Have you ever gotten an email from your boss asking you to make an unusual purchase or do a money transfer? Or have you gotten a call from someone pretending to be in the FBI? If you answered yes, you have likely been a target of a phishing scam.
Anyone! No matter your age, gender, income level, background, you can become a victim of a phishing scam. The attackers are on a constant watch for your vulnerabilities, for that one chance to steal your personal information. The information can be as basic as your gender, name, and age, or as in-depth as your background, bank information, and social security number.
Although attackers are always looking for new ways to trap their victims, below are 3 common types of phishing scams.
The most common and one of the earliest kinds of phishing techniques, hackers carefully craft sophisticated emails for you to open without any suspicion. They plant attacks to again access to your confidential details such as bank accounts, credit card numbers, passwords, social security number, etc.
Pictured above: An email I got from an attacker pretending to be our CEO. In this case, the sender's email address made it easy to recognize the spam email. If it wasn't obvious enough that wasn't our CEO's email address. Notice the subtle spelling error in "financial"
Attackers usually make calls to their targets using a fake caller id. They pretend to be your friends, relatives, higher authorities, or organizations, many times the phisher will also use an automated message. Much like email phishing, their primary goal is to find the most gullible victims to steal their details.
Pictured above: Many cellular carriers now warn you that there’s probably a scammer on the line that will attempt to trick you.
Hackers create fake websites or web pages that look identical to the real website a user may be looking for. Many times the hackers will hack a common website and add their own url somewhere in there and once the user clicks on it, they are taken to the hackers identical website without ever questioning its authenticity.
Pictured above: Many times hackers will create a replica of a website where you are most likely to enter confidential information.