<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Phishing Archives - CIATEC</title>
	<atom:link href="https://www.ciatec.com/tag/phishing/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ciatec.com/tag/phishing/</link>
	<description>Information Security &#124; Information Technology &#124; Information Assurance &#124; Digital Strategy</description>
	<lastBuildDate>Sat, 24 Mar 2018 07:02:25 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.ciatec.com/wp-content/uploads/2018/02/cropped-Ciatec-Icon-32x32.png</url>
	<title>Phishing Archives - CIATEC</title>
	<link>https://www.ciatec.com/tag/phishing/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Phishing Techniques</title>
		<link>https://www.ciatec.com/2018/02/phishing-techniques/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 17 Feb 2018 11:33:33 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Phishing]]></category>
		<guid isPermaLink="false">https://www.cia-tec.com/?p=1108</guid>

					<description><![CDATA[<p>Using the guide below, organizations will be able to more quickly spot some of the most common types of phishing techniques and attacks that phishers use to trap a victim to own his credentials, bank accounts, social networking accounts or emails etc. With that in mind, it’s imperative that organizations conduct security awareness training on &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2018/02/phishing-techniques/">Phishing Techniques</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;"><span style="color: #000000;">Using the guide below, organizations will be able to more quickly spot some of the most common types of phishing techniques and attacks that phishers use to trap a victim to own his credentials, bank accounts, social networking accounts or emails etc.</span></p>
<p style="text-align: justify;"><span style="color: #000000;">With that in mind, it’s imperative that organizations conduct security awareness training on an ongoing basis so that their employees and executives stay on top of emerging phishing attacks (For more information, read <strong><a style="color: #000000;" href="https://www.cia-tec.com/2018/02/14/the-dangers-of-phishing/">How to Identify a Phishing or Spoofing Email</a>)</strong>.</span></p>
<h3 style="text-align: justify;"><span style="color: #000000;"><strong>Spear phishing</strong></span></h3>
<p style="text-align: justify;"><span style="color: #000000;">A unique form of phishing in which the message is made to look as if it came from someone you know and trust as opposed to an informal third party.</span><br />
<span style="color: #000000;"> Spear phishing works better than phishing because it uses information that it can find about you from email databases, friends’ lists, and the like.</span></p>
<h3 style="text-align: justify;"><span style="color: #000000;"><strong>Whaling </strong></span></h3>
<p style="text-align: justify;"><span style="color: #000000;">It is nothing more than phishing or spear phishing but for big users. Instead of sending out a To Whom It May Concern message to thousands of users, the whaler identifies one person from whom they can gain all the data they want—usually a manager or owner—and targets the phishing campaign at them.</span></p>
<h3 style="text-align: justify;"><span style="color: #000000;"><strong>Vishing</strong></span></h3>
<p style="text-align: justify;"><span style="color: #000000;">When you combine phishing with Voice over IP (VoIP), it becomes known as vishing, an elevated form of social engineering. Although crank calls have been in existence since the invention of the telephone, the rise in VoIP now makes it possible for someone to call you from almost anywhere in the world, without worrying about tracing, caller ID, and other land line–related features. They then pretend to be someone they are not in order to get data from you.</span></p>
<h3 style="text-align: justify;"><span style="color: #000000;"><strong>Session hijacking</strong></span></h3>
<p style="text-align: justify;"><span style="color: #000000;">In session hijacking, the phisher exploits the web session control mechanism to steal information from the user. Phishers place themselves between the user and host, thereby letting them monitor user traffic and launch specific attacks.</span></p>
<h3 style="text-align: justify;"><span style="color: #000000;"><strong>Keylogger </strong></span></h3>
<p style="text-align: justify;"><span style="color: #000000;">Another way of extracting information from a victim’s system is to use a piece of technology known as keylogger. Software in this category is designed to capture and report activity in the form of keyboard usage on a target system. When placed on a system, it gives the phisher the ability to monitor all activity on a system and reports back to the phisher.</span></p>
<h3 style="text-align: justify;"><span style="color: #000000;"><strong>Malvertising </strong></span></h3>
<p style="text-align: justify;"><span style="color: #000000;">Malvertising, or malicious advertising, is the use of online, malicious advertisements to spread malware and compromise systems. Generally this occurs through the injection of unwanted or malicious code into ads.</span></p>
<h3 style="text-align: justify;"><span style="color: #000000;"><strong>Smishing</strong></span></h3>
<p style="text-align: justify;"><span style="color: #000000;">A form of phishing, smishing is when the phisher tries to trick you into giving them your private information via a text or SMS message. Smishing is becoming an emerging and growing threat in the world of online security.</span></p>
<h3 style="text-align: justify;"><span style="color: #000000;"><strong>Content Injection</strong></span></h3>
<p style="text-align: justify;"><span style="color: #000000;">The content-injection social network phishing refers to inserting malicious content in social networks. The malicious content can often be in the form of bogus posts (e.g., tweets, posts in the Facebook feed or in LinkedIn feed) published by users whose accounts were affected with rogue apps. When the victim clicks on the link, he/she will be requested to provide his/her personal data, which may be used by the phisher for committing identity theft and other scams.</span></p>
<h3><span style="color: #000000;"><strong>Link manipulation</strong></span></h3>
<p style="text-align: justify;"><span style="color: #000000;">Link manipulation is the technique in which the phisher sends a link to a malicious website. When the user clicks on the deceptive link, it opens up the phisher’s website instead of the website mentioned in the link.</span></p>
<h3 style="text-align: justify;"><span style="color: #000000;"><strong>Phishing through Search Engines</strong></span></h3>
<p style="text-align: justify;"><span style="color: #000000;">Search engine phishing occurs through online website search engines. Here, the person may encounter offers or messages that entice the person to visit the website. The search process may be legitimate, but the website is actually fake and only exists to steal the person’s personal information.</span></p>
<h3 style="text-align: justify;"><span style="color: #000000;"><strong>Web Based Delivery</strong></span></h3>
<p style="text-align: justify;"><span style="color: #000000;">Also known as “Man-in-the-middle “. Which is based on the principle that a system can be placed between two legitimate users to capture or exploit the information being sent between them. Both sides of the conversation assume that the man in the middle is the other end and communicate normally. This creates a security breach and allows the phisher to trace details during a transaction between the legitimate website and the user.</span></p>
<h3 style="text-align: justify;"><span style="color: #000000;"><strong>Malware-Based Phishing</strong></span></h3>
<p style="text-align: justify;"><span style="color: #000000;">Refers to scams that involve running malicious software on users&#8217; PCs. Malware can be introduced as an email attachment, as a downloadable file from a web site, or by exploiting known security vulnerabilities</span></p>
<h3 style="text-align: justify;"><span style="color: #000000;"><strong>System Reconfiguration Attacks</strong></span></h3>
<p style="text-align: justify;"><span style="color: #000000;">Modify settings on a user&#8217;s PC for malicious purposes. For example: URLs in a favorites file might be modified to direct users to look alike websites where their information can be stolen..</span></p>
<h3 style="text-align: justify;"><span style="color: #000000;"><strong>Hosts File Poisoning</strong></span></h3>
<p style="text-align: justify;"><span style="color: #000000;">Hosts file poisoning involves injecting new entries for Internet sites into a computer’s hosts file, so that web site requests are either rerouted to another site, taking the user unwittingly to a fake &#8220;look alike&#8221; website where their information can be stolen.</span></p>
<h3 style="text-align: justify;"><span style="color: #000000;"><strong>Impersonation </strong></span></h3>
<p style="text-align: justify;"><span style="color: #000000;">Impersonation involves any act of pretending to be someone you are not. Impersonation can be done over the phone, by email, and so forth.</span></p>
<h3 style="text-align: justify;"><span style="color: #000000;"><strong>Trojan</strong></span></h3>
<p style="text-align: justify;"><span style="color: #000000;">A Trojan horse may be included as an attachment, try to log into your user account to collect credentials through the local machine. The acquired information is then transmitted to phishers.</span></p>
<h3 style="text-align: justify;"><span style="color: #000000;"><strong>Ransomware</strong></span></h3>
<p style="text-align: justify;"><span style="color: #000000;">Phishing ransomware attacks begin with what seems to look like a legitimate email, asking the recipient to open a file or click on a link. Once the attachment or link has been opened, the phisher then gains access to the device’s data and can distribute the malicious payload, asking the recipient end to pay a ransom in exchange for the return of stolen data or personal information.</span></p>
<p>The post <a href="https://www.ciatec.com/2018/02/phishing-techniques/">Phishing Techniques</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A must-do steps to recover from a phishing scam</title>
		<link>https://www.ciatec.com/2018/02/must-do-steps-to-recover-from-a-phishing-scam/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Thu, 15 Feb 2018 10:24:22 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Phishing]]></category>
		<guid isPermaLink="false">https://www.cia-tec.com/?p=1085</guid>

					<description><![CDATA[<p>How to recover from a phishing scam? Unfortunately, phishing messages are becoming harder and harder to identify (For more information, read How to Identify a Phishing or Spoofing Email). Because of the increasing sophistication of these scams, there is a high probability either you or someone who uses your devices will, at some point, fall &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2018/02/must-do-steps-to-recover-from-a-phishing-scam/">A must-do steps to recover from a phishing scam</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>How to recover from a phishing scam?</h2>
<p style="text-align: justify;">Unfortunately, phishing messages are becoming harder and harder to identify (For more information, read <a href="/2018/02/14/the-dangers-of-phishing/" target="_blank" rel="noopener"><strong>How to Identify a Phishing or Spoofing Email</strong></a>). Because of the increasing sophistication of these scams, there is a high probability either you or someone who uses your devices will, at some point, fall victim and need to recover from a phishing scam.</p>
<p>Here are suggestions for what to do after clicking a phishing link:</p>
<ul style="list-style-type: circle;">
<li><span style="font-size: 12pt;"><span style="font-size: 12pt;"><span style="font-size: 12pt;"><strong>Disconnect Your Device</strong><br />
Disconnecting from the Internet should be one of the first things you do in order to battle any form of malware.</span></span></span></li>
<li><strong>Backup Your Files<br />
</strong>Copy your sensitive files elsewhere just to be safe. You don’t want to back up everything on your computer, as there’s a risk that you could save some infected files along with it.</li>
<li><strong>Report the incident<br />
</strong>If you feel like the scammers got into a very important profile of yours like a banking account or something like that, immediately report it to customer support, they might be able to help you.<br />
Moreover, if you suspect a computer virus infection inform your IT department so that they can nullify the threat before it spreads.</li>
<li><strong>Change Your Credentials</strong><br />
If you provided login credentials for anything like usernames and passwords, now is the time to change your passwords and if you have a similar password on another service you might want to change it as well.</li>
<li><strong>Scan Your System for Malware</strong><br />
Scammers will sometimes try to fool you into installing malicious software so that they can steal your information more easily by using things like key loggers.<br />
If you installed such an application, do remove it, now. If you are unable to find it or remove it, try to locate and run your antivirus program’s full system scan.</li>
<li><strong>Proceed with Caution</strong><br />
The best protection is to err on the side of caution and use the “delete” button on emails that seem sketchy. Remember, a legitimate organization or business will never ask you to share sensitive, personal information via insecure channels like email, text or pop-up messages.</li>
</ul>
<p><em><strong>Those were 6 main suggestions to help you recover from a phishing scam, but I really hope you don&#8217;t need them, stay safe!</strong></em></p>
<p>The post <a href="https://www.ciatec.com/2018/02/must-do-steps-to-recover-from-a-phishing-scam/">A must-do steps to recover from a phishing scam</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The dangers of phishing</title>
		<link>https://www.ciatec.com/2018/02/the-dangers-of-phishing/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Wed, 14 Feb 2018 14:10:22 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Phishing]]></category>
		<guid isPermaLink="false">https://www.cia-tec.com/?p=1068</guid>

					<description><![CDATA[<p>Phishing scams are a form of cybercrime that involves defrauding users to obtain sensitive information. Cyber criminals act as legitimate companies or organizations to obtain the information and credentials. The main way online thieves get these credentials is through sending out emails that look exactly like official emails from your bank, credit card company, PayPal, Amazon or &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2018/02/the-dangers-of-phishing/">The dangers of phishing</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: left;">Phishing scams are a form of cybercrime that involves defrauding users to obtain sensitive information. Cyber criminals act as legitimate companies or organizations to obtain the information and credentials.</p>
<p>The main way online thieves get these credentials is through sending out emails that look exactly like official emails from your bank, credit card company, PayPal, Amazon or other online companies or services.</p>
<p><strong><em>Real-life example of Phishing</em></strong><br />
<em>I was in the office one day a couple of weeks ago when I received a text message from … According to the message, my credit card had expired and I was invited to click on the link in the text to update my details. I checked my credit card status independently with the bank and there were no issues. The text was enough to force me to carry out some due diligence though, and had I not worked in the security industry I may well have clicked on the link!</em></p>
<p style="text-align: justify;"><strong><span style="font-size: 14pt;">How to Identify a Phishing or Spoofing Email</span></strong></p>
<p style="text-align: justify;"><span style="font-size: 12pt; color: #000000;">Here are some tips on how to identify a phishing or spoofing email.</span></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="text-align: justify;"><strong> Don’t trust the display name </strong><span style="color: #000000;">A favorite phishing tactic among cyber criminals is to spoof the display name of an email. </span><span style="color: #000000;"><span style="color: #000000;"><span style="color: #000000;"> Check the email address in the header from—if looks suspicious, don’t open the email.</span></span></span>&nbsp;</li>
<li style="text-align: justify;"><span style="color: #000000;"><strong>Look before you click </strong></span>When you hover over a link in Outlook or a web browser, a small window pops up to show you where the link really goes.<strong> </strong>If the real link doesn’t match the sender or doesn’t match what you expect, assume it is poisoned and don’t click it.</li>
<li style="text-align: justify;"><span style="color: #000000;"><strong>Check for spelling mistakes</strong><strong> and bad grammar </strong></span><span style="color: #000000;"><span style="color: #000000;"><span style="color: #000000;">Authentic messages usually don’t have major spelling mistakes or poor grammar.  If it’s written poorly, don’t open it.</span></span></span>&nbsp;</li>
<li style="text-align: justify;"><span style="font-size: 12pt; color: #000000;"><span style="font-size: 12pt; color: #000000;"><span style="font-size: 12pt; color: #000000;"><strong>Review the salutation and check for legitimate contact information </strong></span></span></span><span style="font-size: 12pt; color: #000000;"><span style="font-size: 12pt; color: #000000;"><span style="font-size: 12pt; color: #000000;">If addressed to a vague “valued customer” or &#8220;dear user&#8221; it’s probably a phish. Lack of details about the sender or how you can contact them or their company strongly suggests a phish.</span></span></span>&nbsp;</li>
<li style="text-align: justify;"><span style="font-size: 12pt; color: #000000;"><span style="font-size: 12pt; color: #000000;"><span style="font-size: 12pt; color: #000000;"><strong>Don’t give up personal information </strong></span></span></span><span style="font-size: 12pt; color: #000000;"><span style="font-size: 12pt; color: #000000;"><span style="font-size: 12pt; color: #000000;">Legitimate banks and most other companies will never ask for personal credentials via email. Don’t give them up.</span></span></span>&nbsp;</li>
<li style="text-align: justify;"><span style="font-size: 12pt; color: #000000;"><span style="font-size: 12pt; color: #000000;"><span style="font-size: 12pt; color: #000000;"><strong>Don&#8217;t trust an</strong><strong> offer that seems too good to be true </strong></span></span></span><span style="font-size: 12pt; color: #000000;"><span style="font-size: 12pt; color: #000000;"><span style="font-size: 12pt; color: #000000;">If you receive a message from someone unknown to you who is making big promises, the message is probably a scam.</span></span></span>&nbsp;</li>
<li style="text-align: justify;"><span style="font-size: 12pt; color: #000000;"><strong>Beware of urgent or threatening language in the subject line </strong></span><span style="font-size: 12pt; color: #000000;"><span style="font-size: 12pt; color: #000000;"><span style="font-size: 12pt; color: #000000;">Invoking a sense of urgency or fear is a common phishing tactic. Beware of subject lines that claim your “account has been suspended” or your account had an “unauthorized login attempt.”</span></span></span>&nbsp;</li>
<li style="text-align: justify;"><span style="font-size: 12pt; color: #000000;"><span style="font-size: 12pt; color: #000000;"><span style="font-size: 12pt; color: #000000;"><strong>No Clicking on Attachments Either </strong></span></span></span><span style="font-size: 12pt; color: #000000;"><span style="font-size: 12pt; color: #000000;">Hackers embed malicious attachments that contain viruses and malware in their phishing emails. Malware can steal your credentials,  damage files on your computer,  or spy on you without you ever knowing.</span></span></li>
</ul>
</li>
</ul>
<p>The post <a href="https://www.ciatec.com/2018/02/the-dangers-of-phishing/">The dangers of phishing</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
