Page 27 - Cyber Safety C-5
P. 27
Phishing Risks: Unveiling the Hidden Depths
Fake Emails Look-alike Websites
Deceptive messages Mimicking real
mimicking trusted sources sites to capture
credentials
Urgent Messages Suspicious Links
Pressuring quick action Redirecting to
without careful thought harmful sites
Malware Attachments disguised as normal
Files installing harmful Impersonation
programs upon opening Gaining trust by
pretending to be
someone else
Phishing and Its Impact
Some effects of falling for phishing attempts are:
Loss of personal data: Sensitive details like passwords or PINs may be stolen.
Financial loss: Scammers may misuse card details or online banking access.
Account hacking: Social media or email accounts may be taken over.
Privacy breach: Private photos, messages or files may be exposed.
Device damage: Malicious links may install harmful software on the device.
Identity misuse: Stolen personal information may be used to impersonate the
victim.
Think twice before
clicking. A small
pause can stop a
big problem.
Phishing: Don't Get Hooked 25

