“The enemy doesn’t break the door down.
They trick you into opening it.”
Today, an email showed up in the school inbox saying that “report card grades have been updated.”
It looked real.
School logo. Familiar sender name. Well-written message.
But the link inside it was poisoned.
If someone had clicked, they would have landed on a fake website, typed their password, and just like that — full access to their school email, cloud files, and personal data.
That’s phishing.
And it works because it looks legitimate.
What Is Phishing?
Phishing is a social engineering attack designed to trick you into giving away your own information.
It can arrive through:
- Text messages
- WhatsApp or Instagram DMs
- SMS alerts
- QR codes
- Shortened links
- Fake attachments or documents
The attacker doesn’t force entry.
They convince you to hand over the keys.
And What About Malware?
Malware is malicious software created to invade, spy on, damage, steal from, or take control of your device.
You can get malware by:
- Downloading pirated files
- Clicking infected links
- Installing fake apps
- Opening disguised attachments
- Plugging in compromised USB drives
Some malware can:
- Record everything you type (keyloggers)
- Spy on your screen and camera
- Steal passwords and session cookies
- Encrypt your files and demand ransom
- Turn your laptop into a “zombie” used to attack others
How I Protect Myself From Phishing
This is my personal checklist.
I run through it every time an email looks suspicious.
- I check the real sender address, not just the display name
- I read the message slowly and look for odd wording
- I don’t click shortened or unfamiliar links
- I hover over links to preview the real destination
- I watch for urgency or emotional pressure — that’s a classic trick
- I never send codes, passwords, or personal data through messages
- If it claims to be from a bank, school, or official service, I access it directly through the official app or website
How I Protect My Device (My Endpoint)
An endpoint is any device that connects to a network — laptop, phone, tablet.
Your endpoint should be treated like a fortress.
My basic rules:
- Trusted antivirus enabled
- Firewall turned on
- System and browser updates always current
- Different passwords for device login, email, and apps
- Short screen-lock timeout
- Avoid unknown or open Wi-Fi networks
- Remove apps I don’t use
- Never run programs as administrator without a clear reason
What If You Click by Accident?
If you slip up, speed matters.
Do this immediately:
- Disconnect from the internet
- Run a full antivirus scan
- Change the affected passwords right away
- Check browser extensions and app permissions
- Talk to a trusted adult or IT support if available
The faster you act, the less damage is done.
Gabriela’s Message
“Scams aren’t ugly.
They’re well designed.
That’s why you should always verify before trusting.”
Protect your email, and you protect the entrance to your digital fortress.
And that’s how a Guardian stays one step ahead.



Deixe uma resposta