yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

How to avoid phishing attempts. However it’s spelled, it’s bad news


3m read
·Nov 10, 2024

  • Hi, everyone. Sal Khan here from Khan Academy, and I'm here with Grace Hoyt, head of Account Security Partnerships at Google to talk a little bit about online safety. Welcome, Grace.

  • Thanks for having me, Sal.

  • So let's just start at the basics. What is online safety and what's the worst that could happen?

  • As we spend more of our times online, we think about online safety in a way that people can go about their work or school or personal activities online in a way that they feel safe and secure. A big topic in this space that we like to provide guidance on is something called online scams, and in particular, how to avoid phishing.

  • Now, phishing, spelled with a P-H, P-H-I-S-H-I-N-G, what is that? It starts to evoke, people are maybe fishing for me.

  • That's right, Sal. Phishing does have the namesake from the word with fishing, with an F, but this phishing we're talking about is an attempt to impersonate someone, a trusted source, or reach you via email, phone, or call, and try to get access to someone's personal information, such as their bank account information, their passwords, or address, and things like that. So phishing is a way to sort of bait and hook someone into giving up personal information. Unfortunately, about 80% of all cyberattacks begin with phishing. So this is something we think it's really important for people to be able to spot and recognize on their own so that this doesn't happen to them.

  • And what form do these phishing attacks take?

  • So these can be emails impersonating a trusted source. These can come in the form of spammy text links or phone calls. One of the most important tips that we like to advise people is to not click on a URL link before verifying that it really is the source you're trying to get to. So it's always best to actually go directly to a website. For example, if you're trying to reach your bank or track the delivery of a package, type that directly into your URL, as opposed to opening a suspicious link right out of your email inbox or text message. Now, if you want to actually look more closely at a link before clicking on it, on mobile, you can press and hold down on the URL and look for suspicious aspects of that link or typos, but you can also just use the option to go directly to that link yourself, as opposed to opening it out of something that looks suspicious.

  • Okay, so this has definitely happened to me in the recent past, where I get these text messages for, "Fraud alert for your bank account," and sometimes it's from a bank where I don't even have a bank account, so they're just trying to see if I happen to be... "Someone just charged $10,000." I'm like, oh, my god, and then I look at it and the URL looks a little bit shady. To your point, you have to really confirm what the URL is, even if it doesn't look shady, and on mobile, you can press and hold. Sometimes you get these emails that say, "Hey. Someone has just done the following on your Amazon account. Go log into your Amazon account here," and it's probably a link to a fake Amazon website. You type in your credentials. Now they can actually log into your Amazon account or your banking account, or whatever else.

  • Absolutely. So unfortunately that's oftentimes a way that folks are trying to grab that password and have you hand it over to them. So you're exactly right, Sal. So we do recommend that people go straight to that URL.

  • Well, thanks for that. I think we're all a little bit less likely to get phished and get hooked.

More Articles

View All
How to organize your life using Notion| My Notion Tour + free templates
Hi, guys! What’s up? It’s me, Ruri. Today, I’m back with another video. So today, I’m gonna show you and explain to you my full Notion setup, what I use, how I use. So that you can start your new school year organized and everything put together, you know…
Conditions for IVT and EVT: table | Existence theorems | AP Calculus AB | Khan Academy
We’re told this table gives a few values of function f. It tells us what f of x is equal to that x is equal to 2, 3, 4, and 5. Which condition would allow you to conclude that there exists a maximum value for f over the closed interval from 2 to 4? So pa…
My Tips for Dealing with Uncertainty Like What the U.S. is Facing Today
But what can the individual do? And just to summarize, what can the collective do to stop or slow the decline that clearly, you know, you can measure has occurred? First, be financially strong. Have a good income and balance sheet. Think about how many m…
Ice Age Cave Art: Unlocking the Mysteries Behind These Markings | Nat Geo Live
Genevieve Von Petzinger: This incredible art that mostly dates between 10 and 40,000 years ago. What we often think of, of course, is the animals. But there’s this other enormous group called the geometric signs that outnumber the animals and the humans a…
Deriving Lorentz transformation part 2 | Special relativity | Physics | Khan Academy
We left off in the last video trying to solve for gamma. We set up this equation, and then we had the inside that, well, look, we could pick a particular event that is connected by a light signal. In that case, X would be equal to CT, but also X Prime wou…
David Blaine: Do Not Attempt | Official First Look | National Geographic
For years, I’ve had this idea in my head of jumping from a bridge on fire. Wow! I’ve always loved things that look like magic but are actually real. So, I’m traveling around the world to find the most incredible people that have the most incredible talen…