{"id":42317,"date":"2021-10-04T16:02:04","date_gmt":"2021-10-04T20:02:04","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=42317"},"modified":"2021-10-04T16:02:04","modified_gmt":"2021-10-04T20:02:04","slug":"how-to-protect-yourself-from-phishing","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing\/42317\/","title":{"rendered":"6 antiphishing tips"},"content":{"rendered":"<p>What do e-mails with headings \u201cYou\u2019ve won a million dollars\u201d and \u201cYour account is blocked\u201d have in common? They\u2019re almost always signs of a scam. Their aim is to convince the recipient to follow a link to a phishing website and enter confidential information: login and password or bank account details. Here\u2019s how to spot phishing and protect yourself.<\/p>\n<h2>1. Check e-mails carefully<\/h2>\n<p>When you receive an e-mail, don\u2019t rush to reply or follow its instructions. The first thing you should do is look for telltale signs of phishing. What are the red flags?<\/p>\n<ul>\n<li>A dramatic subject line. Common themes include large money transfers, financial compensation, hacked or blocked accounts, and fraudulent transactions \u2014 attention-grabbing topics likely to trigger an emotional response, often playing on greed or fear.<\/li>\n<li>Stress on the seriousness of the situation. Phrases like \u201cFinal notice!\u201d or \u201cOnly 3 hours left\u201d as well as excessive use of exclamation points are meant to make you hurry, panic, and lower your guard.<\/li>\n<li>Mistakes, typos, and strange characters in the text. Some criminals really do struggle with English, although attackers sometimes purposefully make mistakes like \u201cmilion\u201d or use letters from different alphabets in an attempt to bypass spam filters.<\/li>\n<li>Inconsistent sender address. An e-mail address with a load of random letters and numbers or the wrong domain name are sure signs of forgery when a sender claims to be writing from a large organization.<\/li>\n<li>Links in the e-mail if it contains them\u00a0\u2014 or the website they lead to, to be more precise. You can check a link by hovering your cursor over it and reading the address carefully. Criminals bet on victims not paying enough attention to detect slight changes made to the names of well-known companies or brands \u2014 think <em>sumsung.com<\/em> or <em>qoogle.com<\/em>. Check each link carefully.<\/li>\n<\/ul>\n<p>Such checks should be enough in most cases to spot an e-mail sent as part of a mass phishing scam. However, <a href=\"https:\/\/www.kaspersky.com\/blog\/36c3-fake-emails\/32362\/\" target=\"_blank\" rel=\"noopener nofollow\">senders\u2019 names and addresses can be forged<\/a>, links can be shortened to make them unreadable, and chains of automatic redirects can be set up to lead from less suspicious Web addresses to the actual phishing website. That\u2019s why it\u2019s best to avoid following links sent in e-mails altogether if possible \u2014 unless it\u2019s one you asked for. For example, if you get a notice that appears to be from a bank or online store, call the bank or store to confirm.<\/p>\n<p>You can also check if a prize is real by using a search engine to look up the official website of the company supposedly awarding it. Then you can check for prize information there. Those are just a few examples, but our advice is really the same regardless: If you want to check a link from an unsolicited letter, try to do so in a roundabout way.<\/p>\n<h2>2. Keep your guard up in messaging apps or on social networks<\/h2>\n<p>E-mail isn\u2019t the only thing you need to be careful with. The messages you receive in messaging apps and in social networks have just as much potential for danger; you can find malicious links in <a href=\"https:\/\/www.kaspersky.com\/blog\/facebook-video-scam\/11829\/\" target=\"_blank\" rel=\"noopener nofollow\">friends\u2019 posts on Facebook<\/a>, in comments posted by fake brand ambassadors <a href=\"https:\/\/www.kaspersky.com\/blog\/brand-scams-on-twitter\/40615\/\" target=\"_blank\" rel=\"noopener nofollow\">on Twitter<\/a>, or in DMs on <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptoscam-in-discord\/38661\/\" target=\"_blank\" rel=\"noopener nofollow\">Discord<\/a>.<\/p>\n<p>Treat banners with caution as well; the images they display may have nothing to do with the website they take you to. The platforms where banners are posted usually don\u2019t control what users see or where they\u2019re redirected. Even a perfectly reputable website can serve ads that lead to phishing websites.<\/p>\n<p>What can you do? As with e-mails, check every link carefully, and if possible don\u2019t click on them at all.<\/p>\n<h2>3. Stop and think before entering bank account info<\/h2>\n<p>Bank card details are particularly sensitive because they provide direct access to your money. That\u2019s why, regardless of how you reached a website, you should double-check where you really are one last time before entering those details.<\/p>\n<p>First, take a close look at the address. You\u2019re looking for the same red flags: typos, numbers instead of letters, hyphens in unexpected places, and strange domain names. If you see anything like that, leave the website and try entering the address manually.<\/p>\n<p>Then, staying in the address bar, click on the padlock icon at the left. The padlock is <a href=\"https:\/\/www.kaspersky.com\/blog\/https-does-not-mean-safe\/20725\/\" target=\"_blank\" rel=\"noopener nofollow\">no guarantee of security<\/a>, but from it you can learn more about who owns the website (browsers have different names for relevant tabs, such as <em>Certificate<\/em> or <em>Connection secure<\/em>).<\/p>\n<div id=\"attachment_42319\" style=\"width: 1810px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/10\/04155240\/how-to-protect-yourself-from-phishing-screen-1-EN.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-42319\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/10\/04155240\/how-to-protect-yourself-from-phishing-screen-1-EN.png\" alt=\"How to check who owns the website: Look at SSL-certificate details\" width=\"1800\" height=\"1100\" class=\"size-full wp-image-42319\"><\/a><p id=\"caption-attachment-42319\" class=\"wp-caption-text\">This is what the relevant string looks like on our website in Google Chrome<\/p><\/div>\n<p>If you do a lot of online shopping, including purchases from smaller companies and private sellers, we recommend using a separate card. Keep a small amount of money on it and transfer money to it right before you need it. That way, even if the card details are stolen, you won\u2019t lose a large amount of money.<\/p>\n<h2>4. Use different passwords<\/h2>\n<p>If you use the same password for different accounts, even if it\u2019s a very reliable password, you <a href=\"https:\/\/www.kaspersky.com\/blog\/never-reuse-passwords-story\/24808\/\" target=\"_blank\" rel=\"noopener nofollow\">risk having all of your accounts compromised<\/a> if you enter it on a phishing website at some point. It\u2019s important to use a unique password for each website and app.<\/p>\n<p>If you find it difficult to come up with and remember dozens of new passwords for every pizza place and online store, use a <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">password manager<\/a> to create, manage, and use them.<\/p>\n<p>A password manager also acts as an additional check to prevent phishing. If you open an app or site and find it hasn\u2019t automatically filled in your login and password, then you\u2019re probably looking at a fake. It may look the same as the real website to a human, but if it has a different address, the password manager won\u2019t fill in account credentials.<\/p>\n<p>Second, password managers can generate hard-to-hack passwords.<\/p>\n<p>Third, some password managers have useful additional features. For example, <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Password Manager<\/a> checks your passwords and notifies you if they\u2019re weak, used for different accounts, or already in a database of compromised passwords.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n<h2>5. Set up two-factor authentication to protect accounts<\/h2>\n<p>Many phishing attacks aim to hijack accounts, but even if attackers get your login and password, you can still stop them from logging in to your account, by setting up two-factor authentication wherever possible. Once you\u2019ve done so, you\u2019ll need an additional temporary verification code to log in. You\u2019ll receive it by e-mail, text, or in an <a href=\"https:\/\/www.kaspersky.com\/blog\/2fa-practical-guide\/24219\/\" target=\"_blank\" rel=\"noopener nofollow\">authenticator app<\/a>. Attackers won\u2019t get one.<\/p>\n<p>Keep in mind, however, that phishers can also create fake login pages that also request one-time, two-factor authentication codes. That\u2019s why it\u2019s better to protect important accounts using <a href=\"https:\/\/www.kaspersky.com\/blog\/2fa-practical-guide\/24219\/\" target=\"_blank\" rel=\"noopener nofollow\">hardware-based authentication<\/a> with a USB key such as YubiKey or Titan Security Key by Google.<\/p>\n<p>Some authenticators use NFC and Bluetooth to connect to mobile devices. The advantage of using a hardware-based security key is it\u2019ll never disclose the secret on a fake website. A website needs to send the right request to get the right answer from the authenticator, and that\u2019s something only the real website knows how to do.<\/p>\n<h2>6. Use reliable protection<\/h2>\n<p>It\u2019s certainly hard to be on constant lookout for red flags and to check every single address, link, and so on. But it\u2019s a task you can automate, and you can rely on security solutions such as <a href=\"https:\/\/www.kaspersky.com\/advert\/security-cloud?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksc___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security Cloud<\/a> to protect against phishing. The cloud-based protection will notify you in time if you try to go to a malicious page and will block the threat.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>How to spot dangerous links sent in messages and other tricks scammers use to steal your data.<\/p>\n","protected":false},"author":2581,"featured_media":42318,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[1218,187,76,131],"class_list":{"0":"post-42317","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-2fa","9":"tag-passwords","10":"tag-phishing","11":"tag-tips"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing\/42317\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/how-to-protect-yourself-from-phishing\/23462\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing\/18935\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing\/9495\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing\/25527\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/how-to-protect-yourself-from-phishing\/23602\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing\/23013\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/how-to-protect-yourself-from-phishing\/26200\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/how-to-protect-yourself-from-phishing\/25733\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/how-to-protect-yourself-from-phishing\/31634\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/how-to-protect-yourself-from-phishing\/10132\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/how-to-protect-yourself-from-phishing\/17848\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/how-to-protect-yourself-from-phishing\/18254\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/how-to-protect-yourself-from-phishing\/15380\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/how-to-protect-yourself-from-phishing\/27535\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/how-to-protect-yourself-from-phishing\/24440\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/how-to-protect-yourself-from-phishing\/29814\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/how-to-protect-yourself-from-phishing\/29613\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/tips\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/42317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=42317"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/42317\/revisions"}],"predecessor-version":[{"id":42321,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/42317\/revisions\/42321"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/42318"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=42317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=42317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=42317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}