Sensasibet77 Slot Gacor Deposit Ovo 5000 10000 Tanpa Potongan

Sensasibet77 Slot Gacor Deposit Ovo 5000 10000 Tanpa Potongan — Sensasibet77 merupakan situs judi online slot gacor deposit ovo tanpa potongan yang menawarkan pengalaman bermain slot yang…

Smartphone

独家优惠奖金 100% 高达 1 BTC + 180 免费旋转




Dodging phishing attacks

A practical guide to protection from the most common email scams

I have worked with Microsoft Exchange for over five years. Handling emails scams like phishing was part of the job. If the term sounds like Greek or Latin to you, no worries. I will explain everything tech in non-tech terms.

Those that invented and developed email as a mode of communication, did it keeping in mind the “nice ones” — those who knew not to listen in on others, who respected people’s privacy, and were, in general, civilised. Email became available for the wider world in the nineties.

Soon came along the bad guys.

Phishing is what it sounds like: “fishing” for information. Information like the credentials to your social networking accounts, your email account, bank account, etc. are data points that some are waiting to get their hands on, so that they can use them to their benefit.

In most cases, this involves money. In cases like bank accounts, they get access to your money directly. In other cases, the attacker could gain access to, say, your social media account, change password (so you cannot access it anymore) and then blackmail you. Another way is to lure you and make you send them money. Even if two hundred victims send the scammer $10 each, s/he makes $2,000.

Believe it or not, not only are phishing scams everywhere, but even those who are smart with the workings of the Internet fall victim to it.

The real world works differently. Anybody could be a victim of such scams — no matter how learned or informed. I do not know much about Razdan, nor do I watch her shows. I cannot judge how good or bad a journalist she is, but having worked with mail exchange for long enough, I can tell you that her falling victim to this scam does not make her stupid.

Let us now look at the different ways scammers phish, and see how we can protect ourselves from falling victim.

Phishing is a social engineering attack, which means that the attacker uses his / her interpersonal skills to get information from you. It could be a single email, either with suspicious links to web pages that make you enter information, or a plain email with a premise, asking you for information. In some, the attacker interacts with you (like what Razdan alleges happened with her). Phishing attacks have become sophisticated over time, and scammers combine techniques to increase the chances of success. While in some cases, your intuition is your sole “BS detector”, in the rest, all you have to do is look. I will deal with the latter in this post.

As trivial as it may sound, we do not look at the email address itself when we see emails — we look at the name instead. Why? Because we treat the email “from” the way we treat our phone calls: if we have the caller’s number saved on our phones, the name appears and not the number. We never bother to look at the number to re-verify because we take it for granted — and we should, because we saved it.

The problem arises when we apply the same logic to email.

Emails behave slightly differently. Email have what we call a ‘header’, which is technical information email clients (like Outlook or Thunderbird on your desktop) and email services (like Gmail) understand. The header is analogous to an envelope. Like how an envelope contains the source and the destination of the package, along with the route it took (ever notice the black stamps on the envelope?) emails also record this information as they jump from server to server.

For good reason or bad, the header allows the sender to include their name. This way, anyone can enter any display name against their email address when sending the email.

Most email providers of today, including Gmail, show the email address within the message details. All you have to do is click on “Show details” or something similar (this varies based on the provider — Gmail on the web has this little downward triangle right next to me) in the “from-to” area. If you use an email client like Microsoft Outlook, you would see the email address right next to the name along with other details.

A sample of details on Gmail, showing the from, reply-to and to addresses, the subject, origin, etc.
A sample of details on Gmail

Always check this before you interact with emails.

Be cautious when using links in emails. On a desktop or a laptop, you have slightly better protection because you have an option to hover over a link (although phones have their own benefits). Three points to keep in mind:

Also, here are examples of a couple of deceptive links:

Notice how similar they look to amazon.in and account‌.outlook‌.com.

Remote content is a fancy word for images, webfonts, styles and other non-textual elements in an email. Images and other content embedded in emails make a call to the image store (a remote server). This remote server may track the number of calls it gets and from where, and can know if you opened the email.

What is the big deal, you ask? Scammers (and spammers) often send out emails in bulk, without knowing which among them would hit real mailboxes. They can use these remote calls to know which email addresses are real, and they can target their next emails better.

In the screenshot above, the email has come from Supr Daily via onedirect.in. This may be legitimate, and in most cases, your email provider will alert you if it detects any foul play. Most reputed email providers can read SPF records of the domain sending the email, and decide whether this “via” is legitimate or not. Getting into what SPF records are would make this too technical for common people.

In any case, handle any sensitive email with caution.

Some phishing emails claim that your account is compromised, and ask you to protect your account. Do not click on the links in such emails.

Sites and services sometimes undergo data breach events. These services do send you emails that there has been a data breach, and ask you to change your password. No reputed site would store your password as plain text, but they tell you to change your password to avoid a possible account compromise. In such cases, go to the site and change the password yourself; make it a practice not to use the link given in emails.

“Forgot password” emails that you kick off are an exception. Even in that case, watch where the link takes you.

Secondly, no reputed site would ask you to lower the security on your account, such as disabling two-step authentication on their service. If you see an email asking you to lower the guards on a site, do not oblige.

Another common technique attackers use is telling you that your mailbox is full, asking you to clean it up to continue to use email. Do not click on those links. Log into your mailbox by manually entering the web address of your email provider and check the quota. You can find this under your mailbox settings. Gmail displays this at the bottom of your Inbox page.

Most phishing attacks show a sense of urgency: “Do this within the next 16 hours”. When the stakes are high, you do not stop to think or research when the stakes are high; instead, you dive right in. I have seen employees fall victims to what they think is an email from the CEO asking for gift cards bought for the season, or a supplier saying that their account has changed and that they did not receive the last payment, asking the team to transfer the money “by EOD” to the new account to avoid legal issues.

As a side, once an executive from Purchase contacted us saying that she found the tone used in the email a little unusual, and asked us to check the authenticity of the email (a phishing attempt, indeed, using domain spoofing). She had spotted this using her intuition. We even sent technical recommendations to the supplier to prevent this in the future.

This is also a common symptom. The claim we see in Exchange admin circles is that most of these attackers are not native English speakers (I am not, either, but — ), and use a translator to compose emails. Others who do not use a translator are not good at writing. This often results in poor sentence structure or unusual phrases.

For example, one of the customers of a client I worked for, pointed out that no American would use the phrase “our esteemed customer”, while Asians (people of Asia, not the race) did, implying that the email she had received, ostensibly originating in the US, was from somewhere in Asia. Another case of intuition and a fruit of global interactions. (The case not being a domain spoof, we could not do much. But she was right; the email had originated from India.)

Unsolicited Not asked for Not requested

Some phishing emails seem to come from government agencies, asking for tax information, or giving a link to file tax returns. But such emails come either from public email services (Gmail, Outlook, Yahoo) or non-government domains. As such, legitimate emails from Indian Central or State government agencies use a gov.in or an nic.in address. That said, some of our government offices do—unwittingly—use a public email address sometimes. Be careful with such emails. Know that any government notifications (other than 8 PM speeches) do give you enough time to act upon them, such as filing tax returns. No government organisation in India works on a notice of minutes or hours.

I know, it sucks. HTTPS (or HTTP, secure) implements a secure connection using a certificate, prompting the browser to show the padlock icon. But a padlock icon by itself merely means, ‘This page encrypts content sent to the server.’ Such certificates are free, and everyone (including scammers) can get these. These do not verify the person or the organisation that owns the domain or the site. The certificates that the likes of Internet banking sites use, though, are of a different class; they are expensive, and the issuers verify the organisation that they issue these to.

In short, do not let the padlock fool you. A padlock is not a testament to the legitimacy of the domain.

Emails come with an ‘unsubscribe’ link in them. In some cases, these links directly unsubscribe you, while others take you to a page that asks you to enter your email address, and click the Unsubscribe button.

But, if you receive an email from an entity that you do not remember signing up for, do not click on Unsubscribe, because doing so would confirm to the sender that your email address exists, and they will target you for more emails.

Instead, click on the “Report spam” button (and do not choose to unsubscribe). This will help in two ways: First, the provider (like Gmail) will remove the spam message from your inbox, and second, the algorithms in the system will learn to identify such spam emails better.

Remember that email is as secure as physical post; not the most secure way to communicate. Legitimate organisations would not have you send them details like your bank account number, tax information, usernames, passwords, or other sensitive data over email — they would make a secure form collect such information instead. (Razdan said that the perpetrators of the phishing attack sought her personal information. She did not make the mode of collection clear.)

Never share personal information over email. And do not fill a Google Form either — no reputed organisation will collect sensitive information using a Google Form. In any case, think about whom you share personal information with. And always observe the address bar of your browser. Do not fill forms that do not have a padlock. If the bar does show a padlock, verify the authenticity of the domain.

Do not let logos fool you.

Do not panic. What information has gone, has gone. What you can do now is damage control. Here are some simple steps you can take:

If you shared passwords, reset them by going to the respective password reset page. Again, do not use the password reset link that you received in an unsolicited email. Generate a fresh “reset password” link and use it to reset your password.

Never — never use the same password across sites. If the password you use across sites gets compromised, you would put all your accounts at risk.

If your work account gets compromised, inform your IT department. No good employer will penalise the victim. Telling your IT department about the breach would prepare them for the next steps to safeguard organisational data.

Be honest about what you received and what you sent.

If you gave out financial information, or you see unusual financial activity on any of your accounts, contact the customer service at once and explain the situation. With reputed credit cards, the customer has zero liability towards fraudulent transactions. Informing Customer Care would make them take the necessary steps to protect your financial interests.

Add a comment

Related posts:

The global economic recovery might be sluggish in 2020

In the last economic outlook review, as outlined by the IMF report, we saw a synchronized global economic slowdown emanating from trade war risks, Brexit uncertainty and underperforming emerging…