This web site uses cookies to improve your experience. By viewing our content, you are accepting the use of cookies. To find out more and change your cookie settings, please view our cookie policy.

Search
  • Videos
  • Smart Cities
  • Windows 10
  • Cloud
  • Innovation
  • Security
  • Tech Pro
  • more
    • ZDNet Academy
    • Microsoft
    • Mobility
    • IoT
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
  • Newsletters
  • All Writers
    • Log In to ZDNET
    • Join ZDNet
    • About ZDNet
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Smart Cities
    • Windows 10
    • Cloud
    • Innovation
    • Security
    • Tech Pro
    • ZDNet Academy
    • Microsoft
    • Mobility
    • IoT
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
      • Log In to ZDNET
      • Join ZDNet
      • About ZDNet
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan
  • What are phishing campaigns?

    What are phishing campaigns?

    Phishing campaigns are fake and fraudulent messages and websites designed to dupe users into handing over their personal, sensitive and account information, from social media to banking.

    Published: March 17, 2015 -- 13:56 GMT (06:56 PDT)

    Photo by: Symantec

    Caption by: Charlie Osborne

  • What types of phishing campaigns exist?

    What types of phishing campaigns exist?

    You might see a sale promoted on Facebook which offers a link to a fake, malicious website, or most commonly, phishing campaigns are conducted through email. Messages are sent from criminals masquerading as legitimate businesses, banks, institutions and popular websites including Facebook, PayPal, Amazon and HSBC. Most campaigns are designed for the general public, but some "spear" phishing campaigns target specific groups and users.

    Published: March 17, 2015 -- 13:56 GMT (06:56 PDT)

    Caption by: Charlie Osborne

  • Give me an example?

    Give me an example?

    In this example, the UK's tax office HMRC is used in a phishing campaign. Aside from an illigitimate email address, a .ZIP file was attached containing malicious code.

    Published: March 17, 2015 -- 13:56 GMT (06:56 PDT)

    Caption by: Charlie Osborne

  • How do I recognize phishing campaigns?

    How do I recognize phishing campaigns?

    Phishing campaigns most often are found in email inboxes and through social media. An email from your bank may warn you of fraudulent payments or might promise you a tax refund. Most will be flagged up by your email provider, but check for spelling mistakes, attached files, and "click here" links. Most phishing campaigns will have a time limit to induce panic and more clicks. They may also be based on social engineering -- and you may be called by someone pretending to be a Microsoft or PayPal employee, or from an antivirus firm which has "scanned" and found problems on your PC.

    Published: March 17, 2015 -- 13:56 GMT (06:56 PDT)

    Caption by: Charlie Osborne

  • What could happen if I become a victim?

    What could happen if I become a victim?

    Phishing campaigns most often go after financial details. Your accounts may be compromised, and you may become a victim of identity theft if sensitive information has been stolen.

    Published: March 17, 2015 -- 13:56 GMT (06:56 PDT)

    Caption by: Charlie Osborne

  • How can I protect myself against phishing campaigns?

    How can I protect myself against phishing campaigns?

    Be vigilant online and trust your instincts -- if an email or sale promoted through Facebook looks too good to be true, it probably is. Always check email addresses for spoofing, be wary of clicking on shortened links and do not reveal sensitive information through email. Always check website addresses for legitimacy.

    Published: March 17, 2015 -- 13:56 GMT (06:56 PDT)

    Caption by: Charlie Osborne

  • What do I do if I become a victim?

    What do I do if I become a victim?

    If you still can, change your login details for accounts, and contact companies directly to let them know your account has been compromised. Keeping an eye on your credit score is also recommended so you know of any changes, and consider reporting issues to the authorities.

    Published: March 17, 2015 -- 13:56 GMT (06:56 PDT)

    Caption by: Charlie Osborne

  • 0
  • What are phishing campaigns?
  • What types of phishing campaigns exist?
  • Give me an example?
  • How do I recognize phishing campaigns?
  • What could happen if I become a victim?
  • How can I protect myself against phishing campaigns?
  • What do I do if I become a victim?
1 of 7 NEXT PREV

Your personal security guide: Phishing campaigns

What are phishing campaigns, why do they exist and how do I protect myself?

Read More Read Less

What are phishing campaigns?

Phishing campaigns are fake and fraudulent messages and websites designed to dupe users into handing over their personal, sensitive and account information, from social media to banking.

Published: March 17, 2015 -- 13:56 GMT (06:56 PDT)

Caption by: Charlie Osborne

Related Topics:

Security Security TV Data Management CXO Data Centers
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • Smart home suites match up devices for security and convenience

    Security

    Smart home suites match up devices for security and convenience

  • Adjust these Facebook privacy settings to protect your personal data

    Social Enterprise

    Adjust these Facebook privacy settings to protect your personal data

  • Social media cannot be trusted without these features

    Social Enterprise

    Social media cannot be trusted without these features

  • Facebook alternatives: Social apps you need to try

    Mobility

    Facebook alternatives: Social apps you need to try

ZDNet
Connect with us

© 2018 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Log In to ZDNET | Join ZDNet
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy