Macworld (USA)

Protect yourself from phishing emails

Phishing remains a key tool in hijacking accounts, but you can defeat it with a little savvy.

- BY GLENN FLEISHMAN

Phishing is a cute name for a malicious practice. An attacker sends millions of emails (or even a billion) that try to convince someone they are from a legitimate source. Phishing sometimes relies on the billions of account compromise­s (fave.co/3hr8cxw) that have occurred over the last several years to include telling personal details, like your mailing address or an account name associated with a site.

The mail convinces you something is wrong with your account, or there’s a great promotion underway, and urges you to click a link that looks correct. Clicking brings you to a website that wants your account credential­s. Proceed—and you may have given away the keys to your kingdom.

This kind of attack is insidious because most of us receive so much email from companies and organizati­ons we deal with that we can barely manage all of it. A message that says “credit card exceeded limit!” may rise above the fray, and you pay attention. The site to which the email is linked looks just like what you expect.

I speak from a position of a fellow sufferer. Over the last year, I’ve received a text message from “DHL” and two emails from “American Express” that nearly got me. I clicked the DHL message, as I was expecting a package from that service, which is rare for me—and quickly realized what I was doing and closed the window. With the Amex messages, they both wound up filtered into my spam folder, but I looked at them and thought, “This must be in error.” However, on closer examinatio­n, I realized my spam app was more observant than I was, and I never clicked at all.

Here’s what you can do to resist these attacks launched via email message.

DISABLE LOADING IMAGES

Invisible tracking pixels allow both marketers and scammers to know a message was opened and may reveal more than you want about yourself. You

can follow these instructio­ns (fave. co/3ddgp0h) to disable automatic image and media loading. Starting with the release later this year of IOS/IPADOS 15 and macos 12 Monterey, you can go further by enabling Mail Privacy Protection (fave.co/3dbqafh), which loads trackers through a proxy to break the connection to you. (This feature doesn’t require icloud+, the new name for paid icloud tiers.)

DON’T CLICK ON SITE LINKS IN EMAIL

While it’s convenient to click links in emails, not clicking links and instead using bookmarks or typing the first few letters of a site bypasses most phishing attacks.

HOVER OVER LINKS BEFORE CLICKING

If you’re thinking of clicking and have an email client (like Apple’s Mail) that supports it, you can hover over any link and see what it looks like. If it’s not the URL of the company or group that sent it, don’t click. Some companies use email tracking and route their links through Mailchimp and other legitimate emailsendi­ng firms. You can’t differenti­ate between use and misuse in those cases. With Apple email, hovering over shows the URL as tip text; only when you click the downward-pointing arrow do you get a full preview, which I recommend not doing given the risk of providing more informatio­n about yourself.

LOOK FOR WARNINGS IN EMAIL

Some email apps automatica­lly warn you, or you can enable warnings that tell you a message looks suspicious or has links that point to known phishing sites. I use Postbox, which has this option. It’s not always accurate—it dislikes ebay’s emails, for some reason—but it at least makes me warier of an incoming email.

If you decide the link is legitimate and you go ahead and click it, be wary and follow this advice:

Check the padlock. Safari and most other browsers display a lock icon in the Location or similar bar at the top of their window in desktop and mobile versions. If you don’t see a padlock, it’s a problem.

Watch for blatant security warnings. Safari throws up a big warning when you visit a site that’s using a security document (a digital certificat­e) that doesn’t match the domain name it’s at. That’s a huge red flag and you should walk briskly away in a virtual sense. You have to do work to bypass this warning.

Watch for subtler security warnings. Apple also checks (fave.co/3hwmrro) in Safari for an expired security document (sites have to renew at least annually) that was formerly legitimate. And a nonsecure page that asks for your password or credit card is a red flag as well.

Use a password manager. Apple’s built-in password support across IOS, ipados, and macos, as well as 1Password and other third-party ecosystems will only fill in a password if the domain matches precisely. A look-alike domain meant to fool you will never match, and thus you won’t be offered the opportunit­y to click or use Touch ID or Face ID to fill in the login fields.

The one occasion on which you will see an error when you’re trying to visit the legitimate version of a site is when you’re at a public hotspot and haven’t yet jumped through their hoop to join the network. When you connect to such a hotspot, it blocks general internet traffic. It effectivel­y redirects everything to a local “portal” page where you can pay, enter a login, or agree to terms of service for free access.

Until you pass the portal page, any other web page you visit will produce an error that looks like you’re at a fraudulent site. ■

 ??  ??
 ??  ?? You can configure Apple Mail to not load any images by default.
You can configure Apple Mail to not load any images by default.
 ??  ?? Safari warns of connection­s to sites that aren’t what they appear to be—but you’ll see it on a hotspot network if you haven’t yet passed the portal page.
Safari warns of connection­s to sites that aren’t what they appear to be—but you’ll see it on a hotspot network if you haven’t yet passed the portal page.
 ??  ?? We recommend you use a password manager like 1Password (pictured here).
We recommend you use a password manager like 1Password (pictured here).

Newspapers in English

Newspapers from Australia