窗。它們通常包含指向其他相關內容的連結。
Pop-ups can be dangerous especially when they are malicious. They can be intrusive, refuse to close and in turn open up several webpages. Other pop-ups may display a message warning you that your device is infected and entice you to click it for a free scan. They usually look legitimate, and most people fall for the trap.
保護:
- 安裝廣告攔截器/彈出窗口攔截器。
- 僅允許 來自受信任網站的彈出視窗。
- 切勿點擊彈出視窗。
如果您被騙了,請執行以下操作;
- 更改 所有密碼,
- 聯繫 您的銀行以採取適當的措施;和
- S可以 您的設備用於惡意軟體和病毒。
使用 VPN – IPBurger VPN
Malicious actors may intercept your internet traffic especially on public Wi-Fi and propagate phishing attacks via various methods such as spoofing. To be secure on public Wi-Fi, always use IPBurger VPN. IPBurger VPN uses best in class encryption standard – the AES 256 bit to encrypt your internet traffic and tunnel it through a secure server till it reaches its destination. This encryption ensures your internet traffic is not visible to prying eyes, such scammers.




