Blog Feed
Top 7 Tips How to Protect Yourself from Phishing Scams
What phishing is has been well-known for some time now. The first phishing attacks were noted shortly after the World Wide Web appeared. But despite the efforts of IT security specialists to create more effective ways of anti phishing protection, new phishing sites continue to appear every day. According to the data from several studies, there were about 5000 new phishing sites created every day in 2016. In 2017, this figure will be even greater. The secret to the resilience of this type of fraud lies in how it is based not on “holes” in software, but on a vulnerability in human beings themselves, particularly those with access to important data. That’s why we’re going to remind you once more what phishing is, what the most common phishing attacks examples are, and what you can do to counter them. “Phishing is a real threat, which is relatively easy to implement and difficult to identify and counteract.” ― Max Oliinyk, Chief Executive Officer, Protectimus Solutions LLP Basic phishing examples 2017 Phishing is a kind of internet fraud that’s based on social engineering principles. The main purpose of phishing scams is to gain access to critically important data (passport data, for example), accounts, banking details, secret company information, and so on; so that it can be used to steal funds at a later date. Phishing works by redirecting users to fake network resources that function as complete imitations of a real site. | Read also: Social Engineering Against 2FA: New Tricks Deceptive phishing examples The majority of phishing attacks fall under this category. Attackers send out emails pretending to be from a real company, in order to receive users’ account data and thus gain control over their personal or official accounts. You could receive a phishing email claiming to be from a payment processor, a bank, a courier service, an online store, a social network, a revenue service, and so on. Phishing emails are created very exactingly. They can be practically indistinguishable from the emails a user would normally receive from the company. The only difference may be in the request to follow a link in order to perform some kind of action. This transition, however, leads to the scammers’ site, which acts as a doppelgänger of the entity’s real website. To get you to click on these links, the emails may dangle a proverbial carrot in front of you: “Take 70% off our services if you sign up within 24 hours!” They may also try to scare you: “Your account has been locked due to suspicious activity. To confirm that you are the account owner, click on the link.” Here’s a list of some of the scammers’ favorite phishing examples: “Your account has been/is going to be locked/disabled.” Scare tactics can be quite effective. The threat of having your account locked if you don’t immediately log in can cause users to let their guard down, follow the link in the email, and enter their username and password. “Suspicious/fraudulent activity has been detected on your account. You must update your security settings.” These kinds of emails urgently ask you to log into your account and update your security settings. They work on the same principle as the previous attack. The user panics and lets their guard down. “You have received an...
read moreHow to Program Protectimus Slim NFC Token
If you have an NFC-enabled smartphone running Android, download and run the Protectimus TOTP Burner app. Initiate the software token setup on the system where you require enhanced security. Program Protectimus Slim NFC OTP token: Run the Protectimus TOTP Burner application. Tap the button “Burn the seed”. Tap “Scan the QR code” and scan the QR with the secret key you see on your account. You can also input the secret key manually, but we recommend the automatic method. If you enter the seed manually, set the required OTP password lifetime. Activate the Protectimus Slim NFC OTP token and place it near your phone’s NFC antenna. While holding Protectimus Slim NFC near the NFC antenna, tap “Continue”, and wait for a message confirming that the 2FA token was programmed successfully....
read moreHow to Set Up Two-Factor Authentication on Dropbox with Protectimus Slim NFC
Learn more about Protectimus Slim NFC token or order one here: Protectimus Slim NFC The best 2FA token to protect your Dropbox account! How to enable Dropbox two-factor authentication with hardware OTP token Protectimus Slim NFC. Make sure that your Android smartphone supports NFC technology and download the Protectimus TOTP Burner application. Log in your Dropbox account and initiate the enrolment of the software token: Go to the “Setting” section through the navigation menu -> Choose “Security” section -> Enable two-step verification by turning on the trigger -> Consider important information regarding two-factor authentication before getting started and click the “Get starter” button-> Choose the “Use a mobile app” option and click “Next”-> You will see the QR code with the secret key (seed). Use it to program the Protectimus Slim NFC token. Program the Protectimus Slim NFC token by scanning the QR code. Learn how to program Protectimus Slim NFC token here. To finish the token enrollment click the button “Next” Enter the one-time password from Protectimus Slim NFC token in the...
read moreHow to Set Up Two-Factor Authentication on Kickstarter with Protectimus Slim NFC
Learn more about Protectimus Slim NFC token or order one here: Protectimus Slim NFC The best 2FA token to protect your Kickstarter account! How to enable Kickstarter two-factor authentication with programmable hardware OTP token Protectimus Slim NFC. Make sure that your Android smartphone supports NFC technology and download the Protectimus TOTP Burner application. Log in your Kickstarter account and initiate the enrolment of the software token: Go to the “Account” section in navigation menu -> Turn on two-factor authentication -> Consider important information regarding two-factor authentication before getting started -> Choose “Generate codes with a mobile app” and click “Continue”-> You will see the QR code with the secret key (seed). Use it to program the Protectimus Slim NFC token. Program the Protectimus Slim NFC token by scanning the QR code. Learn how to program Protectimus Slim NFC token here. To finish the token enrollment enter the one-time password from Protectimus Slim NFC token in the field “Enter the verification code generated by the...
read moreHow to Set Up Two-Factor Authentication on MailChimp with Protectimus Slim NFC
Learn more about Protectimus Slim NFC token or order one here: Protectimus Slim NFC The best 2FA token to protect your MailChimp account! How to enable MailChimp 2-factor authentication with programmable hardware token Protectimus Slim NFC. Make sure that your Android smartphone supports NFC technology and download the Protectimus TOTP Burner application. Log in your MailChimp account and initiate the enrolment of the software token: Go to the “Account” section in the navigation menu -> Click “Settings” and Choose the “Security” section from the settings list -> Enable two-factor authentication using an authenticator app -> You will see the QR code with the secret key (seed). Use it to program the Protectimus Slim NFC token. Program the Protectimus Slim NFC token by scanning the QR code. Learn how to program Protectimus Slim NFC token here. Save the backup code in a secret place. To finish the token enrollment enter the one-time password from Protectimus Slim NFC token in the field “Authentication...
read moreHow to Add Protectimus Slim mini NFC token to Facebook
Learn more about Protectimus Slim NFC token or order one here: Protectimus Slim NFC The best 2FA token to protect your Facebook account! How to enable the Facebook two-factor authentication with Protectimus Slim NFC hardware OTP token. Make sure that your Android smartphone supports NFC and download the Protectimus TOTP Burner application. Log in your Facebook account and initiate the enrolment of the software token: Go to the Facebook Settings -> Choose the “Security and Login” section -> Choose “Use two-factor authentication” -> In the “Code generator” section, click the “third party app” button -> You’ll see the QR code with the secret key (seed). Program the Protectimus Slim NFC token by scanning the QR code. Learn how to program Protectimus Slim NFC token here. Enter the one-time password generated with the help of Protectimus Slim NFC token in the field “Security code”. Enjoy reliable and convenient protection for your Facebook account — make hackers’ lives...
read moreHow to Set Up Two-Factor Authentication on AdvCash with Protectimus Slim NFC
Learn more about Protectimus Slim NFC token or order one here: Protectimus Slim NFC The best 2FA token to protect your AdvCash account! How to enable the AdvCash two-factor authentication with Protectimus Slim NFC hardware token. To add Protectimus Slim NFC to AdvCash take the Android smartphone with NFC support and download the Protectimus TOTP Burner application. Log in your Advanced Cash account and initiate the enrolment of the software token: Go to the “Security Settings” section -> At the bottom of the page, choose “Token” “Configure” -> Click the “Software Token” button -> You will see the QR code with the secret key (seed) -> Program the Protectimus Slim NFC token by scanning the QR code. Learn how to program Protectimus Slim NFC token here. Enter the one-time password from the Protectimus Slim NFC token in the field “Enter one time password from mobile token” and click the “Activate” button. Enjoy reliable and convenient protection for your AdvCash account — make hackers’ lives...
read moreHow to Set Up Two-Factor Authentication on GitHub with Protectimus Slim NFC
Learn more about Protectimus Slim NFC token or order one here: Protectimus Slim NFC The best 2FA token to protect your GitHub account! How to enable GitHub two-factor authentication with Protectimus Slim NFC hardware OTP token. Make sure that your Android smartphone supports NFC and download the Protectimus TOTP Burner application. Log in your GitHub account and initiate the enrolment of the software token: Go to “Settings” using the account navigation menu -> Choose “Security” section -> Click the “Set up two-factor authentication” button -> Choose “Set up using an app” -> Save recovery codes and then click the “Next” button -> You will see the QR code with the secret key (seed). Use it to program the Protectimus Slim NFC token. Program the Protectimus Slim NFC token by scanning the QR code. Learn how to program Protectimus Slim NFC token here. To finish the token enrollment enter the one-time password from Protectimus Slim NFC token in the field “Enter the six-digit code from the application” and press...
read moreHow to Set Up Two-Factor Authentication on Interkassa with Protectimus Slim NFC
Learn more about Protectimus Slim NFC token or order one here: Protectimus Slim NFC The best 2FA token to protect your Interkassa account! How to enable Interkassa two-factor authentication with hardware OTP token Protectimus Slim NFC. Download the Protectimus TOTP Burner application. Login to your Interkassa account and initiate the enrolment of software token: Go to Interkassa account settings -> Choose “Security” section -> Select 2-Step Verification mode, and click the trigger “On” -> You will see the QR code with the secret key (seed). Use it to program the Protectimus Slim NFC token. Program the Protectimus Slim NFC token by scanning the QR code. Learn how to program Protectimus Slim NFC token here. You may save the QR code to use it as a backup in the future if needed. To finish the token enrollment enter the one-time password from Protectimus Slim NFC in the corresponding field and press the button “Activate”. Enjoy reliable and convenient protection for your Coinbase...
read moreHow to Set Up Two-Factor Authentication on Slack with Protectimus Slim NFC
Learn more about Protectimus Slim NFC token or order one here: Protectimus Slim NFC The best 2FA token to protect your Slack account! How to enable Slack two-factor authentication with Protectimus Slim NFC – programmable hardware OTP token. Make sure that your Android smartphone supports NFC technology and download the Protectimus TOTP Burner application. Log in your Slack account and initiate the enrolment of the software token: Go to the “Account Settings” -> Click “expand” in Two-Factor Authentication section -> Click the button “Setup Two-FActor Authentication” -> Choose “Use an app” option -> You will see the QR code with the secret key (seed). Use it to program the Protectimus Slim NFC token. Program the Protectimus Slim NFC token by scanning the QR code. Learn how to program Protectimus Slim NFC token here. To finish the token enrollment enter the one-time password from Protectimus Slim NFC token in the field “Code” and click the button “Verify Code and...
read more