{"id":378,"date":"2024-12-07T20:21:37","date_gmt":"2024-12-07T20:21:37","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/?p=378"},"modified":"2024-12-07T20:58:11","modified_gmt":"2024-12-07T20:58:11","slug":"week-6-journal-entry-6","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/2024\/12\/07\/week-6-journal-entry-6\/","title":{"rendered":"Week 6 &#8211; Journal Entry 6"},"content":{"rendered":"\n<p>Many people fall victim to fake websites by giving out information or money through fraudulent websites. These fake websites look like the real version but are designed to trick you into inputting information to access confidential information or to manipulate you into giving out money. The URL may be similar or look identical to the URL of the real version of the website, and it\u2019s something to be aware about. However, there are ways to identify fake websites before you fall victim to the fraudulent intentions of fake websites. If you are unsure if a website is real, manually navigate to the legit website to be safe. Typically, these fake websites are derived from clicking on a suspicious link that directs you to some website.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Banking scams are extremely common as threat actors try many tactics to steal the victim\u2019s login credentials for the victim\u2019s bank account. For instance, you receive an email from a bank, Wells Fargo, saying that someone has wired money to you, and you need to click a link to verify such transaction. However, you didn\u2019t expect anyone to wire money to you, so you inspect the email for anything suspicious. You hover your mouse cursor over the button that will redirect you to an external website, to which you notice a popup with a strange URL. In this case, the link should not be clicked to prevent compromising personal information.&nbsp;<\/p>\n\n\n\n<p>Another example comes from any sweepstakes telling you that you have won a new impact drill from the hardware store. For example, you receive an email telling you that you have won a new Makita impact drill from Home Depot. You\u2019re in extreme shock as big box home improvement warehouses don\u2019t typically do such giveaways like that. You choose to click the link to access the giveaway. The website of the giveaway already has some red flags that include a long URL link with \u201cHome Depot\u201d spelled wrong, no SSL certificate, and no Home Depot Logo anywhere on the site. The real Home Depot website has its logo visible, and it\u2019s clickable to redirect you home to Home Depot\u2019s main page. You are asked to simply cover shipping. Thus, this giveaway sounds too good to be true and decided not to input any information on this fraudulent website.&nbsp;<\/p>\n\n\n\n<p>A final example involves email and text scams indicating that you have received a package, but it\u2019s undeliverable as you need to verify some details with USPS. For instance, you receive a text message stating such shipping circumstances. You click the link out of curiosity to be redirected to USPS\u2019 fake website. The URL is quite long, and the quality of the website looks out of place. You are also asked to input some form of payment information to finalize shipping of the mystery package. However, we all know that there is no package to be shipped, nor do the threat actors intend to send anything. The threat actors intend to steal your credit card information to make unauthorized transactions. Thus, you decide it\u2019s in your best interest to close out the fraudulent website before any information is compromised.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many people fall victim to fake websites by giving out information or money through fraudulent websites. These fake websites look like the real version but are designed to trick you into inputting information to access confidential information or to manipulate you into giving out money. The URL may be similar or look identical to the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bach-niendoan\/2024\/12\/07\/week-6-journal-entry-6\/\">Read More<\/a><\/div>\n","protected":false},"author":29388,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts\/378"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/users\/29388"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/comments?post=378"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts\/378\/revisions"}],"predecessor-version":[{"id":429,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts\/378\/revisions\/429"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/media?parent=378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/categories?post=378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/tags?post=378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}