Page 27 - Cyber Safety C-5
P. 27

Phishing Risks: Unveiling the Hidden Depths












                                Fake Emails                                                     Look-alike Websites
                       Deceptive messages                                                       Mimicking real
                 mimicking trusted sources                                                      sites to capture
                                                                                                credentials
                          Urgent Messages                                                       Suspicious Links
                    Pressuring quick action                                                     Redirecting to
                    without careful thought                                                     harmful sites

                    Malware Attachments                                                         disguised as normal
                     Files installing harmful                                                   Impersonation
                   programs upon opening                                                        Gaining trust by

                                                                                                pretending to be
                                                                                                someone else

                 Phishing and Its Impact

                 Some effects of falling for phishing attempts are:

                     Loss of personal data: Sensitive details like passwords or PINs may be stolen.

                     Financial loss: Scammers may misuse card details or online banking access.

                     Account hacking: Social media or email accounts may be taken over.

                     Privacy breach: Private photos, messages or files may be exposed.
                     Device damage: Malicious links may install harmful software on the device.


                     Identity misuse: Stolen personal information may be used to impersonate the
                     victim.







                                                                                      Think twice before
                                                                                       clicking. A small

                                                                                      pause can stop a
                                                                                         big problem.








                                                                                         Phishing: Don't Get Hooked  25
   22   23   24   25   26   27   28   29   30   31   32