Fig 4 - uploaded by Emeka Nwogu
Content may be subject to copyright.
Debit card showing the customer service phone number on its reverse side 3.3 Clone phishing protection guidelines 1. Disregard emails informing you of a possible closure of your account unless you complete a certain authentication; and if you must follow their instruction, use fake account sign in password. If this is accepted on the site, then it is a fake website hosted by attackers.

Debit card showing the customer service phone number on its reverse side 3.3 Clone phishing protection guidelines 1. Disregard emails informing you of a possible closure of your account unless you complete a certain authentication; and if you must follow their instruction, use fake account sign in password. If this is accepted on the site, then it is a fake website hosted by attackers.

Source publication
Article
Full-text available
This work analyses the current phishing techniques and tools available to attackers; with a view to proposing a simple practical user-implemented anti phishing framework. The work shows that comprehensive user awareness and education can go a long way in protecting users and customers against most of the phishing attacks that people have fallen vic...

Similar publications

Article
Full-text available
Increasing the number of cyber-crimes and frauds it has become the need of hour to seriously consider the threat and make some solid security arrangement against it. The links or Uniform Resource locator (URL) can be classified as benign, spam or malicious thus informing the user beforehand about its safety. As emails are hook to attach malicious U...