<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Phishing Archives &#8211; IT Support Services in Huddersfield, Yorkshire</title>
	<atom:link href="https://www.probado.co.uk/category/phishing/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.probado.co.uk/category/phishing/</link>
	<description></description>
	<lastBuildDate>Thu, 10 Jun 2021 13:42:16 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.probado.co.uk/wp-content/uploads/2017/10/favicon-1.png</url>
	<title>Phishing Archives &#8211; IT Support Services in Huddersfield, Yorkshire</title>
	<link>https://www.probado.co.uk/category/phishing/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Spotting spam: how to identify a phishing email</title>
		<link>https://www.probado.co.uk/spotting-spam-how-to-identify-a-phishing-email/</link>
					<comments>https://www.probado.co.uk/spotting-spam-how-to-identify-a-phishing-email/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Thu, 10 Jun 2021 13:39:34 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Phishing email]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2986</guid>

					<description><![CDATA[<p>Phishing emails have become increasingly common and are now often accepted as part of our day-to-day lives online. While some are super easy to spot (we’re talking mysterious royals with terrible spelling offering you billions of pounds to simply click their link), others can be harder to</p>
<p>The post <a href="https://www.probado.co.uk/spotting-spam-how-to-identify-a-phishing-email/">Spotting spam: how to identify a phishing email</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-2992" src="https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email-190x114.jpg 190w" sizes="(max-width: 2492px) 100vw, 2492px" /><br />
Phishing emails have become increasingly common and are now often accepted as part of our day-to-day lives online.</p>
<p>While some are super easy to spot (we’re talking mysterious royals with terrible spelling offering you billions of pounds to simply click their link), others can be harder to detect and can easily fly under the radar.</p>
<p>Our team has identified some small things that you can look out for and best practice habits to ensure you don’t fall victim to a malicious email.</p>
<h2>What is a phishing email?</h2>
<p>One of the best ways to avoid falling prey to a phishing email is to first educate yourself about them, what they are hoping to achieve and how they work.</p>
<p><a href="https://www.probado.co.uk/cyber-security-jargon/">Phishing</a> is a method that hackers use to try and trick ordinary people into providing personal details, bank details, access to devices or networks, or money.</p>
<p>They do this by creating copycat emails designed to look like legitimate people, businesses or organisations.</p>
<p>It is worth noting that phishing isn’t a practice that is exclusive to emails. Phone calls, text messages and even some postal communications can be phishing for your details.</p>
<p>Common phishing attacks will aim to look like an individual’s bank, courier service, online shopping outlet or a Government agency such as HMRC.</p>
<p>A lot of phishing tactics use fear to try to persuade unsuspecting individuals to act quickly, without thinking things through or looking too closely at the fake email. This could include threats of accounts being closed or compromised, or even police action being taken.</p>
<p>It is very unlikely that HMRC will email you threatening arrest, so stay calm and fully evaluate the email in front of you without making any hasty clicks!</p>
<h2>Spelling and grammar</h2>
<p>One of the easiest ways to spot a phishing email is through spelling mistakes and grammar issues.</p>
<p>If you suspect an email is fake, read through it carefully and identify any errors. These may be minor, but they can be a useful indicator that an email is fraudulent.</p>
<p>Some fraudsters are very good at disguising discrepancies, so give the email a thorough check before taking any action.</p>
<p>Also check logos and company names. For example, two letter ‘N’s next to one another can easily be read as an ‘M’ at a glance. Or a zero as the letter ‘O’.</p>
<p><img decoding="async" class="size-full wp-image-2993 alignnone" src="https://www.probado.co.uk/wp-content/uploads/2021/06/Phishlabs.png" alt="" width="662" height="440" srcset="https://www.probado.co.uk/wp-content/uploads/2021/06/Phishlabs.png 662w, https://www.probado.co.uk/wp-content/uploads/2021/06/Phishlabs-300x199.png 300w, https://www.probado.co.uk/wp-content/uploads/2021/06/Phishlabs-160x106.png 160w, https://www.probado.co.uk/wp-content/uploads/2021/06/Phishlabs-90x60.png 90w, https://www.probado.co.uk/wp-content/uploads/2021/06/Phishlabs-190x126.png 190w" sizes="(max-width: 662px) 100vw, 662px" /></p>
<p><a href="https://info.phishlabs.com/blog/eliminating-the-threat-of-look-alike-domains">Source: PhishLabs</a></p>
<h2>Too good to be true</h2>
<p>If you receive an email that seems too good to be true, then it probably is! It is very unlikely that your bank will email you about winning millions of pounds. Be wary of any offers that arrive in your inbox.</p>
<p>While lots of brands do communicate offers and deals via email, keep a look out for any that seem to go above and beyond and always check their websites for corresponding messaging.</p>
<p><img decoding="async" class="size-full wp-image-2994 alignnone" src="https://www.probado.co.uk/wp-content/uploads/2021/06/Scam-detector.jpg" alt="" width="501" height="460" srcset="https://www.probado.co.uk/wp-content/uploads/2021/06/Scam-detector.jpg 501w, https://www.probado.co.uk/wp-content/uploads/2021/06/Scam-detector-300x275.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2021/06/Scam-detector-131x120.jpg 131w, https://www.probado.co.uk/wp-content/uploads/2021/06/Scam-detector-65x60.jpg 65w, https://www.probado.co.uk/wp-content/uploads/2021/06/Scam-detector-190x174.jpg 190w" sizes="(max-width: 501px) 100vw, 501px" /></p>
<p><a href="https://www.scam-detector.com/article/lottery-winner-donation-scam/">Source: Scam Detector</a></p>
<h2>Personal details</h2>
<p>Spot a phishing email by identifying what it is asking you to do. If it is asking you to provide personal details (such as address, bank details, national insurance number, etc), it is probably spam.</p>
<p>We recommend you contact the alleged sender via another method (for example a phone call or live chat feature on the legitimate site) to determine if the request is genuine.</p>
<p>All major organisations should have records of emails and requests for information so will be able to advise you on how to proceed.</p>
<h2>Check and check again</h2>
<p>Always double check emails before sending any information or clicking any links. You may have missed a vital clue in the first read, so give it a second look for good measure.</p>
<p>A handy tip is to check both the display name and the email address. When viewing emails on a mobile device, it is often just the display name that is visible at a first glance, which offers hackers a simple way to hide.</p>
<p>Check the email address before proceeding. People generally know the email addresses and domain names of their bank providers and any other businesses or organisations they use, so it can be easy to spot any fakers!</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-2995 alignnone" src="https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-scaled.jpg" alt="" width="2560" height="1529" srcset="https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-scaled.jpg 2560w, https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-300x179.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-1024x611.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-768x459.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-1536x917.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-2048x1223.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-190x113.jpg 190w" sizes="auto, (max-width: 2560px) 100vw, 2560px" /></p>
<p><a href="https://www.dpdlocal.co.uk/content/about_dpd/phishing.jsp">Source: DPD Local</a></p>
<h2>Click savvy</h2>
<p>If you think an email is suspicious, please do not click the link. If you want to check the message out by heading to an official site, do so by opening up an independent, secure browser and visit the site directly – do not click the link in the email.</p>
<p>Another useful tip is when you see a suspicious link, simply move your mouse pointer over the link, BUT DO NOT CLICK IT!</p>
<p>This will show you the true destination. If you click the link, these are often harvesting web sites which seek to secure more of your personal data. When cyber criminals have your data, its highly likely you will become the target of an exponential attack rate since your details will likely be traded with other malicious criminals and the circle continues.</p>
<p>Sometimes one click is all it takes for hackers to gain access, so don’t give them that opportunity! Head directly to the site on your own browser.</p>
<p>When it comes to suspicious attachments, we advise you reach out to whoever is supposedly sending them and verify that they are legitimate and safe. We also offer a FOC quarantine service to our clients to advise in these circumstances.</p>
<p>This can often occur in the workplace, so if a random attachment lands in your inbox that you were not expecting, the best thing to do would be to ask the person directly if it is truly them.</p>
<p>To avoid any issues, we suggest alerting someone if you need to send them an attachment and advise what method you will use to send this.</p>
<p>When you know what to look out for, it can be easy to spot a phishing email. Fraudsters often depend on quick, hurried actions so take your time and examine what is in front of you.</p>
<p>We work closely with security provider KnowBe4, with our clients using this platform to train staff on cyber security issues with increased awareness and accountability. Tools like this are fantastic to help minimise the costs of data loss and identify theft, all while helping employees to be more vigilant and aware of potential cyber threats.</p>
<p>For more information on KnowBe4 and how it can be implemented in your business, <a href="https://www.probado.co.uk/contact-probado/">get in touch</a> with our team via <a href="mailto:info@probado.co.uk">info@probado.co.uk</a>.</p>
<p>The post <a href="https://www.probado.co.uk/spotting-spam-how-to-identify-a-phishing-email/">Spotting spam: how to identify a phishing email</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/spotting-spam-how-to-identify-a-phishing-email/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Spooky Stories: Horror Stories from the World of IT</title>
		<link>https://www.probado.co.uk/spooky-stories/</link>
					<comments>https://www.probado.co.uk/spooky-stories/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Thu, 22 Oct 2020 10:29:59 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[World of IT]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2855</guid>

					<description><![CDATA[<p>It’s almost that time of year, pumpkins are being carved, costumes are being bought for (virtual) parties, and we’re stocking up on sweet treats. But be wary, you never know what horrors are lurking around the corner, or in your computer! We’ve rounded up some spooky stories</p>
<p>The post <a href="https://www.probado.co.uk/spooky-stories/">Spooky Stories: Horror Stories from the World of IT</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2854" src="https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-190x114.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /><br />
It’s almost that time of year, pumpkins are being carved, costumes are being bought for (virtual) parties, and we’re stocking up on sweet treats. But be wary, you never know what horrors are lurking around the corner, or in your computer! We’ve rounded up some spooky stories from the world of IT.</p>
<h2>Invisable Attacker</h2>
<p>In a phishing scam, described by cyber security expert and bug bounty hunter, Craig Hays as the greatest password theft he’s ever seen, the culprit was somehow able to fly under the radar, undetected even by the experts. In a blog for <a href="https://medium.com/swlh/phishing-with-worms-the-greatest-password-theft-ive-ever-seen-26d6ad4658f9">Medium.com</a>, Craig explained: “A typical phishing email comes from an email address you’ve never seen before. In this attack, however, all of the phishing links were sent as replies to emails in the compromised account’s mailbox. This gave every email an inherited sense of trust.”</p>
<p>The attacker used established email trails and trusted email addresses to trick victims into clicking. The original, legitimate email thread was maintained, also using the ‘reply all’ option to ensure everybody who was involved continued to receive the messages. This disguise within a legitimate conversation allowed the hacker to reply unnoticed and become part of an existing conversation.</p>
<p>So, how did Craig stop it? “We identified a pattern in the URL of the phishing pages being linked to which we could use to block them. Then we promptly rolled out Multi-Factor Authentication to anyone who didn’t have it.”</p>
<p><a href="https://www.probado.co.uk/password-security-for-smes/">Multi-factor authentication</a> (MFA) is a vital tool to help defend against cybercriminals, this can include factors such as pin codes, biometrics or card readers, in addition to a password.</p>
<h2>Hollywood Horrors</h2>
<p>In the world of IT, even famous figures are not untouchable. McAfee revealed that a group of celebrities were being used as bait for some dangerous cyberattacks. The <a href="https://www.dailymail.co.uk/sciencetech/article-8808985/Graham-Norton-named-dangerous-celebrity-search-online-UK.html">security firm’s research</a> found that searches for big names including Ricky Gervais, Ruth Jones, and Tom Hardy were to blame for leading people to suspicious sites. Graham Norton’s name was found to be the most likely term used by hackers to lure people into clicking on unsafe sites and potentially harmful pages.</p>
<p>McAfee fellow, Raj Samani said: “&#8217;We know that online criminals use consumers’ fascination with celebrity culture to drive unsuspecting fans to malicious websites that install malware on their devices. As cybercriminals continue to implement deceptive practices such as fake sites claiming to offer free content, it is crucial that fans stay vigilant about protecting their digital lives and think twice before clicking.”</p>
<h2>Scary Speakers</h2>
<p>Smart speakers and other devices are now <a href="https://www.probado.co.uk/internet-of-things/">commonplace in the home</a>, but are they getting a little too comfortable? Back in 2018, Amazon received numerous reports that their Alexa smart speakers were laughing at random times, completely unprompted. The scary chuckle was freaking out users across the world. Amazon has since explained that the device was mishearing what it believed to be the command, ‘Alexa, laugh’ and acting on that. The company has since reprogrammed the speakers to respond to the phrase, ‘Alexa, can you laugh?’ a clearer command with less chance of being misinterpreted.</p>
<p>An <a href="https://www.theverge.com/circuitbreaker/2018/3/7/17092334/amazon-alexa-devices-strange-laughter">Amazon spokesperson</a> said: “We are also changing Alexa’s response from simply laughter to ‘sure, I can laugh’ followed by laughter.”</p>
<p>We hope these spooky stories from the world of IT have got you in the Halloween mood, but remember there is a moral to every story. Whether that be to enable Multi-Factor Authentication or to be wary of inviting robots into your home, our team is here to help with any scary IT issues that may arise, get in <a href="https://www.probado.co.uk/contact-probado/">touch here</a>.</p>
<p>The post <a href="https://www.probado.co.uk/spooky-stories/">Spooky Stories: Horror Stories from the World of IT</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/spooky-stories/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
