Why is data valuable as a service
Phishing: why your data is so valuable
Much of the criminal offenses committed on the Internet fall into the category of so-called phishing. New varieties keep emerging and those affected can be harmed in very different ways. But why are criminals interested in your data at all?
“Phishing” is a word creation that is derived from “fishing”. The spelling with "P" is due to the fact that this form of Internet fraud is primarily used to fish for passwords. However, phishing is also used when it comes to stealing other sensitive information, such as: B. login or account details, name and address.
The value of the data
How do the fraudsters get your data? There is no question that it is theft, but strictly speaking, in many cases the data is also “given away”. With classic phishing, you receive an e-mail or a short message that forwards you to a fake website under a pretext. This then looks like an official website from Amazon, PayPal or your house bank, for example. Here you will usually be asked to enter your login, credit card or account details. If you comply with this request, in the worst case scenario your account will be emptied a short time later or a large number of purchases have been made on your behalf. But that's not the only danger.
Personal data is more valuable today than ever before. A regular trade has developed among criminals as there are a multitude of potential buyers - including organized crime rings, identity thieves and spammers. The latter only need e-mail addresses to cash in heavily. Masses of mails, for example with potency drug offers, are then sent to huge mailing lists of addresses that have been stolen or bought. Every reply to such an email, every click on a link and every website that opens as a result brings the fraudsters money - on average up to 80 cents per click.
Crimes on your behalf
The e-mail address is often not only the starting point for spam, but also for the classic phishing e-mail, which asks for additional personal data or automatically installs malware on the computer. This can, for example, activate keystroke recognition that records passwords and user names when logging in and forwards them to the criminals. And if this happens, it's not just your own account that is at risk: once the scammers have gathered enough information about you, they can, on your behalf, include: Open bank accounts and use them for further criminal offenses. Such identity theft can, however, also be used to set up new social media accounts, post advertisements or initiate shit storms.
The so-called “spear phishing” (German “Speer”) can also be read more and more frequently: This is understood to be a targeted attack on an individual or a clearly defined group. For example, the fraudsters steal the e-mail addresses of a locally active sports club in order to send members a phishing e-mail from a local bank or savings bank. The "hit rate" is quite high in such a case, since the chances are good that some of the recipients are actually customers of the bank in question. If phishing emails are sent specifically to company executives, experts speak of "whaling".
How to spot phishing, we have you here summarized in 10 tips.
This is how the INTER CyberGuard protects you from phishing:
- Give narcissist close
- Whose bodies were found in Essex
- Which word has four time letters O.
- Which wine goes well with clam soup?
- How was IBM started
- How to say Kinnow in English
- What does the Indonesian word bootloop mean
- Are car buying services worth the money
- North Korea accepts foreign aid
- How can someone learn UiPath software
- How can astrology predict a person's future
- What should you not use Windex for?
- Amazon AWS is a breakthrough innovation
- How do we wage war against science
- Deliver to Amazon in Hajipur Bihar
- Who discovered eigenvalues of a matrix
- Ideas can be completely independent of the language
- Should the U.S. Postal Service be privatized
- What is under the Red Square Moscow
- Which Canadian company is the most innovative
- Should I join the law?
- What are some examples of personalization
- Why aren't ceramic motors built?
- How do I stop smoking hashish?