What is the phishing and which are your consequences?

Discovers how can steal your information through an email.

The phishing is one of the techniques more used in the theft of details, above all to level banking. Consists of the sending of an email in which the cybercriminals supplant the identity, in the majority of cases of a company very well-known, and in which request personal information and banking to the user. Through an included link in the email try redirect him to a website fraudulent so that introduces this information.

Your ingredients are the same that have one master copy, so much logos and images as links that redirect apparently to the website of the bank. An exact copy whose black spot usually be in the text, that usually contain grammatical errors or words that usually the mark not uses, and with which transmit emergency and fear so that the user carries out the stock that you request.

What types of phishing us can find?

There are different types of attack depending on the support, of the recipient or, even, of the information that wishes steal:

  • Phishing traditional (acquaintance also as Deceptive phishing): is the more common and corresponds with which have explained previously. The cybercriminal supplants the identity of a company with the intention of achieve our information delicate. The email usually include a link that redirects to a website fraudulent designed for steal the information of the users.
  • Malware-based phishing: the email sent for the hacker includes an attached file or a link to a website that contains malware. Download the first or click in the second it puts in looks for and capture of the personal details of the user, making good use of possible vulnerabilities of the device electronic. A modality of this kind of attack is the suplantación of a company of services that sends attached the bill of a bill in PDF format.
  • Spear phishing: what characterizes to this phishing is that usually be aimed to a company or, even, to a group of people specific with a profile determined. For execute it good, the ‘phisher’ usually do a previous study of your casualty for obtain a certain personal information (your name or address) that you allows, a posteriori, overcome the barrier of the mistrust and have more chances of success.
  • Pharming: more technical that the previous ones, allows to the hackers redirect the addresses website to a space false using a code catty. Thus, if the user introduces your credentials, it do in a website false, with all that that entails.

How protect you of the phishing

These attacks can have very negative consequences if arrive to good harbor, causing problems of privacy or economic in the event of theft of information banking. For be protégé before them you recommend:

  • Reinforce the security of your device, whether your personal computer or your mobile device, and keep updated the operating system, the web browser and the applications. A combination that can avoid you many problems economic.
  • Not introduce never your details staffs in a website to the one which have accessed through a mail. If yes the know, enters keying in the address in the web browser
  • Revise your accounts periodically, what you allow have controlled the movements that carry out in them and the total accumulated. If see some operation that not admit, put on immediately in touch with customer service (or with your manager) for solve it.
  • Remember that BBVA never you request your information banking for email or text message, so not the proportions for these channels.
  • Revise good the URL of the link that you have sent. Until the more minimum detail (a letter different, a point or a dash, for example) can be key for not fall in the trap. Additionally owe check that includes the ‘s’ after the ‘http’, unequivocal stamp of security. 
  • Verify that the sender of the email is correct. The cybercriminals usually use techniques for simulate that is the official sender, including some special character between they (bbv-to, for example) or changing some letter for another similar one (bbua).
  • Not follow reading the message if is extremely alarming or if you compels to take a decision in a period short of time. If gives some two cases, the bank contacts your customer for one via safer. 
  • Not download an attached file , more without happen it for an antivirus, unless know that comes of a source sure. The simple fact of go down it to your device, desktop or cell phone, active the agent catty.