Find a Question:
BlackBerry Tips to protect yourself from malicious attacks via chat applications
Company published a BlackBerry blog post where several tips to protect the user from malicious attacks through the application of its own chat included BBM , which possesses very popular among users and won numerous awards, and other chat applications.
BlackBerry company is constantly working to develop an application BBM chat and converted from the application of an integrated system that combines chat and the possibilities of social networks and commerce and brands.
Develops Mnfzu cyber-attacks of their methods and their techniques wave against the IT systems on an ongoing basis, and considers this technology systems to ensure safe when its weakest link of the human element.
While many new hackers prefer to target ordinary users, rather than the technical systems, and can be regarded as intruders professionals as they do, and using different advanced technologies, easily imitating and falsifying personal details such as names, images, signs, and to circumvent the required rhythm of the person.
In spite of owning scammers different goals and different techniques but there are some things in common between them, and users can pick up those things and try to link what is happening stick together to see the fraud and phishing clearly.
Some of the points that you should know when you see them the possibility of danger
BBM receive a message or a request from an unknown destination.
The disposal of one of the contact, known to have the BBM strangely and talk differently about their personality.
The existence of misspellings or grammatical strange in certain details such as your name or any other information.
The receipt of a non-personal and the public is a sign of danger because the sender did not address everyone they know.
The sender request unusual or unexpected demand, such as money or log in to your account on BBM details.
Messages arrive Pfozk stating something like profit for the lottery, which did not participate in it at all.
Messages that are in your name directly from an undisclosed location and alert you that you will suffer dire consequences that did not respond to requests immediately.
The appearance of the page or the sender account is unusual or suspicious, such as to be completely devoid of updates.
Verification of the person doing the asking or request certain information
The success of phishing attack on a target person and the extent of his commitment and his attention when exposed to an attack, as can rigging many minor details such as names and photos easily, and uses a striker like those details to gain access to the most important information, and fail when the attention of the targeted individual and his closer look at things.
So it is important to always examining the request twice when a question or request sensitive information such as personal or information regarding business information, and you make a direct and personal interview with the contact you have on BBM and ask them to answer personal questions or provide information to prove their identity, such as “the He won the withdrawal of the company this week, “or like,” What we did last Friday, “should sound the alarm in case of evading the answer, or his inability to remember such simple personal details.
Attention dramatically ties and sites
The have someone sends you a link you through BBM, and can be a link tempting to do by clicking on it immediately, especially if you trust the sender, but you have to be careful at this point as one of the most common techniques used by fraudsters They convince you by clicking on link seem important, but they are actually directs you to are designed to steal your information sites.
A good rule here is that you are given any link received in reverse any from back to front, where is the most important part of any address on the Internet is to the far right of any segment that precedes the .com, .net, which refers to the address range, which should point clearly to the actual company name.
The resort phishers attempt to Aihamk through the use of the name well-known company as an area of sub-core area such as http://www.google.randomgarbagecharacters.com, and through the read link in reverse, we find that the actual site on the web is randomgarbagecharacters.com.
Therefore, the user must pay attention to the links that he clicks it by reading the URL from the right title to the left, as you must check the main page of the site carefully, often Predators design sites well in an attempt to mimic a particular brand but not ideal .
Keep a Bhdoik
There is a large possibility that misses person when it breaks under pressure, a technique that relies on scammers dramatically, and are a lot of scams because of the pressure or the wheel, and does a lot of scammers put the victim under psychological pressure or nervous to make sure of the speed of response, and do what they ask for it without The question as to why.
Therefore, the user should be calm and asking himself why should I do it? And why the well-known company to send such things to me? And why you need someone in my account details Express to verify that it is infiltrated?
What you should do if you are the victim
There are some steps and measures that the user must do when someone managed to get on his or her BBM account, such as:
Change passwords for all e-mail and its No. BlackBerry definition, banking and social networking sites accounts.
To alert the financial institutions, especially credit card companies, which deal with allegation of a breakthrough or a scam.
Use chat another account that has not BBM contacts to inform its own that has been compromised BBM its own account and that they may receive suspicious messages from that account.
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!