Cybercrime Activities

معاينة

1. Cybercrime Threats

1.1. Phishing

I am sure that most of us have, at some stage of our digital life, received a request from a person pretending that they are a representative from a company which we deal with. They will usually request you to reveal personal information such as address, contact numbers and login details (including passwords) to specific sites. They may also provide a hyperlink where they request that e.g. your password be changed.  (This is referred to as a 'phishing' attack).

 

The golden rule when receiving such requests is the following:

  • Never give out personal information to a person/company that you do not know
  • Never list your personal information on social media sites
  • Never follow a link to change your password details without first checking that the request is legitimate.


Watch the videos below which will provide you with clear explanations of what phishing is as well as what 'red flags' you need to look out for when you are a victim of phishing.


York Information Services. (2015). What is Phishing? (CC licence) 

Protected Trust. (2018). Phishing Red Flags (CC licence)