What is the Risk?
Phishing is a deceptive tactic used by cyber criminals to collect sensitive information online. An email from what appears to be a familiar source, such as Apple or PayPal, will often encourage you to click on a link, directing you to a bogus site with the attempt to steal your personal information. It will often require you to fill in personal details such as bank account or credit card information, usernames and passwords, or other sensitive information, posing a real risk that may compromise your privacy, potentially leading to identity theft.
How it Works
Scans every field
Prior to enabling you to insert your credentials, the system will thoroughly scan and examine every field on the page, including the site’s URL, title, layout of the page, form, signature, and visible text and links for potential deceptive threats. The dedicated spaces for your credentials, such as email address, become blocked until the scan has finished.
Alerts you of phishing attempts
The system will determine whether the site is trustworthy or not using Check Point’s ThreatCloud™, the world’s biggest threat database. If the site is determined to be fraudulent, you will be immediately alerted and blocked from accessing it; nevertheless, you will have the option to continue on to the site should you wish.