{"id":905,"date":"2021-08-04T04:21:16","date_gmt":"2021-08-04T09:21:16","guid":{"rendered":"http:\/\/hirehconsulting.ca\/demo\/canquest\/?p=905"},"modified":"2024-02-27T14:11:04","modified_gmt":"2024-02-27T19:11:04","slug":"how-to-spot-a-phishy-email-blog","status":"publish","type":"post","link":"https:\/\/hirehconsulting.ca\/demo\/canquest\/how-to-spot-a-phishy-email-blog\/","title":{"rendered":"How to Spot a Phishy Email &#8211; blog"},"content":{"rendered":"<p>We\u2019ve grown used to hearing about internet scams. It seems like every week there&#8217;s something new on the news that is worth sharing, let alone all the old scams that are still working today. Phishing is tricky because cyber criminals aren\u2019t your ordinary delinquents. They\u2019re smart and sophisticated. They know how to disguise themselves to gain your trust. That\u2019s why this article is focusing on how to spot a phishy email.<\/p>\n<h3>WHAT IS PHISHING?<\/h3>\n<p>The term \u201cphishing\u201d describes an illegal activity in which criminals impersonate legitimate people or organizations through advertisements, email, even text messages. All three options usually include a link that appears to take you to an official website. Unfortunately, the website is fake and any information you share with them goes directly to the scammers.<\/p>\n<p>\u201cPhishing\u201d is a spin-off of \u201cfishing\u201d because criminals use a fake lure, hoping to catch their prey.<\/p>\n<h3>HOW DANGEROUS IS A PHISHING SCAM?<\/h3>\n<p>In a word\u2026 very. When someone falls for a phishing scam, it\u2019s likely they\u2019ll have their identity stolen. This affects your credit score and can result in your bank accounts getting emptied. New credit cards can be opened in your name, causing even further damage. It\u2019s also possible that by clicking on the link, the same link will be sent to all your friends and family either through your email or social media accounts. Now they\u2019re also at risk.<\/p>\n<h3>TYPES OF PHISHING<\/h3>\n<ol>\n<li>STANDARD EMAIL: The most common form of phishing is the attempt to steal important information through email from a source that looks legitimate.<\/li>\n<li>MALWARE PHISHING: The same techniques are used from email phishing but downloads malware onto your device.<\/li>\n<li>SPEAR PHISHING: This is unlike most scams that cast a wide net, hoping to trick anyone and everyone. Spear phishing is highly targeted, focusing on lucrative victims such as businesses, executives, or public personas.<\/li>\n<li>SMISHING: One of the most recent types of phishing is SMS enabled. This means malicious links are delivered to your smartphone often disguised as prizes or political messages.<\/li>\n<li>SEARCH ENGINE PHISHING: Is very technically sophisticated. It\u2019s when traffic to a legitimate website is rerouted to a spoofed page. The user has no idea the page they\u2019re visiting is fake and inputs valuable information.<\/li>\n<li>VISHING: is the term used to describe voice phishing; a malicious caller pretending to be from tech support, a government agency, or charitable foundation.<\/li>\n<li>MAN-IN-THE-MIDDLE ATTACK: Involves eavesdropping or monitoring correspondence between two parties. Attackers usually create fake WIFI networks at coffee shops or shopping malls. When the user signs into the businesses \u201cfree WIFI\u201d, they have no idea it doesn\u2019t belong to the business.<\/li>\n<li>BUSINESS EMAIL COMPROMISE (BEC): About half of all cyber-crime in 2019 was due to BEC. An email appearing to be from someone within the organization requests urgent action on an email, which tricks many unsuspecting employees into following the emails directions.<\/li>\n<\/ol>\n<h3>HOW TO SPOT A PHISHY EMAIL<\/h3>\n<p>Phishing messages try to look like a legitimate organization that you deal with. This could be your bank, your internet service provider, the government, even organizations such as Amazon or Netflix. However, if you check the return address from the message, you\u2019ll likely see the address is a long URL, with incorrect spelling. For example, a phishing email could come from Amazon, saying there\u2019s a problem with your order. However, the address came from \u201cAmazom.ca\u201d with an M at the end, not N.<\/p>\n<p>There\u2019s often an intimidating backstory involved in the email, explaining why you need to click on the link. This can include (but isn\u2019t limited to):<\/p>\n<ul>\n<li>\u201cWe\u2019ve noticed suspicious activity or log-in attempts on your account.\u201d<\/li>\n<li>\u201cYou must confirm some personal information.\u201d<\/li>\n<li>\u201cThere\u2019s a problem with your account or payment info.\u201d<\/li>\n<li>\u201cYou\u2019re eligible for a prize\/government refund\/coupon.\u201d<\/li>\n<li>They offer coupons or free stuff by clicking the link.<\/li>\n<li>They include a fake invoice for your referral.<\/li>\n<\/ul>\n<p>If the email is threatening in nature, it\u2019s likely a scam. It\u2019s demanding \u201cimmediate action\u201d, highlighting the consequences of not clicking the link. These consequences often include shutting down your account, paying ridiculous fees or even facing jail time. Keep in mind that no legitimate organization will make these threats.<\/p>\n<h3>FINAL THOUGHTS<\/h3>\n<p>Some scams are easy to spot. Others can take months for the victim to notice something is wrong and by then it can be impossible to find out what you did wrong. Fortunately, internet service providers, and web security organizations are always working to keep up with cyber criminals. If you\u2019re concerned about your online security, <a href=\"http:\/\/hirehconsulting.ca\/demo\/canquest\/2023\/09\/12\/here-are-important-cyber-security-tips\/\">read some important cyber-security tips here.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing scams are tricky because cyber criminals are smart and sophisticated. Knowing how to disguise themselves to gain your trust puts you at risk. That\u2019s why this article is focusing on how to spot a phishy email.<\/p>\n","protected":false},"author":1,"featured_media":907,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-905","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/posts\/905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/comments?post=905"}],"version-history":[{"count":3,"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/posts\/905\/revisions"}],"predecessor-version":[{"id":2271,"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/posts\/905\/revisions\/2271"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/media\/907"}],"wp:attachment":[{"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/media?parent=905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/categories?post=905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/tags?post=905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}