%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 30 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 32 0 R /I2 33 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250609050938+00'00') /ModDate (D:20250609050938+00'00') /Title (Report 06-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R 18 0 R 20 0 R 22 0 R 24 0 R 26 0 R 28 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 7076 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 38.777 521.469 707.957 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 38.777 l 565.984 38.777 l 565.984 745.984 l f 45.266 746.734 m 45.266 38.777 l 46.016 38.777 l 46.016 745.984 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(HOW TO RECOGNISE A PHISHING WEBSITE)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Over the past few years, as phishing started to gain a stronger foothold closer to home, we've tried to give you tips on how )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(to recognise the typical phishing email. However, recognising the email is just the first step. The actual danger is in the )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(website you reach after you've clicked the link. This is where your information is harvested to be used maliciously later.)] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(Considering Google is the expert on the internet, we've consulted their guide to recognising a phishing website. Here's )] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(what they say:)] TJ ET BT 61.016 561.505 Td /F1 9.0 Tf [(1. What is phishing?)] TJ ET BT 61.016 541.516 Td /F4 9.0 Tf [(Phishing is a particularly popular scam in which a party creates an official-looking web page that asks you to provide your )] TJ ET BT 61.016 530.527 Td /F4 9.0 Tf [(username and password, or other personal information such as your Social Security number, bank account number, PIN )] TJ ET BT 61.016 519.538 Td /F4 9.0 Tf [(number, credit card number, or mother's maiden name or birthday.)] TJ ET BT 61.016 497.749 Td /F4 9.0 Tf [(In many cases, you'll receive a link to this phishing page via an email which claims to come from an official-looking \(but )] TJ ET BT 61.016 486.760 Td /F4 9.0 Tf [(probably forged\) address. You can also end up at these pages by following links that you find on the web or in IM )] TJ ET BT 61.016 475.771 Td /F4 9.0 Tf [(messages.)] TJ ET BT 61.016 452.812 Td /F1 9.0 Tf [(2. How can I tell if a page is a fake?)] TJ ET BT 61.016 432.823 Td /F4 9.0 Tf [(The best thing to do is to check the page's URL to make sure it's actually controlled by the party it appears to be controlled )] TJ ET BT 61.016 421.834 Td /F4 9.0 Tf [(by. The crucial part of the URL is the part between the HTTP:// and the next slash \('/'\). \(If there's no slash, start at the end )] TJ ET BT 61.016 410.845 Td /F4 9.0 Tf [(of the URL.\) This is the part of the URL that determines site ownership. Some popular domains, for instance, are amazon, )] TJ ET BT 61.016 399.856 Td /F4 9.0 Tf [(google, and eBay:)] TJ ET 0.373 0.169 0.255 rg BT 61.016 378.067 Td /F4 9.0 Tf [(http://www.amazon.com)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 376.916 m 157.046 376.916 l S 0.153 0.153 0.153 rg BT 157.046 378.067 Td /F4 9.0 Tf [()] TJ ET 0.373 0.169 0.255 rg BT 61.016 367.078 Td /F4 9.0 Tf [(http://www.google.com)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 365.927 m 152.051 365.927 l S 0.153 0.153 0.153 rg BT 152.051 367.078 Td /F4 9.0 Tf [()] TJ ET 0.373 0.169 0.255 rg BT 61.016 356.089 Td /F4 9.0 Tf [(http://www.ebay.com)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 354.938 m 144.545 354.938 l S 0.153 0.153 0.153 rg BT 144.545 356.089 Td /F4 9.0 Tf [()] TJ ET BT 61.016 334.300 Td /F4 9.0 Tf [(In some cases, URLs will be a bit more complex; be sure to check the name listed immediately to the left of the top level )] TJ ET BT 61.016 323.311 Td /F4 9.0 Tf [(domain \(.com, .net, .co.uk, etc.\).For instance,)] TJ ET 0.373 0.169 0.255 rg BT 246.596 323.311 Td /F4 9.0 Tf [(http://www.google.com)] TJ ET 0.18 w 0 J [ ] 0 d 246.596 322.160 m 337.631 322.160 l S 0.153 0.153 0.153 rg BT 337.631 323.311 Td /F4 9.0 Tf [(,)] TJ ET 0.373 0.169 0.255 rg BT 342.635 323.311 Td /F4 9.0 Tf [(http://news.google.com)] TJ ET 0.18 w 0 J [ ] 0 d 342.635 322.160 m 435.182 322.160 l S 0.153 0.153 0.153 rg BT 435.182 323.311 Td /F4 9.0 Tf [(and)] TJ ET 0.373 0.169 0.255 rg BT 61.016 312.322 Td /F4 9.0 Tf [(http://www.google.com/firefox/)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 311.171 m 181.562 311.171 l S 0.153 0.153 0.153 rg BT 181.562 312.322 Td /F4 9.0 Tf [(are all part of the same site. However,google.com.fraudulentdomain.com/login.htmlis )] TJ ET BT 61.016 301.333 Td /F4 9.0 Tf [(NOT! Neither is)] TJ ET 0.373 0.169 0.255 rg BT 125.528 301.333 Td /F4 9.0 Tf [(www.g00gle.com)] TJ ET 0.18 w 0 J [ ] 0 d 125.528 300.182 m 194.045 300.182 l S 0.153 0.153 0.153 rg BT 194.045 301.333 Td /F4 9.0 Tf [(\(note that in this URL, the letter o is replaced by the number 0\).)] TJ ET BT 61.016 279.544 Td /F1 9.0 Tf [(Tip)] TJ ET BT 74.516 279.544 Td /F4 9.0 Tf [(: Since a forged URL can look very similar to a genuine one, it's safer to use a bookmark you've created or to type the )] TJ ET BT 61.016 268.555 Td /F4 9.0 Tf [(URL into the location bar by hand instead of following links from your email. This is important for any page where you're )] TJ ET BT 61.016 257.566 Td /F4 9.0 Tf [(asked to log in or provider private information.)] TJ ET BT 248.594 257.566 Td /F1 9.0 Tf [(Additional Resources:)] TJ ET 0.373 0.169 0.255 rg BT 346.613 257.566 Td /F4 9.0 Tf [(antiphishing.org)] TJ ET 0.18 w 0 J [ ] 0 d 346.613 256.415 m 410.144 256.415 l S 0.153 0.153 0.153 rg BT 61.016 234.607 Td /F1 9.0 Tf [(3. How does Google know a page is bogus?)] TJ ET BT 61.016 214.618 Td /F4 9.0 Tf [(We use several techniques to determine whether a page is genuine, including the use of a blacklist containing pages that )] TJ ET BT 61.016 203.629 Td /F4 9.0 Tf [(have been identified as suspicious and/or misleading based on automated detection or user reports. Our software also )] TJ ET BT 61.016 192.640 Td /F4 9.0 Tf [(examines pages' content and structure in order to catch potentially misleading pages. Google Safe Browsing can't offer )] TJ ET BT 61.016 181.651 Td /F4 9.0 Tf [(perfect protection, so you should always be on the lookout for)] TJ ET 0.373 0.169 0.255 rg BT 308.147 181.651 Td /F4 9.0 Tf [(indications)] TJ ET 0.18 w 0 J [ ] 0 d 308.147 180.500 m 350.663 180.500 l S 0.153 0.153 0.153 rg BT 350.663 181.651 Td /F4 9.0 Tf [(that a site isn't what it appears to be. But Google )] TJ ET BT 61.016 170.662 Td /F4 9.0 Tf [(Safe Browsing can help identify and protect you against many of the sites designed to trick users.)] TJ ET BT 61.016 147.703 Td /F1 9.0 Tf [(4. What does an alert look like?)] TJ ET BT 61.016 127.714 Td /F4 9.0 Tf [(When we suspect that a page is bogus, an alert will appear on the page. The appearance of the alert will depend on your )] TJ ET BT 61.016 116.725 Td /F4 9.0 Tf [(browser, but they all look like this:)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 377.2342 157.0457 386.3917 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://www.amazon.com/) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 366.2452 152.0507 375.4027 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://www.google.com/) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 355.2562 144.5447 364.4137 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://www.ebay.com/) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 246.5957 322.4782 337.6307 331.6357 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (http://www.google.com/) >> endobj 20 0 obj << /Type /Annot /Subtype /Link /A 21 0 R /Border [0 0 0] /H /I /Rect [ 342.6347 322.4782 435.1817 331.6357 ] >> endobj 21 0 obj << /Type /Action /S /URI /URI (http://news.google.com/) >> endobj 22 0 obj << /Type /Annot /Subtype /Link /A 23 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 311.4892 181.5617 320.6467 ] >> endobj 23 0 obj << /Type /Action /S /URI /URI (http://www.google.com/firefox/) >> endobj 24 0 obj << /Type /Annot /Subtype /Link /A 25 0 R /Border [0 0 0] /H /I /Rect [ 125.5277 300.5002 194.0447 309.6577 ] >> endobj 25 0 obj << /Type /Action /S /URI /URI (http://www.g00gle.com) >> endobj 26 0 obj << /Type /Annot /Subtype /Link /A 27 0 R /Border [0 0 0] /H /I /Rect [ 346.6127 256.7332 410.1437 265.8907 ] >> endobj 27 0 obj << /Type /Action /S /URI /URI (http://www.antiphishing.org/) >> endobj 28 0 obj << /Type /Annot /Subtype /Link /A 29 0 R /Border [0 0 0] /H /I /Rect [ 308.1467 180.8182 350.6627 189.9757 ] >> endobj 29 0 obj << /Type /Action /S /URI /URI (http://www.antiphishing.org/consumer_recs.html) >> endobj 30 0 obj << /Type /Page /Parent 3 0 R /Annots [ 34 0 R 36 0 R 38 0 R ] /Contents 31 0 R >> endobj 31 0 obj << /Length 2341 >> stream 0.153 0.153 0.153 rg 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 483.184 521.469 274.800 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 483.184 m 566.734 483.184 l 565.984 483.934 l 46.016 483.934 l f 566.734 757.984 m 566.734 483.184 l 565.984 483.934 l 565.984 757.984 l f 45.266 757.984 m 45.266 483.184 l 46.016 483.934 l 46.016 757.984 l f 61.016 498.934 m 550.984 498.934 l 550.984 499.684 l 61.016 499.684 l f q 225.000 0 0 66.750 61.016 691.234 cm /I2 Do Q 0.153 0.153 0.153 rg BT 61.016 670.473 Td /F1 9.0 Tf [(5. How do I report a page that I think is phishing?)] TJ ET BT 61.016 650.484 Td /F4 9.0 Tf [(If you find a page that you believe is pretending to be another page in an attempt to steal users' information, please)] TJ ET 0.373 0.169 0.255 rg BT 520.997 650.484 Td /F4 9.0 Tf [(report )] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 520.997 649.333 m 547.007 649.333 l S BT 61.016 639.495 Td /F4 9.0 Tf [(it to us)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 638.344 m 87.530 638.344 l S 0.153 0.153 0.153 rg BT 87.530 639.495 Td /F4 9.0 Tf [(.)] TJ ET BT 61.016 616.536 Td /F1 9.0 Tf [(6. You're flagging a legitimate page as a potential phishing site. How do I get this fixed?)] TJ ET BT 61.016 596.547 Td /F4 9.0 Tf [(If you believe that Google Safe Browsing is incorrectly identifying a page as suspicious, please do)] TJ ET 0.373 0.169 0.255 rg BT 452.201 596.547 Td /F4 9.0 Tf [(report it to our team)] TJ ET 0.18 w 0 J [ ] 0 d 452.201 595.396 m 530.735 595.396 l S 0.153 0.153 0.153 rg BT 530.735 596.547 Td /F4 9.0 Tf [(. )] TJ ET BT 61.016 585.558 Td /F4 9.0 Tf [(We work hard to act quickly on all such reports.)] TJ ET BT 61.016 562.599 Td /F1 9.0 Tf [(7. Does this feature protect me against viruses, spyware, and all other evil things?)] TJ ET BT 61.016 542.610 Td /F4 9.0 Tf [(Sorry, but no Google Safe Browsing protects against phishing and malware attacks, but it can't offer foolproof protection )] TJ ET BT 61.016 531.621 Td /F4 9.0 Tf [(\(although we're working on it\). You still need to watch out for all the other bad things that can happen on the wild, wild web.)] TJ ET 0.400 0.400 0.400 rg BT 61.016 513.132 Td /F2 9.0 Tf [(Posted in:E-mail,Security | Tagged:Phishing | With 0 comments)] TJ ET endstream endobj 32 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 89 /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 1 /Columns 300 /BitsPerComponent 8>> /ColorSpace /DeviceGray /BitsPerComponent 8 /Length 207>> stream xA 0 =fy9뀟\ r endstream endobj 33 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 89 /SMask 32 0 R /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 3 /Columns 300 /BitsPerComponent 8>> /ColorSpace /DeviceRGB /BitsPerComponent 8 /Length 25388>> stream xutG7|g#13̎1qq!qaI6n!ۉ-K<1QOUuK?鮾uruW]`!1 Bc'ؽ8") Qq;9Iѵ ص#ʂQ҅Ij !=bh0F0Bh {(-߭,5̘ 5vȭ(`؅p ۜj<Nb@0eIRe$ Q_ |. )p+b@q,9*Uz`G3?Id>S9<jkC Vɦ{K690ZGRnq @*tM\R< 2T:M$Q1FS`2.6ZMDAq0']2RFr*g ޽c\v5SS^[:茢/ Pƍ9*B1BsBh&7:LALMc)b xa Da2DU)LyVYSr% BO$ʫhJ!V@@@l6sCL~Gu&tI@By3M&wH@!H ɥ4P6q]Pr͍.OL&RHEɡH(4?0h;+HQvuu8qi"0$K餘͌M/-6EJi}Jp˥#ue2av?XHa4zS))g*1MG#JIۄ97{u&#E!T.y'3bbb󜏯ODx3F(LWPy,z#h% tfOƞ >Z;^Ly.'D!򐆧&rAnnFW:b[#n҅:rlK@i y9>ࢢ"ΙEP!!d*SUmD|H2Â9OssPMKR'%Mnsگ\ˢDRHu+LHiS mp9b&gjBKC] /0<<\WWj&lBDQD3!ڝ %x1Cs}-KYCT}fR;[C Lʗf"HS)6 qZS5AiF cl;:{{GFF&h3[j5DdʢSN-)NqC@؊YAReDVК֐KQ!xxLce<3ri#W:io Z:᩾ +7-)14$XAZNSteWwygωFm{+ LC8:KKJ5#+#LJ[zDԇ9T_7PqTJ'qOajA0d&t<y>b&+BrW\i3lؠקiS8s{ QRҺ9M#Bggס]{w)ɰ;|3fE9=PZ:HM3.dKAts~'iܧ̔#)%W hA`4>LD+cT2CLE\%1m:Jh@П5j5tvumF!bjt 2D+BhphS>bU\LWyMNtll!61 IPt~EoQaɳ8:k'OtQ^3]ΕwJDYS\ab4`(@n&Z}iS‰drcV+8UKkkcSsjrR]}C@FZZMS`m#V꧹>5%3A1#^/j4m"s:ϤxS||rյқ+i<) VLf 2B!s"2^ɉ*gLhg+qq,MwLk6%UG9N}}bJ KG\lLpP$bûݼg7R(:7  AqDE, HJYmoYceBniĆSjAfx)@("#=M5-%,bRyZrDs&0g)sU̡L_DZǜq;:M&STD.qܡ&XUc׷ӯ"6{kWyyE0 ; E=͌s؇_Vthӎw#}gm9SIr(el=udϙV祈]1=e#G}KUfIvcqoQ[_꽗.4Sw*Ğ{: 뒛/sJs{\CKx13iL0;bsA#VFBD9&LmB  "VkwoO>TT-M*%y~_vἀK8D, 8A1ES#sV3 GxTK." u8R.x&Ia}~{J^1=ƥ@^3@ [.4q'FAy(Ќ:L( Oleo/abv0JUXBG*ݖ(X@ҧb9ҽ1-K!ANQm6[uMn V@>tP\X\E۱ hf<2SQQĂ0_yyKyNO㉷?mh[rq*SSBNJMJϖv-]=zje R4ܒCL}0A4%7s"+;7)*:{ϽOmE7^Z"MjS.ܭ8S֞޾XAjv;6S$Dt 0Y2Өygav8<0pf <y, X@@U]X_o~^/VO1 I ƸqVՋ8V_T/9[6 Bku~]Qs>c̔+B:a^rI:ϏM9ۍ-DF1)it\IaS R&rݏ9,:r|ZanK]&Q&h4b+8R8%I+(Dr@Hpx.|NnnNnYܜdA rC`Ap*l;` cp=nXt:4<?Wp%0V>&Q2iAW$u80/] mii;PQfI Q;y׭W}Sa??ІW?3 ίss\u;Bs3"ݧĶdBzI\Vx4*xnj4y=2jȯ,+l@j |]]"`%/:bQ"#bwԶޢvu+p_rBm]rw]Kܢ-[Zg}tƨǙUp?6y^}[V8)_~V7]^z~˞KSIꦭy诅oMnk˱]?{3vb{)'3owkm뇡~E{4\O}?uv5]Mkeo~}sl{y,t/Zl\k۪G-W?}*T-魮7  uU6:̒8No׽t3@Ie@ XqZ&?§y @z_Tii@FMsێgYΓ[{94?6ge.ųDk<צtvip͊o |`?.*v>ߛ67fݴ(~l\8*:AʍYzxۚXŶFqx7IILXyFjFRjNbbEQyV+28ƺ]8`:H~OZ`󞓑A-޳{[s^?iNj B B8i6pP]}ҧLhGkI=}z!0I1n&z̈4@W}]Lvۀ>Me#FMЬoĕ ;h'mxdDi{-sx u˶S+ĪS-UHAr7g*&3I"^z*' ؂*2Q1(%`y`gļ@DQt+ NEJrWs(ܠ@ށ mvSN3⛷t]N9?;g%ǚumPtdEpPwIS" *$D4b@X*}"VD0?9wrfi 1. :Kl5v0f_iӉ/qŚXŒOU) qI&ZeNHVAގiM^Z_qt`j(X: q*c@׃` 4 /stLRTK bc|tI|-F+46V^2#Y8`} K[IE4}š⣣c j8{K=)6Ƭs9rhA>FhL'W 1@NՍf3]ɴMKo}hi}+6ܩ~z$b|篾>7kn0LΞbVPY !,HU"嘾S7 !=XCq;D ;lZ_ٟNB{9Q~JP2yS~yd&dytsf\V,)f-U]x>fҤd Gzήtɍ+j=t]]]]]߸oڝ+<]urG0uzxN_Gm/|%JQ?yEʭ^wΖ[vWHM1?5,ԙM?>w˭jt?W-_roftS8V. 9l=׍68&2$ Zfj]Tn9!)*UDtPMh|| ^&GOJ4PJjq"9{>Pa:u$hkbbc|LX7yvzdЦ)Kxڜ)%~U0 {޼Qn(|֪9_GVyϻ7ǿiE@Q5? H~5"T,Ev(`ʲZQڷIx#ߠ޸&:P0&}pE?TqyEKX~k׼`ۿ]O,<ĿK?8~t;ʪ%ϾϷ{KS<B8|gnJ=.|l5,{u6[X=?4 v/&j(8DBVg 2UZ)zyB7JJ־y{R6vpv'`%eow;laV,0;\'13z#M9(1©S\(/nqsV/ ?1zC({Qa}_}=~ؕy}~KH@;ٲl٢zWzxn@jwPHx83u?>^v>*GC.]?;!6zHa@z0c ox}wҒ^{p~#$;a=ʧ*ʵAA;_|?(DWg4@@c ގSqLz9> Cx\jhjڤ,/7]Hh8}R^gĻs;ߛjvl8E޾H}|g{3?w7`nV<1AſGr(,K/ALcN2+FzZ[^;pޜ$l߷ 1{♉_Pb6Fc9ooIfղbFDlk_hbf,|[҅tҊ+4ݰ[*TOdn23$ ],>H+{(ݞ"jԚ|:*~`vԮQePylGo unGE)t~w`xpFZwu1<7x벬IYrz; m`%&bYLNb angy4TJyZ͝yYaR` 8c3N`fEُxtB:c&Yj b9Qm1ŚTt!XQDnG Ԗ^ue=XCxkDǚJx'Up8mF*;y̷ry)i]{LJ04sALRf'aF3^2rb^(h&"ЋVJzJ%.O*. *ulo-&DvcB%L$6u!:mFdJ[&6 kEDJCabIYsf}k_̨6qܟG?>?#ApZTogoomO>pgZBJS1mJH,w,Pˬt9 INkJ}I,z#0ƖP0 HC\޲'ݸ5k"02 xF8&0&qT f/ ߬OD؋oUr't>mI.ǍY ~N@~ N4:lz;JmVqv9zQnx4 42t.]+U^Bt$KcowqL+k䤤glCn?qTQcnlv߰N J\tӧ̝3N+!Rqw^̡`7sC^5nCfʸqKg&;bHbO0'X&2dcFaODž\{U#+745!0$EF봮s$mYDR3Sؑ݇t<Tf`%" R *0-)ר2B`zAt)g=/z/]CX!d0 k`%-m>f"HP2I.Dhg0Yѓh: aB@eBu"$j 4*J8 b3;ʸ ˼*5,q@W(Rt#@lSri)E+1/f"ciTrHq&.=ɄJ-D.69) Ds (D{DXI}O7q&)*}@aFV(`GN*];3i03hu`V"e(x¿:iI#"=#3LSN$8T1kT*!T)ʀ$"04cJϨM#I[TFKk~r#s_``HJ<*Rd >eYt%2׺5R( K~D=‘ i5dL##Tfi>Սf 2ib'a !e4/R[I/Y$W,3t"@zuuBƋDB**P&C guvY`!L C}vLT07liT$%  }}#zm7ڻ@Cn*TfAQ~@8i6 B7IN`Xݛ<RE҇PSJ3 Ak~tKă09yz|Ani׈^(՟,0֖_TQީc~)+1CG6T@sU%uX־OWw$v&<"U S;|gV"{S%}oB{ο@BsUIY](Y>ћ{hHUu Ѽ*?? RM19sd@ґX3~p5)C)ZSZR6HBhbJAJyOGh@:9K8}|?g֪sjAF;~$ڞ"ޠWQ) !Nk4h C)=z3 YjqJ k` FSiRO9**l<)]'֝o:F!NU < HHe4Th 0BhDQČRljs*mD~Jqz|/0θ$60+Wc>v;GD ؚ;l_zj(n{G^K7D.y썇c+y?vj"ney=u~lڥYG?~ecQ[>{f @?fknݣBg+yϻɫ"K~p3ꑵӎ*g/ Rih0$-ܫo}p_Ѿޱ摒HA}m%{_UFЉ~vWr+*ֶo^}w*};?4 ׾eu|\ܥJmGg}{W[zCݶH>9aXwŏrwxo=S%'mMxus6Pc Gxoo乑 Isv;\W^5ҴvuoY_`|eIwRHhr߾7l9f~xmeseBmSNQ4otvz]N5T'.jV<:[qĪןdA"m_Џ]w,o_{GM\__pl^_\wL/%zy޸?}?y DtfVԮhWŋ_p _,=NFMJ ܼ%sC,a|S`泡+~偋C~^^`kù| )h͊ 8_Ԫѝrߕ_o|ʜ>/=G'/loVLQۻi޻!颢4 {yڳS _~xqj'{)s'kQ`X{xY;{$TV3.*'|zєH΍^:I݇m["W>:qΧO~#[f5)T۳}ç*/Oʊ2h|tջ&;^ۭ|wrZ5y]oer4zOkz/%"f9S"ϙYy*zhk #%hޛ￐e bߎ0^4%ҺscIPۚGN5.=Shy,O]E'<˺34D_KgNz⚯7|cvyeY&i3/~I-i[KpN|ƺ'PgͯmAcnxYm>w'?=}-~du_³46)-lPO>+35u9FN{׼ ?^d聵/ k}a] /i^ jVo\~˿e}t~&F}jmw{t[?_U79Ft~_ է+Bѩ[%T53+y ⃽=$3Yܓ6k׮  }BfOẍ6ի@ۊ d "c#|fl;<ݒ4?%T yw@7V5KOIJJK:&\p_OHJ@zOK/2}`$??kyajk$17 $NH}"@@df~|ź1MИ2F6pe#[M?&'YIW;t4Œ^?&,Z941 ̉KG;L#hKZ`/A2Eiv<蝞IȊ ῭VˆC<3Le%I}@SnAL`ӪsQpΘp[!KG 2cYm9zxӌ Y}@DR z,ya[߂q BЙ#^oЩ|M_) V{`#ŭ13F"FZN>2CAfA|O_x_wzVsJoHxpXB,A^j5m}5=N\0'[(-% >,<%Z,K@`78|c;#'s.EUEݼk V{pϡeMV.?{McX,~qz y聃97aZ{V0j~e=tNv\u,\[TSƌUs09vܼ}Ń1&͜j-#lvug0oJ}dl!2&l u"||6Kmڣ>53#\ 7HRu%3'7.&vIkn?v'fJvJt:04>3%ܩ%}ARtŋU%dh,})|ɜ$SJ ^$!Zub߁萘0o/qpPʥ0`q!fШ0EoHd|Y?r+m8r-B*q1|-˒}CC#sLse%'1V$&X4.hѲ'O942gтd <!JH`ݺuca!"q,tRnhz:1.%K,s L'>; -Ί/衚ay\҃ JJOÝdŋ/^r_TJ`mGjT_BHnlA&n_0)GX<+,cBcٹseZi{YǐƵ^:) j̃N3b!h=їK>xo q#pu lWZfwlm{Ac&ߍʍV!}< PkQi@Ϙ0Tۓw,EfŚmu}}|Ԥފs-Qf&yWu;B3ҢaEsJQH|z`~/,=3U_U+ښu a>5޻t2eQ⊮;gΜ:gjb'i[ۺڱΒ9yܞma #yC6UxRŵb2y$]4c_G j>h"][o@thOSumMJIdj ?cNXku0RZ'NɎ iw@a{v޸ 憆āS{5Jt;ASft9{𬹙ގ΢a+c`uWΑ|/bRqZ~2w)`MydRfRh{eO_uo͹&ݯ 2 ם9Y<膺z23us)RCgY&j20̫0%NUfNiD=j톌܁4F51qrVWN kK"gdjʊG㲧ڿthm(*(k J3T 0)HfwY-UYIk+W[9 'vgϜi2kKk,<_gf4c.$*4`{/O(j|0z1 yC:bf]R2#}?xmo{ScfۙP80\sxPTtFLzII)? u!ߥyGZ&MN7r&h= h3TQ=\W[4rÞ6h^JB7 1Օ|Gc^64ԟ[7d?xΞvv{^wMWwk?+-\ׯ }6~Rl{Myq]HKaa!t$kqEX۶/1'g/̰V o6{=mݏ$Tua嶁#TQK*v|Җʞ3^wftuTp:{̛?9$v]~]~Z C?Y{H`'>>mojnú LNoWפΌ>f{V<~#n $SN^vǃAo>Sڐ1劻_a+Z_ya5]-w(;Vnwys7u{H>r\yʚmg5A |e>,:REμbuׅR>#)'9=jڪ{[pXsWHwםͺ;mLىD*6Jh=z@CCaLW(S?{=ܔ>z]5_= Jx okMHŷQ<lՖcgHO`Gnpx@KeG=ǟ|W~hOZjgW^;!xe\?hժIs1g^YfA*5+64vɪ;vSj]wo>|ӳM3Tvy0/ ۾eա>mUWgqjf&8u y:@oN[r-r{~\eoXKbN}rhO+>z/εO;ru_q3W{ml|ն 57:#ez&$]-ge{I7]_ܽ;J|]y:vVs{~ΜJ=}%M/xo7ܲ:)>T Ӯ푸6+rE/qMQ;3$H1m [rDMwиᱏkmH L |&wBz{{Ko{q/XoC|i߁E-34ݓmmV;jNl&kl0߰v_jDliTj`d/-*_F/Z+cyQZrj-GbG>Ǘψܛ7W`oZctO!DhWaS-V6y*Jm՟׷ ]lyר*S!T\^:=mԩSS}Uz?WU`vOZ: 4Z4 hL;1t3v3* 2/~۶z'h-ءB*C+sç{0J`N5$F(6Jtj*hPk5>^^:ڄTE;=>ԟ0BSfEjwZc@9Dp ĩƂ!8'بH5}g[l5oȬ.So֓y(X 6𷦍)2aֽş97z}|buFQm3l^HHB BH#R&B (<)TX1@P BL#'d7[m?l&3#3s~ޝl8O}؜(] !ɻtvwef!8!C0z~\+k@/^NpTiYO'5H ~9en`dF<0 [.^ʥUB3GR;da F<>vp"WP:\j7:胏]UC+v9/e*7s@ӯGr IBiW)d/>W&nK1q}Hue~#s3~wG$HT+jc c0ފ}M?&>az*k7$ 5+4앿|=~W7}.?FZ|pG+>mCڗoN,o}щbBI|-gN0Ӵ,1 |'71M=!HB{_0kHӻ?q,N Ccd?VBhlhΝ[nފ̋VfaL$\ɱ;X2)m7յY$*>miErU zR PD\k[΅29LLr]kqD*u0]sɃEeԹ fɒJN`q@nfp8LH&AnX7lXj +dZ{0:4)m1h tϪњ+pY"gִ!lXڶ.TDDVLG&:+- - z{L:ښ=pDP<_,d\z[?K&mF!BE\ykE 9t> ,|c}BZ 3)ܶ?/鍜#T")| xt`FIGPjq%"v`ssXN+e1Db!XF<)0LAM\lr3ajn3j4;X[rNk˘F ' JǢBT.# Q3:\)]:~X#(^۱ݹx7$/~,YȒ!$a'@i~_&kmU6~wlΨJFo3մ;[<[:T5V ˽cA4 $dm?Cџ>c릷SgWz/N.H6>1B7er!KRb7U^ ٯ~=0 x}ɿm|ը)Q(22&9HWN"M @i%D_%ś^V!8+@uyB?@GO/^;e3۝n_ϑקxLA.xɀFBxռη4#ۍ[?'%'mj K#g_ =+(5⇇^CѸ{_1{6\Z*u$RYWۭݬ-C熲bM(B4SޏO|/̆o[/;IO-} E.t`A0 Ci٭m2}JzI(6t+AY/DY ;G! AB*)G Fm +oƳ&ON`O@$|*{SʽO- t"-=!J妧?ǭC6Gj)? cB{)FcKJIN4JY48wOou:ZјNgwH?\4qB,]QLïʯ-- mxR;2T[0&Q2E:`n}qJ-gc:S{-u"BsыFȴq?Zi,+V9LDvLďJl(onba@\LP%nQuh;+ zҠHJp9bBc`1{cg}]Δ0ZU`S'%GZG_I ;<37-AesĆ58 d'ɜ0bt)/ `*cq9tZLƛ_$=zgscST*1`@@B Rc $&K I#׉C 0@X=N!6* H=Va"Fb{HzUr2#b !wT0~8IRK ]l #{lķkɐ?ׂ6.6?Ѭ9oφglq.O?bZj؝E4 6FڵF^ɓ5kv:CU2A2IԴQËk>,@ F%&<޲n曻)}ɟZz >%N9zs!A|Αl]^wFѬ*<5_$tZ-!45Sw1fE]}~Ϛ1B'48[sd(ۮo78!">0RtPfHa3&C !a˰o> eK|sAB$elzd^x 5 wk2)IBXKɣ{NZ#"B|cAʂ}7|B@pZ{n^3GQ(ocC!@|RIVV32x\p2Cj,$%w y{D#/>ldȗ|2C4oÐT'$p+H"#\u@>MX6dmd? N D6Tܠ`WlQEf`>b1c t\GBBW-5(@'9ȉp%rxo̐ PO;;d 5i8f2,fJ% # +)̟G^>FՆ!aa/x{G ^e @ʾ/d!<*P0xHPG) 4?eu 06%d ^cJLM-B(B T4$̂H@^\ } |J@)xǒSq B} އ%2dz%  ;J| 񒔙WɾdSVB4VQˆJݤ &F !sdwDDxn;I > endobj 35 0 obj << /Type /Action /S /URI /URI (http://www.google.com/safebrowsing/report_phish/) >> endobj 36 0 obj << /Type /Annot /Subtype /Link /A 37 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 638.6626 87.5297 647.8201 ] >> endobj 37 0 obj << /Type /Action /S /URI /URI (http://www.google.com/safebrowsing/report_phish/) >> endobj 38 0 obj << /Type /Annot /Subtype /Link /A 39 0 R /Border [0 0 0] /H /I /Rect [ 452.2007 595.7146 530.7347 604.8721 ] >> endobj 39 0 obj << /Type /Action /S /URI /URI (http://www.google.com/safebrowsing/report_error/) >> endobj xref 0 40 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000350 00000 n 0000000387 00000 n 0000000525 00000 n 0000000663 00000 n 0000007791 00000 n 0000007903 00000 n 0000008018 00000 n 0000008138 00000 n 0000008246 00000 n 0000008373 00000 n 0000008447 00000 n 0000008574 00000 n 0000008648 00000 n 0000008775 00000 n 0000008847 00000 n 0000008975 00000 n 0000009049 00000 n 0000009177 00000 n 0000009252 00000 n 0000009379 00000 n 0000009461 00000 n 0000009589 00000 n 0000009662 00000 n 0000009790 00000 n 0000009870 00000 n 0000009998 00000 n 0000010096 00000 n 0000010194 00000 n 0000012588 00000 n 0000013039 00000 n 0000038686 00000 n 0000038814 00000 n 0000038914 00000 n 0000039040 00000 n 0000039140 00000 n 0000039268 00000 n trailer << /Size 40 /Root 1 0 R /Info 5 0 R >> startxref 39368 %%EOF How to recognise a phishing website « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

How to recognise a phishing website

Over the past few years, as phishing started to gain a stronger foothold closer to home, we’ve tried to give you tips on how to recognise the typical phishing email. However, recognising the email is just the first step. The actual danger is in the website you reach after you’ve clicked the link. This is where your information is harvested to be used maliciously later. 

Considering Google is the expert on the internet, we’ve consulted their guide to recognising a phishing website. Here’s what they say:

1. What is phishing?

Phishing is a particularly popular scam in which a party creates an official-looking web page that asks you to provide your username and password, or other personal information such as your Social Security number, bank account number, PIN number, credit card number, or mother’s maiden name or birthday. 

In many cases, you’ll receive a link to this phishing page via an email which claims to come from an official-looking (but probably forged) address. You can also end up at these pages by following links that you find on the web or in IM messages.

2. How can I tell if a page is a fake?

The best thing to do is to check the page’s URL to make sure it’s actually controlled by the party it appears to be controlled by. The crucial part of the URL is the part between the HTTP:// and the next slash (‘/’). (If there’s no slash, start at the end of the URL.) This is the part of the URL that determines site ownership. Some popular domains, for instance, are amazon, google, and eBay: 

http://www.amazon.com 
http://www.google.com 
http://www.ebay.com 

In some cases, URLs will be a bit more complex; be sure to check the name listed immediately to the left of the top level domain (.com, .net, .co.uk, etc.). For instance, http://www.google.comhttp://news.google.com and http://www.google.com/firefox/ are all part of the same site. However, google.com.fraudulentdomain.com/login.html is NOT! Neither is www.g00gle.com (note that in this URL, the letter o is replaced by the number 0). 

Tip: Since a forged URL can look very similar to a genuine one, it’s safer to use a bookmark you’ve created or to type the URL into the location bar by hand instead of following links from your email. This is important for any page where you’re asked to log in or provider private information.  Additional Resources: antiphishing.org

3. How does Google know a page is bogus?

We use several techniques to determine whether a page is genuine, including the use of a blacklist containing pages that have been identified as suspicious and/or misleading based on automated detection or user reports. Our software also examines pages’ content and structure in order to catch potentially misleading pages. Google Safe Browsing can’t offer perfect protection, so you should always be on the lookout for indications that a site isn’t what it appears to be. But Google Safe Browsing can help identify and protect you against many of the sites designed to trick users.

4. What does an alert look like?

When we suspect that a page is bogus, an alert will appear on the page. The appearance of the alert will depend on your browser, but they all look like this: 

5. How do I report a page that I think is phishing?

If you find a page that you believe is pretending to be another page in an attempt to steal users’ information, please report it to us.

6. You’re flagging a legitimate page as a potential phishing site. How do I get this fixed?

If you believe that Google Safe Browsing is incorrectly identifying a page as suspicious, please do report it to our team. We work hard to act quickly on all such reports.

7. Does this feature protect me against viruses, spyware, and all other evil things?

Sorry, but no “Google Safe Browsing” protects against phishing and malware attacks, but it can’t offer foolproof protection (although we’re working on it). You still need to watch out for all the other bad things that can happen on the wild, wild web.

Tags:

Comments are closed.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.