As scammers become increasingly online, phishing attacks are also convincing individuals to click on malicious links and share sensitive information. Scammers put a lot of effort into making their messages genuine so it is more challenging to identify them. From phony emails to social media accounts the scams can capture your money and data.
Recently, Comedian Tanmay Bhat's Twitter (now X) handle was hacked, and scammers utilized the account to endorse a phoney meme coin, posting a link in the deleted tweet. The deceptive message tried to trick his 6.6 million followers into clicking on the fake link. Upon realizing the hack, Bhat used Instagram to alert his followers, saying, "My Twitter has been hacked. Please don't click on any links. Working to rectify it." He reassured everyone that he was trying to regain his account and advised them to be on the lookout.
Advertisement
What is Phishing Scam?
Phishing scams occur when frauds pose as someone you can trust in order to compel you into disclosing private information such as bank account details, passwords and personal information. They usually accomplish this by using phoney emails, messages or websites that appear authentic. It includes malicious links that can steal your login credentials or install malware on your device if clicked.
How to Protect Yourself from Phishing Scams?
Be careful about links from unfamiliar sources, particularly those that offer rewards, discounts, or calls for instant action. Cybercriminals often employ these methods to steal sensitive personal and financial data. Always check the validity of a link before clicking to prevent falling prey to scams
To provide an extra layer of security, enable two-factor authentication (2FA) on all of your important accounts. This additional security keeps scammers and hackers away from your account, even if your password gets stolen. It's a quick and easy method to safeguard your internet presence
To avoid unwanted access consider not using the same password for several accounts. Use a mix of uppercase and lowercase letters, numbers, and special symbols to create strong passwords. Consider using a reliable password to securely store and manage login credentials
Even verified social media handles can be hacked and utilized for scams, tricking followers into thinking they are getting the correct information. In Tanmay Bhat's instance, his X (formerly Twitter) handle was hacked to promote a fake meme coin, illustrating how trust is abused by scammers. Be wary of tweets, even from verified handles, and check facts before reacting
Scammers make imitated websites that are very similar to actual sites in order to deceive users into submitting personal information. Always ensure HTTPS in the URL, search for spelling errors, and check sender information before clicking on any links or sharing sensitive information. Taking a few seconds to authenticate can avoid possible financial or identity fraud
In case you have fallen into a trap of phishing attacks don't panic. Notify your bank, social networking platform, or cybercrime authorities right away.