Must Understand! The Scary Realities of Phishing & How to Protect Yourself

Published: May 02, 2023 Duration: 00:09:56 Category: People & Blogs

Trending searches: what a phisher might get you to click
Introduction we all hear a lot about fishing attacks what is a phishing attack and how to protect ourselves from it by identifying a phishing email and there are many strategies which companies are using and doing to handle phishing emails like focusing on training and there are a lot of fishing games and exercises to interest the user to gain knowledge of identifying fishing emails and gamification with artificial intelligence and machine learning to solve the critical issue but there is hardly any video or training to help us understand why phishing email is so scary today we will explore and understand why phishing email is so scary Phishing Attacks before we proceed to the main learning objective let us learn about phishing attacks a basic understanding of phishing attacks is significant as it will form the fundamentals and grow from here so what is a phishing attack from any definition we will be told that fishing is a social engineering attack often used to steal user data including login credentials and credit card numbers it occurs when an attacker masquerading as a trusted entity dupes a victim into opening an email instant message or text message so protecting your username and password is very important do visit my other videos on how to protect your username and password the recipient is then tricked into clicking a malicious link which can lead to a malware Installation System freezing as part of a ransomware attack or revealing sensitive information the attack can be successful only when you click the link or install the application else phishing attacks cannot happen the last important part we need to know is that a phishing attack can have devastating results for individuals this includes unauthorized purchases the stealing of funds or identity theft this will sum up the definition of a phishing attack we already know what a phishing email is Why Phishing Emails and now we need to understand why we get phishing emails knowing why will allow us to handle phishing attacks better people are the weakest security Link in most business processes as we know in any cyber security process we the people are always the weakest link mistakes made by the legitimate user are much less predictable and more challenging to thwart than a malware-based intrusion 97 of people cannot identify a sophisticated fake email fake email nowadays is so real that people find it hard to identify let alone alert that this is a phishing email we can secure our networks computers systems and internet access to make it more challenging to compromise information with more protection on the rest of the entry points for making the attack hackers can only target the weakest link to hit on it's easier for hackers to use people to get other information and build schemes to get what they want these phishing emails will touch on the target's emotions like fear urgency and many other feelings and breaking into the network will need more effort and more resources with more effort and resources it means more money so fishing email is the cheapest to conduct the attack now let's get ready to understand the scary part of the phishing email How Phishing Attacks Happen we will understand how phishing attacks happen we must understand that when a user clicks on the link download and open the attachment or scan the QR code on the phishing email what is happening behind your system that makes this phishing attack work so when you click on the link open the attachment or scan the QR code you download malware into your system it is this malware that is creating havoc in your system without malware installed into the system nothing will happen here Types of Malware there will be six types of General malware which we will face in phishing attacks first will be ransomware this is a popular and scary name in the market now ransomware by its name you will know that it is asking for ransomware a kind of cyber crime ransomware will encrypt your machine and demand Bitcoin to unlock it your system data will be locked if you do not pay the ransom do you know that it is a crime for the victim to pay the ransom and as a victim there is no guarantee that the hacker will unlock your system after you pay the ransom they can either demand more Bitcoins or they will sell your data away on the dark web so protecting yourself from phishing attacks is essential and protecting yourself from this malware is critical second will be the Trojans when we talk about Trojans the Trojan course comes to our minds Trojans will create a back door to your system allowing the hacker to move in and out of your environment anytime so your data might be compromised daily without you knowing it this is as scary as it can be third will be the route kit this is not so common in the market route kit masks its existence with other software but might be easily identified as it will consume system resources so when your system resources are consumed you suspect something is happening and send it for repair fourth will be spyware by the name itself we can already guess that's by where we'll steal sensitive information from your system these can be sensitive data like credit card information username and password data that is stored in your system fifth will be viruses a scary word for us to hear viruses will republicate themselves by modifying other computer programs this with either make your system not function as well as before a shutdown your protective application like an anti virus making you more susceptible to attack last on the list will be worms worms spread across other computers and they are the ones that infect your network and comprise your company Network in a single attack how do we protect against malware this How to Protect Against Malware is the critical question when we learn about phishing attacks first we need to invest in a reliable anti-malware solution an antivirus program can provide a backstop to catch threats before your information gets compromised we will need excellent malware protection and this will protect most of the malware nowadays antivirus companies come out with managed endpoint protection which can even protect against zero-day attacks and advanced persistent threats another way to protect some of the malware will be to apply the latest updates to operating systems and applications having the latest patches and updates will keep rootkits at Bay Which Malware Can Protect You let us match which malware the current antivirus can protect us from do note that it must be irreputable and latest antivirus we have malware like Trojans virus spyware worms this will take down four of the six malware which phishing attacks will carry with them Applying Latest Updates remember we shared that another way to protect us from malware will be to apply the latest updates to operating systems and applications let's match what this will protect us from updating operating systems and applications will help to protect us from rootkits so now we have a total of five of the six malware what is missing here Ransomware yes the final malware which we did not account for is ransomware can you believe that there is still malware which we cannot protect so we are not 100 safe What is Ransomware what is ransomware ransomware is scary and ransomware is deadly regarding fishing attacks let's learn more about ransomware and what ransomware is ransomware is malicious software designed to block access to a computer system or a mobile device until the money is paid usually the hacker will demand Bitcoins as Bitcoins are not traceable so this is the best currency to use ransomware is a cyber crime ransomware is also referred to as cyber extortion therefore it is a cyber crime ransomware is often spread through phishing emails that contain malicious attachments or when a user unknowingly visits an infected website and then malware is downloaded and installed without the user's knowledge so now that we know the scary part of ransomware it is worth your time to be careful with emails and prevent yourself from being a phishing victim pissing is scary because you don't know which malware is hidden inside the phishing email so when you click on the link in the phishing email download the attachment or scan the QR scan when malware might be installed or all six malware into your system but remember we mentioned the two protection having a well reputable latest antivirus installed and updating the operating system you can protect 5 out of the sixth malware ransomware is malware which we cannot protect and remember ransomware will lock up your system and you will not be able to recover it unless you have a backup therefore do not fall prey to fishing which can cause you damage Outro I hope you have enjoyed this video and learned why fishing email is so scary subscribe to my channel and click the Bell icon to receive the latest update and finally please do like comment and share

Share your thoughts

Related Transcripts

A Preliminary User Experience Evaluation Of MISP Work In Progress   Borce Stojkovski thumbnail
A Preliminary User Experience Evaluation Of MISP Work In Progress Borce Stojkovski

Category: Science & Technology

Morning for my side my name is takovski and it's a pleasure to present to you the preliminary work that we are working on mess with respect to disability and user experience this is joint work with my supervisor gabriela lancini and we are from the center for security reliability trust at the university... Read more

You Clicked a Phishing Link...NOW WHAT? (3 steps) thumbnail
You Clicked a Phishing Link...NOW WHAT? (3 steps)

Category: Science & Technology

You clicked a phishing link panic! i clicked on a phishing link...or did i? i can't tell. as these attacks get more sophisticated, sometimes it's hard to be a hundred percent sure. whether it's a link in a text message or a downloaded email attachment, the important thing is that you take action immediately.... Read more

What Happens If You Click On Links In Phishing Emails? thumbnail
What Happens If You Click On Links In Phishing Emails?

Category: Howto & Style

Ages ago i made this video which was about phishing emails how to recognize them and what not to do specifically do not open attachments from them and do not click links in them i said i would follow up with the description of what happens if you do that it's taken me a really long time to get back... Read more

Microsoft's Cybersecurity Summit After CrowdStrike Outage -What You NEED to Know #shorts #microsoft thumbnail
Microsoft's Cybersecurity Summit After CrowdStrike Outage -What You NEED to Know #shorts #microsoft

Category: Science & Technology

You need to hear this if you're into cyber security just back from the microsoft cyber security summit let's break it down so after the big crowd strike outage microsoft came in hot with some major updates first up they've rolled out new aid driven threat detection this means faster response times and... Read more

How to Get Someone's Password thumbnail
How to Get Someone's Password

Category: Science & Technology

A question i get asked all the time is "can you help me hack into something?" and probably one of the most easy ways to hack into anything is to just get the password and login to it. so i thought i'd give you 64 ways to get someone's password in under 10 minutes. oh and as a disclaimer, don't do any... Read more

NVidia's Earnings Report: A Closer Look at the World's Most Valuable Stock Today | LiveNOW thumbnail
NVidia's Earnings Report: A Closer Look at the World's Most Valuable Stock Today | LiveNOW

Category: People & Blogs

Well one of the most anticipating earnings will be happening later today we're talking about nvidia the chip maker who has absolutely been on fire the last couple of years and now we will see what is in store for the future of ai and this bigtime chip maker so we want to bring in our next guest here... Read more

Windows BSOD Chaos - CrowdStrike's Faulty Update thumbnail
Windows BSOD Chaos - CrowdStrike's Faulty Update

Category: Science & Technology

Introduction what's up everyone? obviously you're not here because your flight was grounded. i hope everyone today is doing well with that. the massive outage that's actually happening today is not something that's actually affecting. i'd love to know how you're all doing with this outage and if it's... Read more

I Defeated MY STALKER on a CRUISE SHIP! thumbnail
I Defeated MY STALKER on a CRUISE SHIP!

Category: Entertainment

[music] hello i'm daniel and i'm on a freaking cruise ship baby which means for the first time in 3 months the stalker is not going to ruin my life we going to have a stalker free good time ar we now g oh wait no stalker no stalker no stalker all right let's cut the crap the stalker he's he's he's on... Read more

US Presidents Play Rocket League Tournaments 36 thumbnail
US Presidents Play Rocket League Tournaments 36

Category: Gaming

Saddle up boys we're going into another tourney donald john you guys ready to bring home a title once and for all yes sir joe can't wait for us to finally get a white title that we didn't get alone we can rock it together like a true roster thank god we dropped obama you know joey boy i'm ready to win... Read more

What to Do Immediately After You Click a Phishing Link thumbnail
What to Do Immediately After You Click a Phishing Link

Category: Science & Technology

It happens to the best of us. even if you're totally up to date on all the latest phishing scams, you might still fall for one. here's what to do if you click that link. first, disconnect your device from the internet to stop any malware from spreading to other devices on the network. next, back up... Read more

Peter Doocy Grills White House on Kamala Harris's Surprising Southern Accent thumbnail
Peter Doocy Grills White House on Kamala Harris's Surprising Southern Accent

Category: News & Politics

News is peter ducey asking the questions right now about hamas leaders and what they have done uh he was very clear in october 7th he has been very clear multiple times thereafter on what hamas has done and uh they have uh i mean they're it is a heinous murder what they did recently and what they did... Read more

Injury Makeup Using Liquid Latex How-to, Accident Victim Part 1 - Halloween Makeup Tutorial thumbnail
Injury Makeup Using Liquid Latex How-to, Accident Victim Part 1 - Halloween Makeup Tutorial

Category: Howto & Style

Intro hello today in this first video on extrem sfx do.com we are going to show you how to create custom latex cuts gashes and wounds transforming yourself into a bloody accident victim to do this you will need a few things liquid latex materials modeling wax flat plastic surface makeup sponges translucent... Read more