What is Phishing, its Types and How to Overcome It

Nowadays data leaks are rampant, many even report that someone registered a credit card in his name even though that person did not register a credit card anywhere.

These crimes are often carried out by The most dangerous hacker group in the world even in Indonesia also exists. They take advantage of security holes and victims’ negligence in order to steal identities.

Therefore, you are prohibited from providing your full identity on social media. Because this is a way for hackers to steal identities. Well, other actions hackers also do phishing.

For those who don’t know what phishing is, let’s read this article to the end!

What is Phishing?

What is Phishing

What is Phishing

Phishing is an illegal act in which the perpetrator uses techniques to trick the victim in order to obtain data information.

This data information can be in the form of personal data ranging from name, date of birth, address, name of parents. Not only that, it can be in the form of account data (username and password), as well as financial data such as bank account information, credit cards and accounts.

The word phishing also comes from the word “Fishing” which means fishing. Unwittingly, this phishing activity aims to lure victims to provide important information voluntarily.

Usually, phishers do this by claiming to be an authorized institution, party or institution. The trick is quite intentional, using websites and e-mails that have been faked, so that it looks very convincing.

What is the Phishing Result Information Data Used for?

What is Phishing

Phishing Information

Most of this phishing data information is used to deceive victims or it can also be sold to other parties so that they can be used for account abuse actions.

This cyber action is indeed very dangerous, especially if the data provided is financial information. If you take personal data such as contacts, then you will often get fraudulent SMS or SPAM.

There is also a phishing network that nets victims as if they won a lottery and must send tax money. If the victim lacks insight and is easy to believe, usually he will immediately be trapped.

Rarely Known Types of Phishing

It turns out that there are many types of phishing that are rarely known. Well, here are the types of phishing:

1. Phishing Emails

What is Phishing

Phishing Emails

The first type of phishing is Phishing Emails. As the name implies, this phishing email uses the email platform to carry out its actions.

Don’t you know? According to the data there are about more than 3 billion phishing emails sent every day. Wow! Can you imagine how many victims were trapped?

Therefore, you must know how to find dangerous phishing emails so you don’t get caught by the perpetrators. Usually phishing emails are in the form of attractive offers, links that have been inserted malware and so on.

2. Web Phishing

What is Phishing

Web Phishing

The next type of phishing is Web Phishing. Not much different from phishing email, web phishing only differs on the platform of use. Yups, this phishing web uses a fake website to trick its victims.

Usually phishing websites are made in such a way that they are similar to the official website and use a similar domain. Don’t get trapped!

Because web phishing usually asks you to fill in data. Well, this data can be the most frequently stolen information by hackers, especially your financial account information.

3. Spear Phishing

What is Phishing

Spear Phishing

The next type of phishing is Spear Phishing. Just like email phishing, spear phishing uses email as a platform for its malicious actions.

The difference is that spear phishing acts by sending massive and random emails. However, the target victims are only certain people.

Usually this method is done if the perpetrator already has information such as name, address, occupation and so on. Therefore, you need to be wary of offer emails.

4. Whaling

What is Phishing


The last type of dangerous phishing is Whaling. Whaling is a phishing act that not only targets individual victims, but also individuals who have high authority in an organization.

Usually those who are stuck with whaling are business owners, company directors, managers and so on. This phishing act is very profitable because it targets people who have direct authority.

How Does Phishing Work?

Manipulating information and exploiting the negligence of potential victims is the way phishing works. Well, here’s roughly how phishing works.

1. Perpetrators Choose Potential Victims First

What is Phishing

Perpetrators Choose Potential Victims First

The first way, of course, the perpetrator will choose and determine who is the target of the victim. Usually the target victim is the person who most often uses the e-Wallet application to make online payments.

In addition, perpetrators also often target platforms that have security holes that are quite vulnerable. This makes it easier for them to get more information.

2. Perpetrators Determine Phishing Goals

What is Phishing

Perpetrators Determine Phishing Goals

Furthermore, if the perpetrator has determined the potential victim, the perpetrator will determine the purpose of the phishing. For example, to get a username, social media password, financial account information or other information.

There are even perpetrators who want to get all the information! That’s why you have to know the characteristics of phishing. That way, you will not feel lost.

3. Perpetrators Create Phishing Media

What is Phishing

Perpetrators Make Phishing Media

Then to launch the action, the account perpetrator makes his phishing media like a fake website. Usually these fake websites are made in such a way to look similar to the original.

Not only that, perpetrators will create similar domains and provide convincing content. That way, potential victims will feel cheated and believe that the website is genuine.

4. Potential Victims Access Phishing Media

What is Phishing

Potential Victims Access Phishing Media

After the phishing media has been created, the perpetrator will distribute it and make copywriting that can convince the perpetrator to access it.

Usually the perpetrators spread this phishing using official email or it could be in the form of a link sent in email, SMS or even chat applications such as WhatsApp.

5. Potential Victims Follow All Instructions

What is Phishing

Potential Victims Follow All Instructions

Next, potential victims who click on the link and believe in the phishing website, will follow all the instructions. One of them is to fill in important data.

If the potential victim has filled in the data, then the perpetrator has achieved his goal. Oh yes, other instructions for victims are also asked to update information, even make payments!

6. Victim Data Used by Perpetrators

What is Phishing

Victim Data Used by Perpetrators

Finally, the victim who has filled in the information data, the account perpetrator uses the data. Such as selling the data information to third parties, selling it for advertising or political purposes.

There are also those who are used to carry out fraudulent actions, break into their financial accounts and use the information for online loans on behalf of the victim.

Also Read: Tips to Protect Personal Data on the Internet from Hackers

How to overcome so as not to become a victim of phishing

For those of you who don’t want to be a victim of phishing, let’s take the following steps!

1. Update Phishing News

How to Overcome Phishing

Phishing News Update

The first way to prevent being trapped by phishing is to always update news about phishing. Because cyber crime is always developing and the news will always provide the latest updates on this.

In addition, cultivate curiosity about internet security and update account data leaks online. That way, you can avoid phishing.

2. Make sure the browser is updated

How to Overcome Phishing

Make sure the browser is updated

Next, make sure the browser you are using is updated. It aims to protect data security and user privacy.

When the browser is updated, there will be improvements to security holes, features and so on. Therefore, it is recommended that you activate the Automatic Update status in the browser.

3. Routinely Check Online Accounts

How to Overcome Phishing

Routinely Check Online Accounts

Next is that you have to regularly check your online account. Yups, if you have registered on various platforms and don’t use them anymore, it’s better to delete the data or delete the account permanently.

This is so that you can eliminate traces of the data. If you don’t want to be deleted, another alternative is that you are required to regularly change your social media password. So that your tracks are not detected.

4. Use Two-Factor Authentication

How to Overcome Phishing

Use Two-Factor Authentication

Then you can also use the Two-Factor Authentication feature to prevent becoming a phishing victim. This feature uses a 2-step verification system.

This will make it difficult for perpetrators to force their way into your account. If you do not activate this feature, then the perpetrator has username and password data, then you have no protection for your account.

5. Don’t Just Click the Link

How to Overcome Phishing

Don’t Just Click the Link

Furthermore, to prevent becoming a victim of phishing, do not carelessly click on incoming links. The key is you have to point the link and see the hover on the left of the browser.

If the intended link is an official link then it is not a phishing link. However, if the link received is different and looks fake, it could be a phishing link to ensnare you.

6. Don’t Provide Data Information

How to Overcome Phishing

Don’t Provide Data Information

Next, never give your data information. Yups, you have to be suspicious if someone asks for your personal data. Especially if the destination site is not the official site.

Oh yes, now there are many online shops that create websites and provide transactions without having to register first. Well, you better choose not to register, the point is to minimize data abuse.

7. Ensure the Security of the Websites Accessed

How to Overcome Phishing

Ensure the Security of the Websites Accessed

Next, make sure the security of the website you are accessing is safe. The point is to avoid misuse of personal or financial data.

Make sure you make transactions on websites that already use SSL! Websites that use SSL are marked with the use of the HTTPS protocol. This HTTPS protocol ensures that online activities on websites are secure.

8. Routinely Scan

How to Overcome Phishing

Routine Scan

Finally, make sure you always do a scan. This scan is done so that the file you download is detected to have a virus or not.

In addition, to track whether your PC has been infected with malware. Well, to do this scan you only need the best antivirus such as SMADAV, AVG, Avast and so on.

So, how are you smart? Now you know what phishing is, how phishing works and how to avoid phishing. Oh yeah, don’t forget to share this article with your friends, okay?

Other Interesting Articles!

Do not forget to LIKE we are Facebook, Follow Twitter and Instagram TipsPintar.com. Plus, so you don’t miss interesting videos from us, don’t forget Subscribe YouTube Channel TipsPintar.com

Leave a Reply

Your email address will not be published.