A phishing site is a resource that is specifically designed to steal the user's personal data (his username, password, PIN, etc.). For example, quite often, such resources are created to access social network accounts. The phishing technology is quite simple. An Internet page is created, the design of which completely imitates a mail server, a popular store or a social network. After which the user, having entered such a phishing site, enters his personal data, which automatically falls into the hands of the attacker. A logical question arises: how do they get to such resources, since their addresses differ from real ones, which means that it is not possible using browser bookmarks or search engines? This is one of the highlights. The fact is that they invite to such a phishing site, as a rule,using a variety of mailing lists or spam. Users under any pretext are asked to follow the specified link: for example, promising tremendous discounts or referring to any malfunction (you need to confirm your account). There is another type of similar resources, more insidious. When registering on any site, the visitor is asked to enter his email address and choose a password. Often, the password from e-mail and from various Internet accounts coincide, so fraudsters can easily grab a mailbox, with which you can easily access all the resources that the user used this address to register on.promising tremendous discounts or referring to any malfunction (you need to confirm your account). There is another type of similar resources, more insidious. When registering on any site, the visitor is asked to enter his email address and choose a password. Often, the password from e-mail and from various Internet accounts coincide, so fraudsters can easily grab a mailbox, with which you can easily access all the resources that the user used this address to register on.promising tremendous discounts or referring to any malfunction (you need to confirm your account). There is another type of similar resources, more insidious. When registering on any site, the visitor is asked to enter his email address and choose a password. Often, the password from e-mail and from various Internet accounts coincide, so fraudsters can easily grab a mailbox, with which you can easily access all the resources that the user used this address to register on.therefore, fraudsters can easily grab a mailbox, with which you can easily access all the resources that the user used this address to register with.therefore, fraudsters can easily grab a mailbox, with which you can easily access all the resources that the user used this address to register with.
In order not to become the next victim of such fraud, you need to remember a few simple tips. Firstly, not a single reputable company will request confidential data via e-mail. If you have been requested to do so, immediately contact their technical support service. Only not with the option "Reply" to the received letter, but through the official website, using bookmarks or a search engine. You can say that search engines can also give you a link to a phishing site. Theoretically, yes, but here one important point should be mentioned. Everyone knows that finding a resource in the search top requires considerable time and financial costs. However, the owners of fake sites is absolutely not profitable, in addition, search robotsuse certain algorithms that are able to filter out such sites from the results. Therefore, the probability that you will be taken to a fraudulent resource is extremely small. And secondly, when you go to a site that requires personal information, pay close attention to the address bar of the browser. If you have any doubts about the authenticity, refuse to visit him and try to get to the resource you need using one of the above methods.You should also know that the list of phishing sites is headed by domains that simulate the work of Internet banking, social networks and well-known online stores (auctions). According to statistics, up to 70% of such attacks end in success, which, accordingly, motivates criminals to create more and more such resources. However, the fight against this type of fraud also does not stand still. New anti-phishing systems for Internet browsers are constantly being developed, authorization procedures are complicated by large companies, and spam filters of email services are being improved .A serious step was the linking of the account to the mobile phone number. But, of course, the most important thing is the care of the user himself. Follow simple Internet security rules and then no phishing sites are scary!