Phishing is the act of attempting to steal a person’s data (e.g., name, address, phone number, SIN), credit card information, and other sensitive information by disguising oneself as a trustworthy source. While phishing has been around for a long time, even in modern times, people regularly fall victim to it.
Still closely identified with email, phishing attacks happen in a variety of different ways. A 2013 report from the anti-malware software firm Kaspersky determined that only 12 percent of registered phishing attacks are launched through spam emails. The majority of phishing attempts originated from fake websites, instant messaging software, mobile applications, and other channels.
This course teaches students how to recognize potential phishing attacks and how to defend against them.
Topics covered include: Recognizing threats that use email and instant messaging apps to harm the user, detailed information on phishing scams, malicious links, unsolicited attachments and more. The course covers the best practices on how to use email and IM apps in both personal and business environments, as well as:
– how to access security settings,
– how to setup a secure password,
– how to take advantage of two-factor authentication,
– how to easily keep track of recent security events, and
– finally, how to check which devices have access to your email accounts.
Please, find examples of phishing attack here.