Kaspersky Standard | Plus | Premium
- Bahasa Indonesia
- Čeština (Česká republika)
- Dansk (Danmark)
- Deutsch
- Eesti
- Español (España)
- Español (México)
- Français
- Italiano
- Latviešu
- Lietuvių
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Ελληνικά (Ελλάδα)
- Български
- Русский
- Српски
- العربية (الإمارات العربية المتحدة)
- ไทย (ไทย)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- 日本語(日本)
- Bahasa Indonesia
- Čeština (Česká republika)
- Dansk (Danmark)
- Deutsch
- Eesti
- Español (España)
- Español (México)
- Français
- Italiano
- Latviešu
- Lietuvių
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Ελληνικά (Ελλάδα)
- Български
- Русский
- Српски
- العربية (الإمارات العربية المتحدة)
- ไทย (ไทย)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- 日本語(日本)
- About Kaspersky solutions
- Data provision
- Data provision under the End User License Agreement
- Data provision under the End User License Agreement on the territory of the European Union, the United Kingdom, Brazil, Vietnam, or by California residents
- Data provision to Kaspersky Security Network
- Saving data to the application operation report
- Locally processed data
- Saving data for Customer Service
- About using the application in the European Union, the United Kingdom, Brazil, Vietnam, or by California residents
- How subscription works
- How to activate a subscription on your device
- How to install or remove the application
- How to protect more devices
- Basic functionality of the application
- Assessing computer protection status and resolving security issues
- How to fix security issues on your PC
- Security news
- Application activity log and detailed report
- How to configure the application interface
- How to restore the default settings of the application
- How to apply the application settings on another computer
- How to pause and resume computer protection
- Evaluating Kaspersky application
- Searching the functionality of the application
- Store
- Security
- Scanning the computer
- How to run a Quick Scan
- How to run a Full Scan
- How to run a Custom Scan
- How to run a removable drive scan
- How to run a Context Menu File or Folder Scan
- How to enable or disable a background scan
- How to create a scan schedule
- How to search for vulnerabilities in applications installed on your computer
- How to exclude a file, folder, or threat type from scanning
- Scanning files in OneDrive cloud storage
- Updating anti-virus databases and application modules
- Intrusion Prevention
- Weak Settings Scan
- Network Monitor
- Pre-Kaspersky virus removal
- How to restore a deleted or disinfected file
- Protecting email
- Participating in Kaspersky Security Network
- Protection using Antimalware Scan Interface (AMSI)
- Remote management of computer protection
- Scanning the computer
- Performance
- Quick Startup
- PC Speed-Up
- App Updater
- Duplicates
- Large Files
- Unused Apps
- Hard Drive Health Monitor
- Backup and Restore
- Current Activity
- Do not Disturb Mode
- Game mode
- Battery Saver
- Optimizing the load on the operating system
- Privacy
- Kaspersky VPN
- Data Leak Checker
- Private Browsing
- Password Manager
- Safe Money
- Webcam and Mic Control
- Detection of stalkerware and other applications
- Anti-Banner
- Unwanted App Installation Blocker
- How to change Application Manager settings
- Adware Remover
- Secret Vault
- File Shredder
- Privacy Cleaner
- Protection using hardware virtualization
- Protecting personal data on the Internet
- About protection of personal data on the Internet
- About On-Screen Keyboard
- How to open On-Screen Keyboard
- How to configure the display of the On-Screen Keyboard icon
- About protection of data entered on the computer keyboard
- How to configure protection of data entered on the computer keyboard
- Checking a website for safety
- How to change encrypted connections settings
- About secure connection to Wi-Fi networks
- Configuring notifications of vulnerabilities in Wi-Fi networks
- Identity
- Smart Home
- Smart Home Monitor
- About the Smart Home Monitor component
- How to enable or disable Smart Home Monitor
- How to view devices on my network
- How to deny network access for a device
- How to delete a network with no connections from the list
- How to disable notifications when devices connect to my network
- How to send feedback about Smart Home Monitor
- Wi-Fi Analyzer
- Smart Home Monitor
- How to uninstall incompatible applications
- Using the application from the command prompt
- Contacting Customer Service
- Limitations and warnings
- Other sources of information about the application
- Network settings for interaction with external services
- Glossary
- Activating the application
- Anti-virus databases
- Application modules
- Backup and Restore
- Blocking an object
- Compressed file
- Database of malicious web addresses
- Digital signature
- Disk boot sector
- Exploit
- False positive
- File mask
- Heuristic analyzer
- Hypervisor
- iChecker Technology
- Incompatible application
- Infected object
- Kaspersky Security Network (KSN)
- Kaspersky update servers
- Keylogger
- Phishing
- Probable spam
- Probably infected object
- Protected Browser
- Protection components
- Protocol
- Quarantine
- Rootkit
- Script
- Secret Vault
- Security level
- Spam
- Startup objects
- Task
- Task settings
- The database of phishing links and fake cryptocurrency exchanges
- Threat level
- Traces
- Traffic scanning
- Trust group
- Trusted process
- Unknown virus
- Update
- Update package
- Virus
- Vulnerability
- Wi-Fi mesh network
- Wi-Fi signal strength
- Information about third-party code
- Trademark notices
About phishing
Phishing is a type of Internet fraud involving the theft of personal data; phishing is propagated via email and other channels.
Emails can be fake notifications from banks, ISPs, online stores, electronic payment systems, or other entities. The emails attempt to trick the recipient into visiting the scammers' website under false pretenses, such as an invitation to update login information or to find out more about a product or service.
Unsuspecting recipients of a phishing email may follow the link to find themselves on a phishing website that looks exactly like the company's website it purports to be.
Internet users can get to a phishing site in other ways, for example, by clicking on a link in a search engine.
Scammers can generally pursue a range of different goals. One of these goals is to trick users into disclosing their confidential data, such as logins, passwords to accounts or crypto wallets and other registration data, bank account numbers and banking card details. Users would enter this information into a web form on the fraudulent website giving the scammers access to their money. Infecting computers with viruses and malware is another trap a user might step into after clicking on a phishing link.
Recognizing fraudulent emails and websites
Fraudulent (phishing) emails and websites may look unsuspicious at first glance. Inclusion of company logos that look like the authentic ones or actual contact phone numbers may lull users into a false sense of security. The email may also contain links to the company's actual website, except for the main phishing link that would take the user to the criminals’ website.
The following telltale signs of phishing may alert the user:
- Though phishing website domains may look like actual legitimate companies' web domains, on closer inspection the user may notice extra words in the domain name (for example, a company's official domain www.example.com could be changed to www.login-example.com), or dots and dashes replacing slashes (www.example.com/personal/login could be changed to www.example.com.personal.login or www.example.com-personal.login). Please note that the email body may contain the company's actual domain address, but when the user clicks on the link, the browser's address bar will show a different domain.
- The email is using an impersonal form of address, such as "Dear user," or "Hello".
- Graphics in the email or on he website look unprofessional, the text contains typos or bad grammar.
- The email recipient is being asked to immediately verify their confidential data by following a link, or sometimes to enter their data in a form in the email body. The email may explain such urgency with alleged account suspension or hacking, or a threat of losing one's data.
Phishing check
Kaspersky application checks email and website contents for phishing links. Links are checked against a database of phishing web addresses and fake cryptocurrency exchanges, which is regularly updated.
For additional protection, Kaspersky uses heuristic analysis and sends queries to the Kaspersky Security Network (KSN) cloud services during the check. Kaspersky Security Network contains the most up-to-date information about recently emerged threats, including phishing websites which have not yet been added to Kaspersky databases. The data received by the KSN is analyzed by Virus Lab employees in real time.
If you have clicked through to a phishing website, you can report it to Kaspersky Security Network using the Kaspersky Protection extension.