
111
5.1 Personal data
5
Here, the recipient has clicked on the link but for the purposes of this example,
a fake email address has been typed in. Normally, an individual would be
expected to type in their email address and password, allowing the fraudsters
to gain access to the account. The URL is called a ‘spoofed URL’ as the hacker
has given the site a name which is deliberately spelt in a way that is close to the
name of an authentic site.
In order to avoid falling victim to these phishing scams, there are several things
a computer user can do. It is important to use anti-phishing software on a
computer connected to the internet. This identifies any content which could
be interpreted as phishing contained in websites or emails. It can block the
content and usually provides the user with a warning. It is often found within
web browsers or email software. Not all web browsers provide this facility,
however, so it is important to use one that does. It is a good idea to always have
anti-virus and anti-spyware software running on a computer, and to update it
at regular intervals. Phishing emails often contain grammatical and/or spelling
mistakes, so it is important for users to look out for these. Users should never
trust emails that come from people whose names they do not recognise. If an
email looks suspicious, it is best practice to just delete it. Reputable companies
or organisations will never ask for personal information, so that is usually a sign
that it is a phishing email and, again, should not be trusted; the best action to
take is probably deletion. If an email starts ‘Dear customer’ rather than using
the receiver’s name, it should also be treated with caution, as should emails
asking the recipient to confirm their personal or financial information. Personal
and financial information should never be sent in an email. If the email contains
a message that the receiver has won a large amount of money or some other
reason why they will benefit financially, it is likely to be a fake. Links placed
within the email that are shorter than normal are used to hide the real URL
and the best way of checking this is for the user to place the mouse cursor over
the shortened link. This reveals the actual URL and the user can see straight
away if it is suspicious. The best policy is never to click on such links.
Smishing
Smishing is a variation of phishing. The major difference is that it uses SMS
(text messages) rather than email to send the message. The number of smishing
attempts has increased since the introduction of smartphones, as it is so easy to
activate a link within a text message. Just as with phishing, the main intention is
to get the recipient to reveal their personal details.
There is a perception among most people that smartphones are more secure
than laptops or PCs. However, this is not the case when it comes to smishing.
In fact, the reason why there has been an increase in this type of scam is
that people tend to be more vulnerable on their phones. They think there is
less likelihood of being attacked on a phone than on a computer and so are
more likely to respond to a smishing request. Some fraudsters are using text
messages to get users to download an attachment which contains malware
which, in turn, feeds personal data from the phone back to the fraudster. A
smishing message is similar to a phishing message in that it often includes a
link to the fake website, or it can just ask the recipient to simply type in their
bank details in a reply to the text. The message usually contains a link to an
email address where they must send this information. It can ask them to take
immediate action. It can be a message that tells them they are entitled to a
financial reward. Sometimes it contains a phone number asking the recipient
to phone the bank or organisation using that number. When they phone, they
are then asked for their personal details.