INTERNET users beware – hackers may be hiding behind seemingly legitimate websites to steal your information.
Some sites contain malware, a portmanteau of malicious software, or any program that causes intentional harm.
Getty – ContributorCybercriminals may hide behind “spoofed” sites that look like the ones you use in order to seize your private information[/caption]
Malware is often disguised by a seemingly legitimate download link for a movie, music, or other software.
Some malware infects your device with destructive viruses that infect and corrupt your files, while others, known as ransomware, hold your files hostage and demand payment for their return.
Other sites are intended to trick users into providing personal or financial information.
Scammers typically include misleading links in text messages or emails in what is known as a phishing attack.
After getting their hands on your information, these cybercriminals may use it themselves or sell it online.
Luckily, it is easy to avoid becoming a victim.
Start by ensuring your connection is encrypted. Sites with “HTTPS” in the address use a protocol for secure communication to prevent criminals from intercepting your sensitive information.
HTTP, the basic communication between web clients and servers, is less secure. Your connection is not encrypted, meaning criminals can snoop on your activity.
An easy way to tell the difference is to look for a small padlock symbol in your browser’s address bar.
Things become slightly more complicated when hackers create clones of popular sites like Google and Facebook.
However, are the logos poor quality or stretched out? Is the site peppered with spelling errors and grammatical mistakes?
When in doubt, examine the web address closely – is the site name misspelled? Are there unusual characters or repeating letters?
Note that many companies, Amazon included, have pages that provide lists of their official addresses.
If a site is full of mistakes and appears to have been put together in a hurry, it may be a phishing site.
Legitimate businesses rely on well-designed, professional-looking sites to draw in customers.
GettyBe wary of sites containing spelling and grammatical errors, frequent pop-ups, or an HTTP web address rather than HTTPS[/caption]
Another sign you’re being scammed is the sudden appearance of pop-ups.
They may notify you of a security issue with your device, prompt you to update your operating system or install software.
However, these are meant to be misleading and will likely infect your device with malware.
If a deal seems too good to be true, it probably is.
Sites spring up around the holidays and annual events like Prime Day, promising lower prices than their competitors.
However, you’ll likely put in your card information and receive radio silence. These sites may even steal your information.
How are scammers finding my number?
Here Mackenzie Tatananni, science and technology reporter at The U.S. Sun, breaks down ways a scammer may get your information.
Scammers commonly get phone numbers from data breaches, which occur when a hacker accesses a private database – often those maintained by companies like service providers and employers.
This information may be shared and circulated online, including on the dark web, where there are forums dedicated to sharing leaked information.
Another common technique called wardialing employs an automated system that targets specific area codes.
A recorded message will instruct the listener to enter sensitive information, like a card number and PIN.
There is also a far more harrowing possibility: your phone number could be listed online without your knowledge.
Data brokers are hungry to buy and sell your information. These companies gather information from various public sources online, including social media and public records
Their primary goal is to build databases of people and use this information for tailored advertising and marketing.
Much of this information ends up on public record sites, which display information like your phone number, email, home address, and date of birth for anyone to see.
In the United States, these sites are legally required to remove your information if you request it.
Locate your profile and follow the opt-out instructions, but be warned – these sites do not make it easy and intend to frustrate you out of completing the deregistration process.
For simplicity’s sake, you can also use a tool to purge your information from the Internet.
Norton offers one such service. Called the Privacy Monitor Assistant, the tool finds info online and requests removal on your behalf.
It is also possible that your phone number may be linked to a social media account and publicly displayed on your profile – this happens quite frequently with Facebook.
Be sure to review your privacy settings and confirm this information is hidden away from prying eyes.
Likewise, you may stumble across a malicious quiz site that asks for personal details – typically answers to security questions like the name of your pet or where you went to school.
With this information, hackers can access your online accounts using reverse engineering and account recovery tools.
Be wary when you see ads in your social media feed, or pop-ups when playing mobile games. More likely than not, someone is trying to deceive you.