Phishing Scam

Phishing scams involve cybercriminals attempting to trick individuals into revealing sensitive information such as passwords, credit card details, or personal details. These scams often rely on deception and disguise to appear trustworthy.

Phishing Scam

How is a Phishing Scam Executed

1. Email Phishing

Scammers send deceptive emails mimicking legitimate sources, such as banks or government agencies.

These emails often contain urgent requests for personal information or prompt users to click on malicious links.

2. Fake Websites

Scammers create fake websites that closely resemble legitimate ones.

Victims are directed to these sites through phishing emails, where they unwittingly provide sensitive information.

3. Social Engineering

Phishers may exploit social connections or manipulate emotions to gain trust.

They might pose as a friend, family member, or colleague to trick individuals into divulging confidential information.

What to Look Out For

Check the sender's email address for discrepancies or suspicious elements.

How to Protect Yourself

  • |01

    Be Skeptical

    Approach unexpected emails or messages with caution, especially if they request sensitive information.

  • |02

    Verify Communications

    Contact the organization directly using official contact details to confirm the legitimacy of any requests.

  • |03

    Use Security Software

    Install and regularly update reliable antivirus and anti-phishing software.

  • |04

    Educate Yourself

    Stay informed about common phishing tactics and regularly update your knowledge on cybersecurity.

Scam Reports for Phishing Scam

No Scam Reports Submitted