Technologies allow us to do a lot of things that were impossible to imagine a few years ago. The fact of being able to transfer to another part of the world without going to a physical bank, it is one of the facilities that technologies offer us.

Everything  seems easy and simple, with the main idea that everyone can do it from any part in the world. However, as all the good things in life, the facility of being able to do this kind of things on the Internet has a negative part, that maybe we didn’t expect .

One of the unexpected situation can be the Phishing, in which you are exposing a lot of information without know it..

Where does this term coming from?

The word phishing  comes from the English verb  “fishing”, In allusion to the objective phishing: Phis data, see who “Who bites the hook”. The phishing is executed by a phisher ( cybercriminal).

What does  phishing actually refer to?

Phishing  is a kind of cybernetic attack that has as an objective to achieve or/ and access  our personal and confidential information with the main point of using it  in order to supplant your identity andhave access to everything, that is, someone tries to get your data, keys, bank accounts, ID, your credit card numbers … in short, it is a theft of all that information you  ever had to put on the internet when you have made any kind of purchase.

This kind of theft happens, in most cases, without the user being aware of, when they received an  email with a reliable appearance, for example of a bank, a company with which you have contracted any service or a public entity.

In this email “the company” asks  the user to fill any fields in order to update specific personal information.

Main characteristics of the phishing email

  • Use of names of recognized well known organizations: Banks, public institutions, electrical…The email of the sender pretends to be from the company in question.
  • The body of the mail, presents the logo of the company or organization that signs the message.
  • The message urges the user to re-enter some kind of information that, in fact, the sender already possesses.
  • The message includes a link.

What is the objective of the phishing?

The goal of phishing is simply to use that information that  has been stolen, to be used by third parties, in this case the cybercriminal who had sent us the email through which we have been robbed of all personal information. From this moment and in this way, our statement is no longer such and passes into the hands of the phisher, to be used as they wish.

Follow us on Twitter and LinkedIn to stay up on the latest updates and remember that you can also subscribe to our blog!