The Limited Times

Now you can see non-English news...

Here's how to protect yourself: The National Cyber ​​Network publishes the common phishing messages Israel today

2022-10-06T09:51:06.073Z


If you received a suspicious message asking you for details such as a credit card, password, social security number, etc. - it may be a phishing message • These are the most common messages


In text messages, e-mail and even on the networks: phishing messages are sent to new residents in order to "fish" their personal details, steal credit information, lock accounts on social networks and create additional damages.

In 2021, more than 2,500 cases of phishing attacks were reported to the National Cyber ​​System.

Now, the array presents the five common messages, which will also be updated online, so that you can defend yourself and be careful:

A phishing message from an impersonator from the electric company about a double payment:

Phishing message, photo: none

Did you receive a request that appears to be from a friend or from "customer service" to provide a code that was sent to you via sms?

Don't give up.

WhatsApp phishing message, photo: None

Your package is awaiting delivery.

Mail phishing message, photo: none

A phishing message impersonates via SMS to update account data.

Phishing message, photo: none

A phishing message posing as a payment arrangement to the electric company.

Phishing message, photo: none

How to detect phishing?

Sender address

: official organizations send messages from legitimate addresses of the organization and usually not from a Gmail address for example.

Also, there should be a match between the sender's name and the sender's address. 

Amateur wording and the target of a personal appeal

: spelling errors and poor wording can indicate impersonation.

Request for personal details

: Unless you have proactively registered for the website or made a purchase online, there is no reason to be asked for personal details such as passwords, codes and credit card details.

Referral to external websites

: impersonating websites try to mislead with an address similar to the real website address.

It is recommended to carefully examine the address of the site and make sure you have reached the right site, especially before providing details.

Attached files:

 It is recommended to test the opening of the attachment received in the email or the file that is requested in the link or in the application to be downloaded to your device. It is important to pay attention to whether it is a running file - a file that gives commands to the computer with an EXE extension. Sometimes a running file is also hidden in a file that looks legitimate. 

What should you do after detecting a phishing attempt?

Don't click and don't be clicked:

 In most cases of phishing messages, if you didn't click on the link or if you clicked and didn't fill in details, you can be calm. 

Check on the official website:

 instead of clicking directly on the link sent, you should check on the official website of the organization or company using a browser or a Google search.

If there is a personal area on the same website, you can check there if there is indeed a problem or a certain requirement as they may be trying to claim in the phishing message. 

Reporting to the National Cyber ​​System:

 By dialing 119 directly to the operational center of the National Cyber ​​System, any citizen and organization can report, consult and receive initial assistance.

It's free, it's simple and it works 24/7. 

Did you receive a message that does not appear here and you want to check if it is a phishing message?

Send the screenshot of the message and the link in the body of the text to the 119 center of the array by email at 119@cyber.gov.il or by dialing 119 directly.

were we wrong

We will fix it!

If you found an error in the article, we would appreciate it if you shared it with us

Source: israelhayom

All tech articles on 2022-10-06

You may like

Trends 24h

Latest

© Communities 2019 - Privacy

The information on this site is from external sources that are not under our control.
The inclusion of any links does not necessarily imply a recommendation or endorse the views expressed within them.