Security 8. June 2018

Exposing phishing and acting correctly

According to Cisco’s annual cyber security report, cyber criminals attempt to obtain trustworthy data from unsuspecting Internet users every second with the help of approximately 3,000 manipulated sender addresses. Learn more about phishing in our blog-post. 

What is phishing used for?

What is phishing?
Phishing is a combination of the words “password”, “harvesting” and “fishing”. Phishing is a technique used to obtain confidential data from unsuspecting Internet users. The affected victim loses double, data and money!

A phishing attack usually starts with an email asking you to reveal confidential data. A phishing email may make an enticing offer or demand immediate action.

In most cases, you will receive a link that leads to a fake website where you can enter confidential data, such as:

  • Access data from your e-banking
  • Credit card data
  • Passwords
  • PIN codes
  • Security codes
  • Access data to online auction providers

How does phishing work?

This is how you unmask phishing e-mails:

To avoid becoming a victim of phishing, look out for these typical characteristics:


How to act correctly:

  • Do not open any listed links in the mail
  • Do not call the telephone number given in the mail
  • If you are unsure, contact the company using the method you are already familiar with

Did you enter your data by mistake?

Don’t worry – something like this can happen.
Here’s how to react correctly in such a situation:


You can find more information on the topic of “phishing” in our accompanying handout.

Das könnte dich auch interessieren


Flubot – Malware via SMS

Security 1. July 2021 If you click on the link contained in the SMS message, you will be redirected to a fraudulent website where you are supposed to download the alleged voicemail. If you do so, you install the malware … Mehr erfahren

Password manager – manage passwords securely

Security, Solutions 20. November 2023 What is a password manager and why should you use it? A password manager is a piece of software that helps us manage our passwords. It is used to store our passwords centrally in one place … Mehr erfahren
Cloud, technisch, farbig

Penetration Testing

Security 30. June 2022 Why do we do this? We operate an ISO 27001-certified information security management system (ISMS) and are committed to ensuring a high level of security in the processes and technical solutions. Numerous preventive measures and permanent … Mehr erfahren
Frau bezahlt digital mit Smartphone, RFID, NFC.

RFID and NFC: How to Use Them and Protect Your Data

Security 27. November 2023 What Is RFID? RFID Technology Explained in Brief RFID stands for Radio-F frequencyI identification and enables data to be recognized and transmitted via radio waves. An RFID system typically consists of an RFID tag (or transponder) … Mehr erfahren

Open Circle AG
Freilagerstrasse 32
CH-8047 Zürich

©2024 Open Circle AG, all rights reserved.