Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    10 Tips for Identifying and Dealing With Phishing Email

    By
    Chris Preimesberger
    -
    October 18, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      110 Tips for Identifying and Dealing With Phishing Email

      1 - 10 Tips for Identifying and Dealing With Phishing Email

      Most people don’t question the “from” field in the emails they receive. We explain why they should and offer other guidelines for dealing with phishing email.

      2Don’t Trust the Display Name

      2 - Don't Trust the Display Name

      A favorite phishing tactic among cyber-criminals is to spoof the display name of an email. Here’s how it works: If a fraudster wanted to impersonate the hypothetical brand “My Bank,” the email may look something like the image here. Since My Bank doesn’t own the domain “secure.com,” email authentication defenses will not block this email on My Bank’s behalf. Once delivered, the email appears legitimate because most user inboxes and mobile phones will only present the display name. Always check the email address of the sender in the header; if it looks suspicious, flag the email.

      3Don’t Always Trust the Sender’s Email Address

      3 - Don't Always Trust the Sender's Email Address

      Fraudsters not only spoof brands in the display name, but they also spoof brands in the sender’s email address, including the domain name. Keep in mind that just because the sender’s email address looks legitimate (such as [email protected]), it may not be. A familiar name in your inbox isn’t always who you think it is.

      4Look but Don’t Click

      4 - Look but Don't Click

      Cyber-criminals love to embed malicious links in legitimate-sounding copy. Hover your mouse over any links you find embedded in the body of your email. If the link address looks weird, don’t click on it. If you have any reservations about the link, send the email directly to your security team.

      5Check for Spelling Mistakes

      5 - Check for Spelling Mistakes

      Brands are pretty serious about email. Legitimate messages usually do not have major spelling mistakes or poor grammar. Read your emails carefully and report anything that seems suspicious.

      6Analyze the Salutation

      6 - Analyze the Salutation

      Is the email addressed to a vague “Valued Customer?” If so, watch out; legitimate businesses will often use a personal salutation with your first and last name.

      7Watch What Information You Reveal

      7 - Watch What Information You Reveal

      Most companies will never ask for personal credentials via email, especially banks. Likewise, most companies will have policies preventing external communications of business IP. Stop yourself before revealing any confidential information over email.

      8Look at the Language in the Subject Line

      8 - Look at the Language in the Subject Line

      Invoking a sense of urgency or fear is a common phishing tactic. Beware of subject lines that claim your “account has been suspended” or ask you to take action on an “urgent payment request.”

      9Review the Signature

      9 - Review the Signature

      Lack of details about the signer or how you can contact a company strongly suggests a phishing attempt. Typically, legitimate businesses provide contact details. Check for them.

      10Be Cautious About Clicking on Attachments

      10 - Be Cautious About Clicking on Attachments

      Including malicious attachments that contain viruses and malware is a common phishing tactic. Malware can damage files on your computer, steal your passwords or spy on you without your knowledge. Don’t open any email attachments you weren’t expecting.

      11Don’t Believe Everything You See

      11 - Don't Believe Everything You See

      Phishers are extremely good at what they do. Many malicious emails include convincing brand logos, language and a seemingly valid email address. Be skeptical when it comes to your email messages; if it looks even remotely suspicious, do not open it.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.