Phishing
is a technique used by fraudsters. It involves tricking users into revealing
confidential data through spoof emails or Web pages.
The protection against fraudulent web pages in will block access to these pages. If it is a suspicious web page, you'll see a pop-up warning asking if you want to access the page or not. Pages blocked by and pages that you have allowed or blocked through the pop-up warnings, will be included in the list of blocked and allowed URLs which you can configure at any time.
Follow the steps below to configure detection of fraudulent web pages:
Go to the Status menu in the main program window.
In the Protection section, click Settings.
Click Identity protection and make sure that the Enable identity protection option is selected.
Make sure that the Compare with trusted addresses option is selected. You can select the level of sensitivity. The greater the sensitivity, the less the risk, but also the margin of error could increase in detections. It is advisable to select the medium level of sensitivity.
Click
Settings.
You'll see a list of Web pages that are blocked and a list of pages
to which you have allowed access. This screen lets you change these settings.
If you want to allow access to any of the blocked pages, remove them from the list. Select the URL you want to remove and click Delete. Then write the URL in the New Web page box in the allowed pages section, and click Add.
If you want to block access to any of the allowed pages, remove them from the allowed pages list. Select the URL you want to remove and click Delete. Then write the URL in the New Web page box in the blocked pages section, and click Add.