Blog posts of '2021' 'November'

What is Email Phishing and How To Protect Your Information?





What is Email Phishing and How To Protect Your Information?


Phishing attacks don’t only grow in numbers but also in innovation. Make sure not to compromise your security level, especially in digital spaces. Successful phishing crimes can lead to fake account creations, ruined identities, and massive loss of money.


Creating an unphishable security key and learning how to recognize different types of phishing can become your strong email phishing protection. 


What is Email Phishing? 

Phishing is a fraudulent practice where an online con artist impersonates a legitimate entity to send deceptive messages to trick a user into divulging private information or provide access to the attacker to deploy malicious malware on someone’s system. Most phishing attacks are done via email. 


Email phishing is one of the easiest and most popular methods of cybercrime that steal information such as login credentials, credit card details, social security numbers, or phone numbers.



How Does Phishing Occur?

Phishing happens as a user responds to a fraudulent email, especially those that require immediate action. Typically, a phishing email demands the following:

  • update a password

  • open an attachment

  • use a new wi-fi hot spot

  • enable malicious macro files in a Word document

  • allow a social media connection request


Other Types of Phishing

Aside from email phishing, other types of the most pervasive phishing include:

  • Spear Phishing – This is a highly targeted and well-researched attack that focuses on specific individuals or groups within a company or organization.

  • Malware Phishing – Using the same scheme as email phishing, this form of phishing asks its targets to click a link or download an attachment to install malware on the device or system. 

  • Link Manipulation – This attack encourages a user to click a link that will lead to a fake website designed to seem legitimate and then asks the victim to confirm or update their account credentials. 

  • SMS Phishing/Smishing – Often assisted by malware or fraud websites, this SMS fraudulent sends malicious short links to smartphone users.

  • Vishing – Also known as voice phishing, this type of phishing uses a voice message or a phone call claiming to be tech support from an organization that asks for sensitive data such as bank details or credit card numbers. 

  • Search Engine Phishing – This attack involves the hackers creating fraudulent websites and having them indexed on search engines often to get direct payments or steal identities. 

  • Pharming – This is a more sophisticated type of phishing where hackers reroute legitimate web traffic to a fraudulent website by targeting the domain name system (DNS), making the user’s personal information vulnerable to theft. 

  • Clone Phishing – Through this phishing attack, the attacker clones and re-sends a legitimate email that you’ve recently received from an authentic sender using a seemingly credible email id. The cloned email can be accompanied by malicious content such as a link or attachment, which when clicked will lead to the installation of malware to your system. 

  • Man-in-the-Middle – In this phishing, the hackers involve themselves between legitimate conversations or data transfer of two unsuspecting parties. 

  • Malvertising – This cyberattack injects malicious content into online advertisements to spread malware. 


How Can Yubico Prevent Phishing?

Phishing attacks evolve along with the advances of technology. Weak electronic security can make you or your entity vulnerable to phishing attacks and other cybercrimes. Yubico’s U2F Security Key and YubiKey deliver robust and cutting-edge security to your digital domain. 


Since they make any login bound to the origins, the keys will only authenticate legitimate websites while failing fake sites. FIDO U2F’s token biding prevents man-in-the-middle attacks by securing the connection between the browser and the service. Some of the toughest security keys by Yubico require a human touch as a verification. 


Yubico’s high-quality authentication solutions are easy to use and deploy as well.  Security Key NFC   by Yubico offers superior defense against phishing attacks and account takeovers. Other speedy and reliable electronic securities include  YubiKey 5 NFC YubiKey 5Ci YubiKey 5C NFC YubiKey 5 Nano , and YubiKey Bio.


Want strong protection for both traditional and modern phishing attacks? Yubico is a global leader and pioneer for authentication standards for the modern web. 


Should you require our services, call us at +63 2 8858 5555 today!

What is two factor authentication? And how does it work?



What is two factor authentication? And how does it work? 


With the rise of hackers and different types of cybercrimes, having mere passwords isn’t enough. Take your security to new heights with 2-factor authentication or multi-factor authentication, protecting your account and sensitive information from theft.


What Is Two Factor-Authentication? 

Two-factor authentication (2FA) is an additional layer of security that requires two different and distinct identification to access an online account or complete a transaction. Aside from username and password, 2FA demands another piece of information, which can be a code sent to you via text, a biometric pattern of your fingerprint, face, retina, or others.


Multi-factor authentication (MFA), on the other hand, is an electronic authentication method that requires more than one verification factor to gain access to an application or website. MFA strengthens security by combining two or more independent categories of credentials such as password, security token, or biometrics, minimizing the chances of becoming a victim of cyber-attacks. 


How Does 2-Factor Authentication Work? 

With two-factor authentication, any user who attempts to open an account should enter the right username and password. After a successful log-in, instead of having access immediately, a second verification is required to finally gain full access to the account.


Meaning, you’ll need another identifying factor beyond just the traditional username and password. The second factor is often hard to crack since it is something that only the legitimate user has access to. 


Types Of Two-Factor Authentication

The most common types of two-factor authentication include:

  • SMS 2FA – Two-factor authentication via SMS sends a secret one-time passcode (usually 5-6 digits) to a user’s mobile number as a second verification following the username and password log-in. This is the most popular 2FA option since many people use SMS, plus no app installation is required. 

  • Phone call 2FA – Much like SMS 2FA, users get a verification code through a phone call after a successful username and password log-in. 

  • Email 2FA – 2FA via email is also a common choice since it’s easy to implement and accessible to both smartphones and computers. In this method, an OTP or secret code is sent to the user via email. In some cases, instead of OTP, they’ll send unique links which you can simply click to gain access. 

  • Hardware 2FA – Used primarily by business entities, hardware-based two-factor authentication is one of the most secure 2FA methods. It uses a device such as a key fob or dongle to generate a 2FA token for access gain. 

  • Biometric 2FA – This method works by requiring the legitimate user to present something unique about his physical body such as a fingerprint, retina, face, or voice for account access.


With this generation becoming reliant on computers and the internet, optimizing your security with two-factor authentication is crucial to prevent and combat digital fraud. With 2FA, you can protect your confidential data or bank account details from some fraudster trying to impersonate you. 


The industry’s number 1 security key is YubiKey. It allows strong two-factor, multi-factor, and password-less authentication that works with a range of services including Mac login, Gmail, Dropbox, Facebook, and much more! It’s like your one key to access all. 


With Yubico’s Security Key NFC and U2F Security Key, expect a simple and intuitive authentication experience. You can opt for YubiKey 5 NFC if you want the most effective protector against account takeovers. Choose YubiKey 5Ci if you need a dual connector with support for USB-C and Lightning. 


Other robust and cutting-edge products include  YubiKey 5C NFC YubiKey 5 Nano and  

YubiKey Bio. These are fast, easy, and reliable authentication electronic securities.  


Want an easy-to-use but strong authentication electronic security? Let the Yubico security key protect your accounts and profiles online. Yubico is a global authentication leader brand trusted by some of the world’s largest enterprises and millions of users across the globe.


For inquiries, feel free to call us at +63 2 8858 5555 today!