Suneo Ch:
⬇️⬇️⬇️Let's be aware of some phishing techniques
So that you don't fall a victim being hacked👌@androtrickz
1⃣
Link Manipulation: Link manipulation is a technique in which the users are deceived by web links. The phisher sends a link to the victim. The link looks like real or legitimate. When the victim clicked on deceptive link, then instead of mention link, the fake web page is opened which looks like authorize or legitimate page. The best way to find out link manipulation is just hover the mouse on link or right click copy the web address, then match both the URL, they are same or not. In the same way, if you are using the phone just copy the URL and paste somewhere and match them.
2⃣
Website Forgery: The website forgery means the malicious webpage or illegitimate website. This include you receive a fake link when you open it. Then fake webpage is opened or there may be case that the real webpage is opened but the pop up window is displayed. That will ask your personal information, bank account detail (credit card, debit card) etc. there are some website which offers special feature, tricks and attractive offers like how you get Skype credit free, get the recharge free etc. when you opened them then the malicious script is run in order to alter web address, install malware program or add extension or add-ons to browser. Do not feel panic, there is way too stay safe from this type of attack. Install McAfee SiteAdvisor (available for android user) or Norton Safe Web in your computer. This software shows you before viewing any website, how much the website is safe by website rating. You may install wot add-ons to the browser. It is same like McAfee SiteAdvisor or Norton Safe Web. If you are using phone or you can scan the link online too, I am giving five best link scanners. Just make a bookmark of this link and when someone send any link just scan the link and you will find out all details.
https://www.virustotal.com/en/#url
http://safeweb.norton.com/
http://www.siteadvisor.com/
http://www.avg.com.au/resources/web-page-scanner/
http://onlinelinkscan.com/
@androtrickz
3⃣
Vishing or Phone phising:Attacker calls the victim on the phone and attempt to reveal the information by deception. This information is used for hacking purpose. For example, one day you receive a call from tech. expert that the company mail server crashed and for restoring all your corporate server mails. You have to tell him your password and for convincing,he tell about your office details andyou have read on the license agreement that we will never ask for it, but it was written by the legal department, they do not know that this situation is occurs lol.. If you do not take any instant action you may be in big problem and all your emails are lost. So they may be use automated system. So be aware and careful from this type of call. Do not reveal any information. End the call and call your office or bank official number, ask them is there any problem.
4⃣Spear Phishing: Spear phishing is a technique in which specific individual or companies targeted. The attacker focuses on particular person and reveals the information about him/her. Then this information is used to deceive him/her. For example A business man receive an email (invited for annual function in school) and detailed about annual function in the email attachment. When he open the email then the files shows that it is corrupted. He think that the file may be corrupted due to network failure or some problem in network. But the business man is speared.
5⃣Clone Phishing: The clone email is exact copy of legitimate email. Just the link or email attachment is replaced with malicious link or attachment. The email is spoofed.
@androtrickz
6⃣Tabnabbing: It is latest phishing technique. How many of you open many tabs at same time? I think almost all did. You open a browser, login to your email. In the other tab, you open Facebook and start chatting after sometime you check your email again but the popup show please login to continue or the login page shown. You think that may be session is expired. Then you enter your login detail (to fake page) and continue. You do not even notice the URL of login fake page. When you enter the detail that detail goes to the hacker and you redirects the original link where you already login to your account. So when you login any account be careful and aware first saw the address bar. If you use Firefox then install no script add-ons that stop auto refreshing webpage and offers specific countermeasures against security exploits.
7⃣Malware Phising: The malware is malicious software. They may be sent through email attachment or attach existed software. When you open the attachment or install the software, they installed on your computer. Other way of installing the malware is that when you clicked on any link and visit suspicious website. So when you open any email attachment first scan it or download the software from there reliable or authenticate website (like www.cnet.com, www.softpedia.com, www.softonic.com etc.).
8⃣Keylogger: Keylogger is small program which is installed on the victim computer. After installing, it will take screen shots and record each keystrokes. Then these records are sent to the hacker email address. That's why many secure website (like banking) provide the virtual keyboard so that keystrokes are not recorded and you can stay safe from this type of attack. When you visit any website like banking that provides virtual keyboard, used it.
9⃣ℹ️⭕️Session Hijacking: The hacker steals the victim browser cookie which is used to authenticate the account and hacker gain unauthorized access to information or services. Now you are thinking what browser cookie is? How can this be possible? When you login to any website from your browser then the request is sent to the server in which the email id and encrypted password is sent to the server. Then the server sent back the cookie and you login your account. This cookie is used to taking control of user session. Hacker stole this cookie and used to access your account.