Phishing protection: the default browser is critical

Using increasingly sophisticated methods, scammers are trying to steal credentials from unsuspecting Internet users. Make Cliqz your default browser to protect yourself from such scams. Cliqz is four times more efficient!

Phishing Protection

Björn GreifEditor

Every day, phishing attacks target gullible Internet users. Criminals use email and social media messages to lure users to fraudulent web sites in order to steal confidential information such as passwords and credentials.

How vulnerable you are to such scams depends largely on the default browser you choose. The Cliqz Browser’s built-in anti-phishing feature detects up to four times more phishing attempts than Google Safe Browsing and works considerably faster, uncovering phishing sites within an hour. When you open a potentially dangerous website, the Cliqz Browser displays a warning. This happens, for example, when you click on a link in a scam mail. Such a link will always open in the browser you set as your default. So your default browser plays a crucial role!

Make Cliqz your default browser now. This is the only way to benefit from its highly efficient phishing protection! How to make Cliqz your default browser on Windows 10, you can learn in this tutorial. On Android, go to Settings > Apps > Default Apps and select the Cliqz Browser under Browser App. Due to Apple’s system limitations, it is not possible to change the default browser on iOS.

The essentials in brief:

  • Use a default browser with built-in phishing protection (Cliqz detects up to four times more phishing attempts than Google Safe Browsing)
  • Do not open emails that appear suspicious and delete them without reading them
  • Never click on links or attachments in messages if you don't know or don’t trust the sender
  • Be especially careful with emails that explicitly ask for credit card numbers, PINs or TANs
  • Use up-to-date security software
  • Always keep your operating system and applications up to date
Phishing Protection Infographic

The sneaky tricks scammers use to fool you

The term “phishing”, by the way, is a homophone of fishing, and is so named probably because phishing scams use lures to catch unsuspecting victims. Like tricksters at the front door or on the phone, phishers like to pretend in their messages to have a personal relationship with their victim or make false promises, such as a lottery win or free offers. By means of this so-called social engineering, they try to win the trust of the recipients.

To make their victims follow their instructions voluntarily, they build up pressure by signaling an urgent need for action (otherwise your data will be lost) or uttering concrete threats (your account will be blocked). Often scammers also impersonate a reputable bank or company. In their name they claim, for example, that for security reasons the user must confirm his login data or that the email attachment contains an invoice or order confirmation.

Many phishing mails nowadays appear deceptively genuine both visually and in terms of content, which is why careless people follow the contained link to fake login pages or malicious websites or open an attachment infected with malware. Then the scammers have already achieved their goal.

Identify fraudulent messages

Besides a default browser with anti-phishing functionality, the best protection against fraud attempts is vigilance and a healthy level of scepticism. Check regularly to see if you know the sender of a message and if it is really the same. You should also ask yourself whether the subject and message text make sense and whether you expect the sender to attach an item such as an invoice.

If an email seems strange to you, you should not open it, but delete it without reading it. If in doubt, you can also call your bank or the respective company to find out whether the message actually came from them.

Be especially careful when confidential data such as credit card numbers, PINs or transaction numbers (TANs) are requested in messages. Trustworthy companies would never request such information in this way. Another warning signal is an urgent request to follow a link or open an attached form.

Scammers use such phishing mails to try to steal credentials and credit card data from unsuspecting users (Source: FTC).
Scammers use such phishing mails to try to steal credentials and credit card data from unsuspecting users (Source: FTC).

Steps to take if you’ve fallen victim to a phishing scam

Unfortunately, there is no such thing as 100% protection against phishing and malware, which is why you should always be cautious. It is generally recommended to use a security software and always keep it up to date, such as your operating system, browser and other applications.

If you have become the victim of a phishing attack despite all precautions, you should report the fraud as soon as possible to the provider whose name has been misused. You should also make sure that the scammers cannot use the stolen data to cause any further damage: For example, change all your passwords, block your TAN list and bank accounts if necessary, and check your online accounts (banking, shopping) regularly for unusual transactions.

Make Cliqz your default browser and benefit from its highly efficient phishing protection: