Phishing is a technique used by fraudsters. It involves tricking users into revealing confidential data (passwords, credit card numbers, etc.) through spoof emails or Web pages similat to legitimate ones. .
The protection against fraudulent Web pages in will block access to these pages. If it detects a suspicious Web page, you will see a pop-up warning asking if you want to access the page or not. Both the fraudulent pages blocked automatically by and the pages that you have allowed or blocked through the pop-up warnings will be included in a list of blocked and allowed URLs which you can configure at any time.
Follow the steps below to configure detection of fraudulent Web pages:
Click Identity protection in the main window of the program.
To enable this protection, set the control to the ON position. To disable it, set it to OFF.
Make sure the Enable the protection against fraudulent websites checkbox is selected. You can select the level of sensitivity. The greater the sensitivity, the less the risk, but also the margin of error could increase in detections. It is advisable to select the medium level of sensitivity.
Click Settings. You will see a list of Web pages that are blocked and a list of pages to which you have allowed access. This window lets you change these settings.
If you want to allow access to any of the blocked pages, remove them from the List of Web pages to block. Select the URL you want to remove and click Delete. Then, write the URL in the New Web page box in the List of allowed Web pages section, and click Add.
If you want to block access to any of the allowed pages, remove them from the List of allowed Web pages. Select the URL you want to remove and click Delete. Then, write the URL in the New Web page box in the List of Web pages to block section, and click Add.