Phishing site is one of the most popular threats for Internet users. We should not only rely on our security products, it’s very easy to create a new phishing site with few changes on the source codes which hackers already had.
So, it’s time to identify phishing site by ourselves!
Domain: We recommend you remember some common domains(Google, Paypal, Apple, etc), before you login & pay, check its domain first!
Google Accounts: https://accounts.google.com/
Google Docs: https://docs.google.com/
Apple ID: https://appleid.apple.com/
HTTPS: Most of the login/pay pages use HTTPS to secure data-transfer(like the URL I mentioned above, URL begins with “https://”), don’t forget to check it![But now, some of phishing site also uses HTTPS, do not rely on it too much :-)]
Content: In some of phishing sites, its image quality is much lower than official site. And its content also has some spell error.
Link: Most of the phishing sites don’t maintain all of the links inside its page(usually copy from official site), or just link to itself, it’s also a good way to identify phishing site.
Trojan: They usually obtain system privileges, destory system, steal private user infomation, download/drop other malware
Backdoor: Hackers can use this to monitor & control your computer silently.
Worm: They spread through networks and replicate themselves on other connected computers, sometimes they steal private user infomation.
Virus: Most of them can infect other files, but most of the infected files can be restored to their normal conditions after the virus is cleared.
Exploit: They use the leaks of operating system or programs to get high privilege or attack your computer.
Hacktool: Hackers can use this to attack your computer, start DDoS attack, scan for leaks in computer, etc.
Adware: Usually bundled with free software, pop-up annoying ads, slow down computer speed.
PUA: Possibly Unwanted Application, these software usually have not very good reputation, bundled in some silent installers.
Macro: Macro viruses are a type of malware stored in Microsoft Office file/template macros. Once this file is opened, the macro will be run, activating the macro virus so it will reside in the Normal template. Afterwards, all auto-saved files will be infected with this macro virus.
Recently, ransomware become one of the most popular threats all over the world, it will encrypt your personal data and ask for some money(usually use Bitcoin). Although the master key of TeslaCrypt has become public and many antivirus vendors have created related decryptor, there are still lots of ransomwares which can not be decrypted.
Here are some tips to avoid ransomware infected your computer & encrypt your personal data.
Do not open any attachments inside Email which is from unknown source, Email is still the most used method to spread ransomware.
Always keeping your operating system & security software up to date.
Always keeping your browser & Adobe Flash Player up to date, some ransomware used exploits of browsers & Adobe Flash Player to infect your computer.
Regularly backing up your personal data, it can minimize losses after your computer infected by ransomware accidentally.