SlideShare a Scribd company logo
1 of 2
Download to read offline
How to check a suspicious link without
clicking on it?
For know more about ISOEH, visit : https://www.isoeh.com/
No matter how cautious you are while surfing internet, in every corner a trap or threat is ready to victimize you.
We often come across various hyperlinks that lead us to another page on the internet. But how can we
understand if the destination is reliable or not? You never know what lies there until you open it. And no security
software can protect you from the headaches you encounter if you click a malicious link. The threat can be a
malware, adware or ransomware and each of them can risk your privacy and cause you financial and reputational
damage.
Your friends might unknowingly pass unsafe links in emails, instant messages, facebook posts etc. The links
might appear to be shortcuts to funny videos, bizarre tricks, shocking news stories, ‘awesome’ deals etc. which
are designed to steal your personal information.Malicious links can also be present in website ads and search
results.
So, how to decipher if the link you are clicking on is malicious or not before opening it? Here’s how you can spot
malicious link:
1. Check the domain name carefully:
Take a closer look at the domain name in the link. An altered spelling of a domain name is almost a sign of
scamming attempt. The difference might be hard to notice at the first glance. The phishing attackers try to exploit
the common human traits to get their purpose accomplished. So beware of the look-alike letters and numbers in
the link and check very carefully before clicking.
2. Hover over the link:
Sometimes a link masks the website to which it links. While dealing with a hyperlink, hover the mouse cursor over
the text and you’ll notice the full URL of the link’s destination in a lower corner of your browser. Also note that in
phishing scams, links seem to be similar like legitimate sites. Hovering over hyperlinks decodes where the link
leads and it is a good way to safeguard yourself from being a victim. Only a keen observation can help you to
understand the difference between a legitimate link and a fake one. For example, a link is displayed which says:
Click here to connect to facebook which is actually leading to ISOEH home page. But without hovering over it,
thus people will easily be deceived by landing in a malicious site. Avoid clicking on links in an email that comes
from an unknown source or goes to spam folder. If you are in doubt about a link, place the organization’s URL in
a search engine instead of the link provided in the email.
How to check a suspicious link without
clicking on it?
For know more about ISOEH, visit : https://www.isoeh.com/
3. Https sites are safe:
For financial dealings, check if the site uses Http or Https. This ensures that your data is sent encrypted across
the internet to the website. Genuine e-commerce sites and online banking sites will always use the more secure
form of Https instead of Http. https:// will be displayed in the URL address field of the browser with a security
padlock icon next to the address. Double click on the padlock icon and the security certificate of the websitewill
be displayed.If the security certificate isn’t displayed, you receive a message saying the URL address of the site
does not match the certificate, or that the certificate is not to be trusted, then it is most likely a spoof with
someone waiting to get hold of your credentials.
4. Be careful of shortened links:
Short link services like bit.ly are popular choices for microblogging sites specially Twitter where character
limitations are present. In this case, hovering over the link won’t help. Short links often hide their source and what
they contain. It is a method used by malware distributors and phishing attackers to conceal the true destinations
of the links. For shortened links, you can use the “preview” function. If you enter the shortened bit.ly URL in your
browser with a “+” at the end, it will report back information about the site that the shortened link leads to.
5. Avoid clicking on links coming from unsolicited email:
Phishing attacks often follow a common practice; verifying the details. Emails claiming to be from your bank and
asking you to verify your account credentials for urgent safety issues are mostly trap. This common practice is
aimed at getting access to your personal bank account and you should definitely not respond to that or give away
sensitive information. If you receive such suspicious email, first check the website by entering the address
directly to your browser or give them a call. Don’t accept what the email tries to claim without verifying it
first.Never trust links in e-mails, text messages, pop-ups, etc.
6. Stay away from strange characters in email:
Hackers and malware distributors try to conceal the destination of malware or phishing sites by using what is
known as URL encoding. For example, the letter "A" that has been URL-encoded would translate to "%41".
Encoding is used to mask destinations, commands etc. so that one cannot read it without URL decoding tool. So,
in case of lots of special character in a link, never click on it.
So, whenever you are unsure about a link, pause. Don’t be compelled by artificial urgency and don’t give away
your sensitive information in emails. Be aware if you are addressed impersonally and check the authenticity of
the sender carefully. If you have mistakenly clicked on a malicious link or entered your login details or other
sensitive data into the site, then go to the authentic website immediately and change your passwords and login
details.
The moral is, while on internet, trust less and happy surfing!

More Related Content

What's hot

Phishing
PhishingPhishing
PhishingSyahida
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 
You choose what you put online
You choose what you put onlineYou choose what you put online
You choose what you put onlineitmadesimple
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]Sorav Jain
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe onlineScott Schober
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and PhishingMason Bird
 
Seminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackSeminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackrohit2495
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Securityanjuselina
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharmingDawn Hicks
 
Test Your Internet Security IQ Quiz
Test Your Internet Security IQ QuizTest Your Internet Security IQ Quiz
Test Your Internet Security IQ QuizAkilah Kamaria
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 

What's hot (20)

Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing
PhishingPhishing
Phishing
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
You choose what you put online
You choose what you put onlineYou choose what you put online
You choose what you put online
 
Phishing
PhishingPhishing
Phishing
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and Phishing
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
Seminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackSeminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attack
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Phishing-Updated
Phishing-UpdatedPhishing-Updated
Phishing-Updated
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
Phishing
PhishingPhishing
Phishing
 
RP Phishing Awareness
RP Phishing Awareness RP Phishing Awareness
RP Phishing Awareness
 
Test Your Internet Security IQ Quiz
Test Your Internet Security IQ QuizTest Your Internet Security IQ Quiz
Test Your Internet Security IQ Quiz
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 

Similar to How to check a suspicious link without clicking on it?

IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacksNamik Heydarov
 
Security awareness
Security awarenessSecurity awareness
Security awarenessSanoop Nair
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxvdgtkhdh
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxamby3
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxErrorError22
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
HACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxHACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxPrince Morte
 
HACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxHACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxPrince Morte
 
Amazon Social Engineering slides
Amazon Social Engineering slidesAmazon Social Engineering slides
Amazon Social Engineering slidesAltinetLtd
 

Similar to How to check a suspicious link without clicking on it? (20)

IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Phishing
PhishingPhishing
Phishing
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Phishing
PhishingPhishing
Phishing
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Keeping Your Email Secure
Keeping Your Email SecureKeeping Your Email Secure
Keeping Your Email Secure
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Antiphishing
AntiphishingAntiphishing
Antiphishing
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
HACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxHACKING VS PHISHING.pptx
HACKING VS PHISHING.pptx
 
HACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxHACKING VS PHISHING.pptx
HACKING VS PHISHING.pptx
 
Amazon Social Engineering slides
Amazon Social Engineering slidesAmazon Social Engineering slides
Amazon Social Engineering slides
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

How to check a suspicious link without clicking on it?

  • 1. How to check a suspicious link without clicking on it? For know more about ISOEH, visit : https://www.isoeh.com/ No matter how cautious you are while surfing internet, in every corner a trap or threat is ready to victimize you. We often come across various hyperlinks that lead us to another page on the internet. But how can we understand if the destination is reliable or not? You never know what lies there until you open it. And no security software can protect you from the headaches you encounter if you click a malicious link. The threat can be a malware, adware or ransomware and each of them can risk your privacy and cause you financial and reputational damage. Your friends might unknowingly pass unsafe links in emails, instant messages, facebook posts etc. The links might appear to be shortcuts to funny videos, bizarre tricks, shocking news stories, ‘awesome’ deals etc. which are designed to steal your personal information.Malicious links can also be present in website ads and search results. So, how to decipher if the link you are clicking on is malicious or not before opening it? Here’s how you can spot malicious link: 1. Check the domain name carefully: Take a closer look at the domain name in the link. An altered spelling of a domain name is almost a sign of scamming attempt. The difference might be hard to notice at the first glance. The phishing attackers try to exploit the common human traits to get their purpose accomplished. So beware of the look-alike letters and numbers in the link and check very carefully before clicking. 2. Hover over the link: Sometimes a link masks the website to which it links. While dealing with a hyperlink, hover the mouse cursor over the text and you’ll notice the full URL of the link’s destination in a lower corner of your browser. Also note that in phishing scams, links seem to be similar like legitimate sites. Hovering over hyperlinks decodes where the link leads and it is a good way to safeguard yourself from being a victim. Only a keen observation can help you to understand the difference between a legitimate link and a fake one. For example, a link is displayed which says: Click here to connect to facebook which is actually leading to ISOEH home page. But without hovering over it, thus people will easily be deceived by landing in a malicious site. Avoid clicking on links in an email that comes from an unknown source or goes to spam folder. If you are in doubt about a link, place the organization’s URL in a search engine instead of the link provided in the email.
  • 2. How to check a suspicious link without clicking on it? For know more about ISOEH, visit : https://www.isoeh.com/ 3. Https sites are safe: For financial dealings, check if the site uses Http or Https. This ensures that your data is sent encrypted across the internet to the website. Genuine e-commerce sites and online banking sites will always use the more secure form of Https instead of Http. https:// will be displayed in the URL address field of the browser with a security padlock icon next to the address. Double click on the padlock icon and the security certificate of the websitewill be displayed.If the security certificate isn’t displayed, you receive a message saying the URL address of the site does not match the certificate, or that the certificate is not to be trusted, then it is most likely a spoof with someone waiting to get hold of your credentials. 4. Be careful of shortened links: Short link services like bit.ly are popular choices for microblogging sites specially Twitter where character limitations are present. In this case, hovering over the link won’t help. Short links often hide their source and what they contain. It is a method used by malware distributors and phishing attackers to conceal the true destinations of the links. For shortened links, you can use the “preview” function. If you enter the shortened bit.ly URL in your browser with a “+” at the end, it will report back information about the site that the shortened link leads to. 5. Avoid clicking on links coming from unsolicited email: Phishing attacks often follow a common practice; verifying the details. Emails claiming to be from your bank and asking you to verify your account credentials for urgent safety issues are mostly trap. This common practice is aimed at getting access to your personal bank account and you should definitely not respond to that or give away sensitive information. If you receive such suspicious email, first check the website by entering the address directly to your browser or give them a call. Don’t accept what the email tries to claim without verifying it first.Never trust links in e-mails, text messages, pop-ups, etc. 6. Stay away from strange characters in email: Hackers and malware distributors try to conceal the destination of malware or phishing sites by using what is known as URL encoding. For example, the letter "A" that has been URL-encoded would translate to "%41". Encoding is used to mask destinations, commands etc. so that one cannot read it without URL decoding tool. So, in case of lots of special character in a link, never click on it. So, whenever you are unsure about a link, pause. Don’t be compelled by artificial urgency and don’t give away your sensitive information in emails. Be aware if you are addressed impersonally and check the authenticity of the sender carefully. If you have mistakenly clicked on a malicious link or entered your login details or other sensitive data into the site, then go to the authentic website immediately and change your passwords and login details. The moral is, while on internet, trust less and happy surfing!