What Is a Phishing Attack? Tips on How to Protect Yourself

  1. Fake browser extensions
  1. Fake Apps
  1. DNS hijacking
  • Don’t click on links in emails, even if they seem to come from a reputable source. Instead, bookmark URLs to sensitive sites, that way you’ll always know you’re going to a real site and not a fake one designed to steal your data.
  • Look carefully at the content of the messages. Be on the look out for obvious typos, errors in the logo, and suspicious email addresses that don’t seem quite right. A crypto platform will not contact you from a Gmail address.
  • Use two-factor authentication (2FA). This extra layer of security adds an additional verification step, such as a code you receive by SMS or email. Many sites also use apps that generate authentication codes.
  • Don’t reuse passwords. As tempting as it may be, using the same password for multiple websites/logins makes you far more vulnerable if you become a victim. A study showed that 53% of people admitted to using the same password for multiple accounts. To help this, you can install a password manager on your computer or create your own system that helps you generate and remember them all.

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store