Don’t Be Carless, Be Safe

BAIT & SWITCH HACKING

Bait & Switch hacking is just as it sounds, baiting people like fish, except the worms are authetic looking wesites with cool downloads. Using this technique, hackers run their malicious programs with wesites that look very believable. That way, after downloading their malicious program on the your computer, the hacker can get access to your computer.

Another method that involves this attack would involve the developer trying the offer something free for millions of users, like a page view counter that would go at the bottom of a website, which can be easily replaced by a malicious JavaScript redirect.

You could spot this attack by the way they advertise. Their websites may seem legit, but you can next be too safe. If they try to offer you something for free that usually cost money in the form of a download, that is usually a hint that these hackers are trying to bait & switch access to your computer. This type of hacking is said to be very difficult to to defend against. Anything you didn’t make your self could be used against you. The best thing you could do is to look for reputable companies when trying to find programs online.

Incidents such as AirAsia Indonisia Flight QZ 8501: Cyber Criminals use missing Flights QZ 8501 mystery as Bait, have happend while using this method. Taking advantage of the incodent, cybercriminals took that chance to snatch users’ personal information and spread malware. They exploited the disappearance of the flight by luring users to websites purporting to offer the lateset new in order to steal their personal information. There were posted on social media claiming that the “Missing AirAsia flight QZ850 has been found that all its passangers are safe and alive.” However. After user would click on the news, the link would redirect users to malicious websites.

PHISHING

Phising is a type of hacking often used to steal user data, which would include login credentials and credit card numbers. It occurs when an attacker, creating a look-a-like reliable email, dupes the target into opening an email, instant message, or text message. They are then tricked into clicking a malicious link, that can lead to the installtion of malware. Which would then result into your system freezing as part of a ransom attack or reavealing sensitive information. It could include, unauthorized purchases, stealing funds, or identity theft.

Some ways to spot phishing could be the message containing a mismatch URL, URL’s containing a misleading domain name, a message with poor grammar, a messagae asking for personal information, something that's offering something that seems too good to be true, being asked to send money for expenses, messages making unrealistic threats, messages that appear to be from government agencies, and emails saying that you somehting, even though you didn’t initiate the action of doing so.

To protect against phishing, you should always be wary of emails that ask for confidential information, usually legitimate organizations won’t ask for that kind of information via email. Try to familiarise yourself with a website’s privacy policy. Most of the spam your receive on the daily and potential dangerous phishing emails come to you because a site you signed up with sold your email address to another company. And lastly, Never use links in an email to connec to a website unless you are absolutely sure that the website is authentic.

Massive Google hack Leaves millions of users at risk phishing scam

https://www.nbcnews.com/tech/security/massive-phishing-attack-targets-millions-gmail-users-n754501

Hopefully with this information, you will hopefully be able to avoid at least any sketchy email that crosses your path.

Show your support

Clapping shows how much you appreciated Arianna Kamaka-Perez’s story.