Don’t Be Carless, Be Safe
BAIT & SWITCH HACKING
Bait & Switch hacking is just as it sounds, baiting people like fish, except the worms are authetic looking wesites with cool downloads. Using this technique, hackers run their malicious programs with wesites that look very believable. That way, after downloading their malicious program on the your computer, the hacker can get access to your computer.
You could spot this attack by the way they advertise. Their websites may seem legit, but you can next be too safe. If they try to offer you something for free that usually cost money in the form of a download, that is usually a hint that these hackers are trying to bait & switch access to your computer. This type of hacking is said to be very difficult to to defend against. Anything you didn’t make your self could be used against you. The best thing you could do is to look for reputable companies when trying to find programs online.
Incidents such as AirAsia Indonisia Flight QZ 8501: Cyber Criminals use missing Flights QZ 8501 mystery as Bait, have happend while using this method. Taking advantage of the incodent, cybercriminals took that chance to snatch users’ personal information and spread malware. They exploited the disappearance of the flight by luring users to websites purporting to offer the lateset new in order to steal their personal information. There were posted on social media claiming that the “Missing AirAsia flight QZ850 has been found that all its passangers are safe and alive.” However. After user would click on the news, the link would redirect users to malicious websites.
Phising is a type of hacking often used to steal user data, which would include login credentials and credit card numbers. It occurs when an attacker, creating a look-a-like reliable email, dupes the target into opening an email, instant message, or text message. They are then tricked into clicking a malicious link, that can lead to the installtion of malware. Which would then result into your system freezing as part of a ransom attack or reavealing sensitive information. It could include, unauthorized purchases, stealing funds, or identity theft.
Some ways to spot phishing could be the message containing a mismatch URL, URL’s containing a misleading domain name, a message with poor grammar, a messagae asking for personal information, something that's offering something that seems too good to be true, being asked to send money for expenses, messages making unrealistic threats, messages that appear to be from government agencies, and emails saying that you somehting, even though you didn’t initiate the action of doing so.
Massive Google hack Leaves millions of users at risk phishing scam
Hopefully with this information, you will hopefully be able to avoid at least any sketchy email that crosses your path.