You've probably heard of phishing. No, not the cod and salmon type; that's fishing . Phishing is the act of impersonating a person or company with the purpose of obtaining information such as passwords or credit card numbers, or getting you to click on links that may install malware on your computer.
How does phishing work?
Most people who engage in phishing either want your money or your personal data. Sometimes they want access to information you have through your work, such as servers or files.
A phishing email is an email that's sent by someone pretending to be a different entity—sometimes someone you know, sometimes a company, and sometimes the prince of a faraway nation. Sometimes the sender simply spins a good story to try to get the recipient to send them money. Other times the email contains links or attachments that can then track your activity if you open them.
Phishing isn't just for email. You can also receive phishing attempts by phone, text message, social media, or instant messaging.
How do you protect yourself from phishing?
There are many types of phishing, and some phishers are very creative and sophisticated in their attempts. Your best defense against phishing is common sense and a critical eye. Along with that, also try the following:
- Always be vigilant when opening emails. If there are attachments, links, or a request for money, confirm that the sender's address really contains the company they claim to work for. The "from" line may look legitimate, so check the source to see if the domain name, such as coinmama.com, is correct.
- Before clicking on a link, double-check that it leads to the page you expect it to. Don't open attachments from sources that are unknown to you. Keep in mind that links and websites often appear as very convincing duplicates, so always look at the exact address.
- When in doubt as to the legitimacy of a link, it's best to go directly to the website you want and look for the page there, rather than through your email.
- If you're being asked for your credentials, such as your password, confirm that the service you believe you're speaking with really requires you to provide that information.
- Never send money to someone you don't know, or who sought you out.
What are some of the types of phishing that exist?
There are multiple ways in which phishers try to trick you into giving out your usernames, passwords, private wallet keys, credit card details or other sensitive information. Below you will find an overview of the most widespread types of phishing.
Communications phishing: Most commonly phishers send out emails asking you to provide or confirm your credentials (such as username and password) at a certain service. Now, more and more, phishers are also using various messenger services and social networks.
Website forgery and covert redirect: Some tech-savvy fraudsters create hoax websites and links that seem to lead to legit websites but in reality, they redirect you to a page which purpose is solely collecting the data you enter there. Double-check URL addresses of the websites you visit, especially when entering your personal details.
Wi-Fi phishing: Scammers sometimes create Wi-Fi networks to gather personal information about everyone using this network. Quite often these networks’ names mock names of well-known local free Wi-Fi networks or networks of popular public places. Use your cellular network, cable connection, or your own protected Wi-Fi when logging into websites or entering your payment details online.
Fake call centers: Phishing doesn't just live online. Some scammers will create fake call centers, impersonating the support services of prominent companies in order to gain access to your personal information.
Communicating with Coinmama
With phishing scams all around us, how do you know that you're hearing from Coinmama? Our email communications will always come from emails with the domain coinmama.com. If you're not sure about the origin of an email, you can click on the settings button for that email to view its source.
On Facebook you can contact us here: https://www.facebook.com/Coinmama/ (this is our only Facebook page).
And if you want to reach us, you can contact us using the contact form on our official website coinmama.com.
Please note that we do not have a phone hotline. Also, Coinmama employees will never ask you to provide the private key of your cryptocurrency wallet, and they will never connect to your PC via any kind of remote desktop software.
If you think that your Coinmama account was hijacked please contact us immediately.
Let’s work together to build a safe cryptocurrency community!