Home
AP Lens  
  • AP Lens
  • AP Lens - Edu-Offer
User Guide  
  • Sender Information
  • Team Guards
  • Verified banks
Support  
  • FAQ
  • Uninstall APBot
  • Privacy&Terms
BlogUnblock (Risk Manager)Demo Booking
Home
AP Lens  
  • AP Lens
  • AP Lens - Edu-Offer
User Guide  
  • Sender Information
  • Team Guards
  • Verified banks
Support  
  • FAQ
  • Uninstall APBot
  • Privacy&Terms
BlogUnblock (Risk Manager)Demo Booking
Home
AP Lens  
  • AP Lens
  • AP Lens - Edu-Offer
User Guide  
  • Sender Information
  • Team Guards
  • Verified banks
Support  
  • FAQ
  • Uninstall APBot
  • Privacy&Terms
BlogUnblock (Risk Manager)Demo Booking
Home
AP Lens  
  • AP Lens
  • AP Lens - Edu-Offer
User Guide  
  • Sender Information
  • Team Guards
  • Verified banks
Support  
  • FAQ
  • Uninstall APBot
  • Privacy&Terms
BlogUnblock (Risk Manager)Demo Booking
Home
AP Lens  
  • AP Lens
  • AP Lens - Edu-Offer
User Guide  
  • Sender Information
  • Team Guards
  • Verified banks
Support  
  • FAQ
  • Uninstall APBot
  • Privacy&Terms
BlogUnblock (Risk Manager)Demo Booking

3 common modern tricks hackers use and how to deal with them

by Skyler Cheng

· hacker,Hacking Techniques,cyberse,phishing,email scam

Still think that phishing scams are nothing related to you? According to a research done by two East Carolina University graduate students, 65% of the vicious hackers used phishing attacks as their primary method to invade computers and systems.

(Click here to see full research: ECU grad students, professor receive international recognition for research)

Phishing attacks have evolved to a whole new level over the past few months. Here are three common modern tricks hackers use:

1. Slipping in while you browse the Internet

Many of us believe that it is smart enough to ensure confidentiality using the private browser. But guess what? Private browser aren’t that “private” at all. “You visit what looks like a perfectly harmless website,” said Giovanni Vigna, the co-founder of anti-malware provider Lastline Inc., “but in the background, you are redirected to a series of other sites that send you an attack.”

Hackers love to slip in and eavesdrop on you when you browse the Internet. Private browsing mode (or incognito mode) only ensures that your browser won’t keep track on your record, but it doesn’t mean that the Internet and the sites that you visited lost the ability to store the data.
Sometimes even the website owners are innocent of the potential attacks. Therefore, you should be responsible to protect your own computer.

What can we do?

Use a trustworthy browser. Always install available updates to your browser or use a more strongly protected browser, Firefox, for example. As stated by Vigna, Internet Explorer users are the most prone to phishing attacks. If you are using IE, you may want to strengthen your firewall or simply change to another browser.

2. Sending seemingly personal emails

The old-style phishing never targeted specific individuals. They were sent to thousands of vulnerable victims, composed of spelling mistakes or garbled text. In fact, hackers do grow. Hackers nowadays target a single individual and act like they know you, known as “spear phishing”.

Some attackers may also pretend to be reputable bodies, such as universities and banks. They may be able to call out your name, your school, or even your home address. But don’t be panic.
All the effort they made were trying to reduce your vigilance, so that they can easily get your financial information and passwords. Subsequently, your personal data would be exposed, worse still, your identity might be misappropriated to commit illegal transactions.

What can we do?

Carefully inspect the email address or any URLs attached, see if they’re fallacious or abnormal. Always be wary of suspicious attachments and links, don’t open them if you’re not a 100% confident with the source. If possible, double check with the sender and make sure they are the right people who sent you those personal emails.

Supporting blog from Reddit https://www.reddit.com/r/ucf/comments/i08v76/infosec_advisory_phishing_scams_targeting_students/

3. Popping out fraudulent warnings

Are you annoyed by the pop-up windows while surfing? Don’t close them or click on them abruptly. They could be the bridge between vicious hackers and your vulnerable computer. 

Some pop-ups are in the form of small icons or advertisements, while the messages are usually related to your search history, and link to other sites that show similar products or contents. Malicious pop-up windows can be highly invasive, you can hardly close them or navigate your monitor.  

Another type of attackers may display fraudulent warnings, indicating that your computer is infected with virus and provide you with contact number to help clear the virus. Again, they would act like reputable companies, rationalizing their behaviors and gaining your trust.

What can we do?

Whenever there’s pop-up message, carefully read the descriptions. Look for flaws or obvious fraudulent intents, such as spelling mistakes or unprofessional images and icons. When you are doubtful of the pop-up message, don’t close the window immediately. Open your antivirus software and thoroughly scan your computer.

Example of fraudulent pop-up warnings

Cyber criminals keep improving day by day. We have to be adaptive to the ever changing world and learn how to protect our own virtual assets. Viruses come to you regardless of your age, gender, or educational background.

Kick start to prevent phishing attacks in no time!

Subscribe
Previous
    These student’s’ cyber-security stories prove how...
Next
Breaking down the ingenious phone scam in Mark Rober's...
 Return to site
Cancel
All Posts
×

Almost done…

We just sent you an email. Please click the link in the email to confirm your subscription!

OK