Alongside technological advancements, cyber crimes have escalated. The following post will give you a glimpse of some ways Cybercriminals take advantage of our digital identity.
In Phishing, the attacker sends an email posing as a trusted source and manipulates them into handing over sensitive data. The email entices the user to click on a URL that takes them to a fake login page, where they enter their credentials for the attacker or download a malicious attachment that installs malware such as keyloggers, ransomware, etc.
In SMiShing, the attacker encourages their target to open a URL in a text. The URL then takes them to a fraudulent credential logging page or installs malware onto the user’s device.
In a vishing attack, the bad actor calls their target and create a sense of urgency or impersonate someone with authority to manipulate users into sharing credential or financial information.
Look out for phishing indicators before you respond to unsolicited emails or messages or calls.