https://cdnimg.rg.ru/img/content/188/47/82/iStock-1133604495_d_850.jpg

“First, you need to pay attention to the address bar of the website, – tells Tatyana Sidorina, senior content analyst “Kaspersky Lab”. – Scammers register domains similar to real. The name of the fake site may be different from the present one or two letters.”

Next, you need to examine the contents of the site for grammar errors and effects layout. Will not be superfluous hover to all links to our site, headlines and menu items. Now all browsers support the function of broadcast link when you hover. All links must be different, if the same links or the end links is a plug in the form of a pound sign, then to the user the website is fake. The same address saying that wherever the user clicked, it will be reassigned to the same crooks right place.

an inexperienced user it is extremely difficult to distinguish the fake from the real, says Eugene Livshits, a member of the Council of the State Duma on information policy, information technologies and communications. “In order not to fall into the trap of scammers, I would recommend to use the mobile applications government services. Now these apps offer the full functionality of the sites, and to forge them much more difficult. The scammers haven’t learned how to create clones, and, in fact, apps are a barrier. Impersonal “download” app in the app Store will not work. For each application there is a specific legal address. Official Google situation is somewhat different, however, to distinguish the real applications from the fake easy – just look at the name of the developer”. Expert recommends to be careful and do not click on suspicious links in emails.

“There are several approaches for the detection of sites-clones, – says Alexey Novikov, Director of the competence center security Positive Technologies. Research and information security company specifically monitor the lists of newly registered domains and through different algorithms searching for similar. They also analyze the sites to determine similarity of images, texts and other signs.”

the attackers usually have much time to “harvest” how much is the procedure of razdelyvanie domain or resource locking. And it all depends on the hosting provider and the country where the website is hosted. In some cases, this procedure may take a week, but sometimes the speed of the reaction of all stakeholders up to several hours, said Novikov.

Previous articleThe conflict of generations
Next articleFacebook has launched a emotional bot
Jennifer Alvarez is an investigative journalist and is a correspondent for European Union. She is based in Zurich in Switzerland and her field of work include covering human rights violations which take place in the various countries in and outside Europe. She also reports about the political situation in European Union. She has worked with some reputed companies in Europe and is currently contributing to USA News as a freelance journalist. As someone who has a Masters’ degree in Human Rights she also delivers lectures on Intercultural Management to students of Human Rights. She is also an authority on the Arab world politics and their diversity.