The same applies here:

  • Do not open files, attachments or links from unknown recipients. Also be suspicious of attachments in emails from seemingly official bodies
  • Only follow requests in emails to download programs if you can find the corresponding file on the company's website (do not start a download via the direct link!
  • Do not respond to possible demands for money if your PC is blocked

Quishing – Note

Internet fraudsters try to obtain PINs or TANs and passwords through fake emails, by post or on the telephone. But everyone can protect themselves from phishing.

70 percent of Germans now do their banking online (BITKOM) . That's why credit institutions and payment services such as PayPal take extensive security measures to protect their Internet customers . Internet criminals try to circumvent this protection – through so-called phishing, for example.

The perpetrators send fake emails, so-called phishing emails , or appear as a trustworthy person on social networks. You want to force recipients to reveal personal information such as login details, passwords, transaction numbers, etc. Internet fraudsters lure their victims with fake emails and lead them to professionally designed websites. They should enter their access data there.

But phishing also happens over the phone . Fraudsters disguise themselves as employees of a credit institution, a technical support team or a call center and ask the person being called to provide confidential data under false pretenses.

Phishing letters can also end up in your mailbox. In official letters with Visa or Mastercard logos, fraudsters ask their victims to enter a security password online for internet payments due to increasing numbers of fraud involving payment card data. Before doing so, the victims must of course provide their own data. If this does not happen, the letter writers warn, the card will be blocked within 14 days. Transactions are then no longer possible.

Fraudsters can misuse the stolen personal data (“identity theft” = taking over someone else’s identity) and use the faked identity in the name of the injured party (transferring money, taking advantage of overdraft facilities, making online purchases, etc.). This results in considerable economic damage every year.

Companies are also increasingly affected by phishing attacks. Criminals aim to obtain company data or gain access to the company network in order to then sabotage it.

Tips to protect against phishing

Please note: Credit card companies will never send such letters and ask you to enter personal information on the Internet - not even for security reasons.

  • Be sure who you are dealing with. Check the address bar in your browser. You should become suspicious if there are even the slightest deviations. Add Internet addresses that you constantly need to your browser's favorites list.
  • Never click on the link provided in the email sent. Instead, try accessing the pages specified in the email via your bank's homepage (without typing them in the address bar).
  • As a general rule, credit institutions do not request confidential data from you by email, telephone or post. If you are unsure, be sure to consult your bank.
  • Do not transmit personal or confidential information (such as passwords or transaction numbers) via email.
  • Only follow requests in emails to download programs if you can find the corresponding file on the company's website (do not start a download via the direct link). In particular, do not open attached files. Use antivirus programs and firewalls .
  • Only provide personal data in the usual way within your credit institution's online banking application. If anything seems strange, disconnect and contact your bank.
  • End the online session with your bank by logging out. Do not just close the browser window or go to another website before logging out.
  • Check your account balance and account transactions regularly. This means you can react quickly if unwanted actions have taken place.
  • You should only enter your PIN and TAN if a secure connection has been established with your browser. You can recognize a secure connection by the https:// in the address bar: A small icon appears in the browser window, e.g. B. in the form of a padlock that symbolizes the respective security status (“closed” or “open”).
  • Only use your bank's official access software.
  • Only use wireless keyboards for online banking if they have built-in encryption. This also applies to the use of wireless LAN (WLAN).
  • Make sure you have basic protection for your hardware and software. Further information can be found in the police and BSI security compass

Phishing: checklist for emergencies

Phishing attempts are not easy to detect. Online fraudsters are becoming increasingly sophisticated in their ability to steal passwords and other access data. For victims of phishing, the police and BSI checklist provides crucial information in the event of an emergency. HERE

Also read: Tips for preventing spam and phishing


If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:

📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.

Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!

* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!


Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )