Phishing attacks can be hard to avoid without the proper knowledge.

Sometimes the easiest way to get into your machine is to just ask. Phishing attacks utilize the power of social engineering to manipulate you into allowing cyber criminals to infect or infiltrate your network. These tactics are quite clever, and to combat them you need to be even more clever. Today we’re going to be going over some of the ways that phishing attacks can come about and what you can do to protect yourself. Ready to take a look?

What is phishing?

Phishing is a form of cybercrime in which the criminal tries to gain access to your login credentials or other valuable network security information under the guise of a legitimate individual. These attacks usually come in the form of an email fraught with malicious links. The email might come from a large company or simply someone you may know. It is very important that you remain vigilant about verifying the email’s sender before clicking on the links within or downloading anything to ensure that you are staying secure.

The internet is full of valuable information used in phishing attacks.

Think about all the information available on the internet about you at this moment. Things like your office address, personal phone number, and email addresses probably come to mind. However, try thinking a bit deeper. You may have statuses posted about where you go on vacation or your favorite charity to donate to. These are the sorts of things that may seem harmless, but can be used in a phishing attack. For example, if a cybercriminal knew that you liked to donate to animal shelters, they may pose as a popular one to try and get you to engage with their malicious links. Many times, you can identify these malicious links by hovering over them and seeing whether or not everything is spelled correctly. There may be a “.com” where a “.org” should be present. These are the red flags that should caution you from clicking. However, some cybercriminals are clever enough to use JavaScript to mask their bad links with an image of a legitimate one. This makes it all the more important to verify the sender before engaging.


If you need the help of an experienced computer forensics experts, contact the team at Atlantic Data Forensics today. To find out more about how we can help in your data recovery, cybercrime, or e-discovery needs or if you need trusted expert testimony, simply request a consultation and we will be in touch.

Don’t forget to keep up with our weekly blog for advice and information on how to prevent being the victim of cybercrime. You can follow us on TwitterGoogle+, and LinkedIn too.