{"id":257,"date":"2025-02-24T04:43:43","date_gmt":"2025-02-24T04:43:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dchoi201s\/?p=257"},"modified":"2025-02-24T04:43:43","modified_gmt":"2025-02-24T04:43:43","slug":"journal-entry-6","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/dchoi201s\/2025\/02\/24\/journal-entry-6\/","title":{"rendered":"Journal Entry #6"},"content":{"rendered":"\n<p>Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?<\/p>\n\n\n\n<p><br>Fake websites are prevalent throughout the internet and are tools and ways that<br>cyberattacks, and hackers utilize to steal information from their targets. Examples of<br>fake website that attackers like to utilize, and mimic are websites pertaining to e-<br>commerce, misinformation and streaming\/social media. I would say that fake e-<br>commerce websites are the most common one&#8217;s that I see online. If someone goes<br>shopping, for example a textbook, and they see on the official website it&#8217;s going for 100<br>bucks. They look for a cheaper alternative and come across a site that\u2019s selling the<br>same textbook for 10 dollars. The biggest red flags should be the price. If something is<br>too good to be true, then that should always be a warning sign. Cyberattacks like to<br>mimic legitimate brands and copy the User Interface and layout of their website to make<br>it seem like it&#8217;s official and real. Sign&#8217;s you could see that make&#8217;s a website fake is<br>spelling errors, incorrect placement of logos and web layout, etc. The website URL<br>might be something silly or ridiculous, like instead of calling it Nike.com they might call it<br>officiallynike.com to make it seem like its legitimate. There are tools one can use to see<br>if a website is fake like trustpilot.com or even utilizing reddit.com. Another example of<br>fake websites is fake news or misinformation. These kinds of websites are created for<br>political swaying or monetary gains. They are utilized to push certain political agendas<br>to sway the public to their personal viewpoints and beliefs, or even to cause panic and<br>create stock manipulation by pushing false narratives on companies. Like fake e-<br>commerce website&#8217;s, they would mimic popular media sites like CNN or the New York<br>times and create a website that makes it seem legit and real. Biggest red flags of fake<br>news site are to always check the source and the credibility of the writer of the article<br>and to check the sites for any spelling mistake&#8217;s. Lastly, the one that is the trickiest in<br>my opinion are fake social media\/streaming service sites. These are a little more<br>personal and cyberattacks would utilize email notifications and send emails saying your<br>accounts needs to update the payment method or your account&#8217;s been suspended.<br>When you click the email&#8217;s hyperlink it&#8217;ll connect you to a fake website that looks like<br>Netflix or Amazon and will prompt you to update or input your payment methods. These<br>are examples of phishing or fraud, and attackers would then use your information for<br>other nefarious acts. Like the other types of fake website, one should check for red flags<br>such as spelling mistakes, poor UI layout or design and you could even check the site&#8217;s<br>security certificate. With how digital everything is becoming; we should equip ourselves<br>with the proper tools and knowledge to prevent attacker&#8217;s from gaining access. The Ted<br>Talk from Rob May really showcased how &#8220;human nature&#8221; is flawed, but there are ways<br>to mitigate attacks by equipping ourselves with the necessary tools and knowledge to<br>prevent future attacks. Cyberattacks start with us and needs to end with us.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Fake websites are prevalent throughout the internet and are tools and ways thatcyberattacks, and hackers utilize to steal information from their targets. Examples offake website that attackers like to utilize, and&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dchoi201s\/2025\/02\/24\/journal-entry-6\/\">Read More<\/a><\/div>\n","protected":false},"author":30524,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dchoi201s\/wp-json\/wp\/v2\/posts\/257"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dchoi201s\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dchoi201s\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dchoi201s\/wp-json\/wp\/v2\/users\/30524"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dchoi201s\/wp-json\/wp\/v2\/comments?post=257"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/dchoi201s\/wp-json\/wp\/v2\/posts\/257\/revisions"}],"predecessor-version":[{"id":258,"href":"https:\/\/sites.wp.odu.edu\/dchoi201s\/wp-json\/wp\/v2\/posts\/257\/revisions\/258"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dchoi201s\/wp-json\/wp\/v2\/media?parent=257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dchoi201s\/wp-json\/wp\/v2\/categories?post=257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dchoi201s\/wp-json\/wp\/v2\/tags?post=257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}