HackToHell. Powered by Blogger.

Protecting yourself from phising

1. What is phishing?
  • Phishing is the method of stealing login info(usernames and passwords) by directing the slave to a clone(fake) login page, that logs the login info without the knowledge of the slave.
  • Such clone website is known as a phisher.

    2. How to protect yourself against phishing?
    • Use your login info in the correct places only.
      Don't ever put your login info anywhere else than the page you registered to, unless it's a trusted service you know(such as youtube or blogger asking for your google account's info).
    • Make sure the website you're logging in isn't fake.
      Whenever you login to a website, if you didn't type the URL(address) of the website yourself, i.e. if you clicked a link that led you to the login page(from message, website, search engine results), always check the url(address) to see if you're in the right place.
      For instance, if you're logging in your facebook account, make sure the url appears as http://www.facebook.com/...
      Where a phisher page would look like http://www.facebook.freewebs.com/... or http://www.facebook.spam.com/... or any url whose part before the .com isn't exactly the same as the page you want to login to.
    • Make sure the links you're clicking aren't fake.
      Whenever you're clicking a link, check where the link goes before clicking it. Links can be masked to appear as something else than the page they're leading to. For example, www.google.com leads to yahoo instead of google. Fortunately, in most browsers, whenever you point your mouse cursor over the link, the true location of the link is displayed on the bottom left part of the screen. Try it with the above link.
      This is particularly important because it can protect you from another, rarer but more dangerous method called cookie stealing, which is basically automatically stealing your account if you're previously logged in the website.
    • Know that links to phishing pages are usually spread via email, and often represent impersonating trusted services and persons, such as making the email appear as it's sent from the website you've registered to, or a friend of yours whose account has been compromised.
    3. What to do if you have spotted a phisher?
    Thanks to crow , admin of hf.net for this tutorial
      Share on Google Plus

      About hacktohell

      Love technology.
        Blogger Comment
        Facebook Comment


      Post a Comment