Phishing

Phishing is a type of fraud where someone sends you a message, on behalf of www.jobspost.info or other reputable companies, and tries to get your username, password or credit card data.

The messages you receive will look very convincing and often resemble other official or trusted organizations, for example www.jobspost.info and can be in the form of e-mail, SMS, instant messages or other social media platforms. The purpose of this fraud is that you click on a link that will direct you to fake sites where you will be instructed to provide confidential information or you may have accidentally downloaded a “Trojan” virus or “Key Logging” program that will endanger the security of your data.

How can I recognize phishing experiments?

Common characteristics of a phishing message include:
  • The message sender does not say hello using your name.
  • There are often incorrect word spellings, improper sentence structures and inconsistent punctuation or graphics / images.
  • Request sensitive information or confirm your account security.
  • Impressed urgently – fraudsters often try to break your concentration by acting as if something is very important and requires sudden attention from you.
  • The message sender’s address often looks strange and suspicious.
  • Email / email is often accompanied by a suspicious attachment file – don’t open the file because it can contain malicious software or viruses.
  • The sender will instruct you to click the link to enter / sign in to www.jobspost.info  or open a certain attachment file.

What should I do if I suspect Phishing activity?
If you are in doubt about the validity of an email:
  • DO NOT respond to the email / email.
  • Immediately report it to www.jobspost.info, along with a copy / copy of the email / email.
  • Make sure your computer is protected with the latest anti-virus devices.
  • If you have had time to provide bank or credit card information, immediately contact your bank or financial institution to ask for the next clue.
  • Always be aware of suspicious emails / emails that request your personal information.

If you receive a suspicious email / email, the best step is to delete it immediately. Do not click on the link provided or reply to the e-mail, you may have accidentally downloaded the “Trojan” or “key logging” virus, which will endanger your security. By replying to the email, you will be at risk of receiving more and more emails from the same source of fraud.

Trojan

Malware is software / malicious software, or also called a Trojan virus, which if it enters a computer system will be dangerous, such as stealing personal data or financial information.

How to identify a Trojan?

You are strongly advised not to click on links or attachments in an email if you suspect the message is hoax or sent from an untrusted / unknown source. If you have clicked on a link and are worried, use antivirus / anti-malware software and scan your computer or electronic device. Signs that can be considered:

  • A suspicious message box appears asking for your personal or financial information, such as a credit card or date of birth.
  • Strange changes to your Internet Banking page, for example the message “upgrade” or “site is under maintenance”.
    Irregular site appearance, such as invisible columns or extra buttons.
  • The log-in process feels significantly slow.
  • The “Please Wait” message that appears after you press the “login” button.

I suspect a Trojan in my system. What to do?

Trust your instincts when you find suspicious things. If you feel there are “other”, immediately take action and MAKE SURE your security by:

  • Stop activity – close the browser or exit the application.
  • Looking for updates from security software (Antivirus / Antimalware)
  • Scan your computer / device to remove viruses.
  • Use another device, check whether there are abnormalities or payment history.
  • Report suspicious activity immediately.
  • Continue asking and asking for information if you still feel doubtful.
 

Leave a Reply

Your email address will not be published. Required fields are marked *