SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Understanding Phishing E-Mail
Scams
What They Are and How To Protect Yourself
What is Phishing?
“Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text
message by someone posing as a legitimate institution to lure individuals into providing
sensitive data such as personally identiïŹable information, banking and credit card details, and
passwords.
The information is then used to access important accounts and can result in identity theft and
ïŹnancial loss.”
Source: Phishing.org
Common Ploys Used in Phishing Emails
Scammers have been known to use a wide range of messages to get people to provide
their personal information and they’re always looking for new ways to take advantage
of people. Some common ploys used by phishers include:
● Fake invoices
● Messages about suspicious account activity or other problems with an account
● Links to make a payment
● OïŹ€ers for free things
● Messages about being eligible for a government refund
Common Features of Phishing Emails
According to Phishing.org, phishing emails very often have some of the following
features:
● “Too good to be true” oïŹ€ers and statements
● Messages that create a sense of urgency to get people to act quickly
● Hyperlinks that are misspelled or, when hovered over with a mouse pointer, show
a URL that’s diïŹ€erent from what you expect
● Unusual attachments
● The message was sent from an unfamiliar sender
Example of a Phishing
Email
Phishing Email Example
Source: FTC
How Can You Tell This is a Phishing Email?
The email looks like it’s from a familiar, trusted company and even uses the company’s
logo. But the following signs signify the email is part of a phishing scam:
● The email says your account is on hold because of a billing problem, a common
phishing ploy.
● The email uses the greeting, “Hi Dear.” A real email would likely use your real
name, not a generic greeting like this.
● The email also includes a link to provide payment information.
Protecting Yourself from
Phishing Scams
Protecting Yourself from Phishing Scams
● Install a SPAM ïŹlter to reduce the number of fraudulent and malicious emails you receive.
● Don’t trust any email urgently requesting personal information, such as checking account or credit card numbers, Social
Security numbers, user names, passwords, PIN codes or other ïŹnancial information.
● When clicking on links in an email, watch the “address bar” of your browser to ensure you’re directed to the authentic,
branded domain. It is easy for a phisher to spoof a web link and redirect it to another web site.
● Rather than using hyperlinks in an email that you suspect may not be authentic, you should directly type in the URL in the
Internet browser address bar. CertiïŹcates for the site ensure that the site you type in is where you’re going. In an email,
hyperlinks may appear to be going to one site, but can direct you to another.
● When entering personal information on secure sites, look for the locked padlock on the Internet browser’s status bar or make
sure that you see https:// at the start of the URL in the address bar. This indicates SSL security is in place, although it does not
guarantee the site’s legitimacy. Without these, however, the web site is deïŹnitely not secure.
● Be alert to scammers phishing using any communication method and asking you to conïŹrm using any communication
method (phone, fax, email, etc.)
● Keep in mind that legitimate companies would never ask their customers for private information in an email.
Source: USC Credit Union
What to Do If You Become
a Phishing Victim
Steps to Take After Becoming a Phishing Victim
● File a police report. Get a copy of the report to submit to your creditors and others that may require proof of the crime.
● Contact the fraud departments of any of the three major credit bureaus to place a fraud alert on your credit ïŹle. The fraud
alert requests creditors to contact you before opening any new accounts or changing information on existing accounts. The
credit bureau is required to notify the other two bureaus after conïŹrming your fraud alert. You will then receive a copy of your
credit report from all three credit bureaus. (See below for contact information for all three major credit bureaus.)
● Contact your credit union or bank and notify all with whom you have a ïŹnancial relationship.
● Immediately close those accounts that you know or suspect have been tampered with or opened fraudulently.
● File your complaint with the Federal Trade Commission (FTC). The FTC maintains a database of identity theft cases used by
law enforcement agencies for investigation. Further information regarding identity theft can be obtained from the FTC at
www.consumer.gov/idtheft or 1-877-ID-THEFT.
● Report the theft of your checks to check veriïŹcation companies.
● Check the post oïŹƒce for unauthorized change of address requests on your behalf.
● Follow-up all telephone calls with letters and keep a copy of all correspondence.
Source: USC Credit Union

Weitere Àhnliche Inhalte

Was ist angesagt?

Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity AwarenessJoshuaWisniewski3
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptxMohammedYaseen638128
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Securityanjuselina
 
Phishing ppt
Phishing pptPhishing ppt
Phishing pptshindept123
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDmitriy Scherbina
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Social engineering and Phishing
Social engineering and PhishingSocial engineering and Phishing
Social engineering and Phishingthecorrosiveone
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing TechniquesRaza_Abidi
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & PhishingGrittyCC
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for studentsAkhil Nadh PC
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security AwarenessSurya Bathulapalli
 

Was ist angesagt? (20)

Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Social engineering and Phishing
Social engineering and PhishingSocial engineering and Phishing
Social engineering and Phishing
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 

Ähnlich wie Understanding Phishing E-Mail Scams

You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft- Mark - Fullbright
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
Is this a scam.pdf
Is this a scam.pdfIs this a scam.pdf
Is this a scam.pdfAvaAmelia
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6krupp
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?- Mark - Fullbright
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Alexandru Turcu
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftNorfolk Naval Shipyard
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharmingDawn Hicks
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation nickski51
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud Dixita S
 

Ähnlich wie Understanding Phishing E-Mail Scams (20)

You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Is this a scam.pdf
Is this a scam.pdfIs this a scam.pdf
Is this a scam.pdf
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
Phishers
PhishersPhishers
Phishers
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Phishing
PhishingPhishing
Phishing
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
Anatomy of a Scam
Anatomy of a ScamAnatomy of a Scam
Anatomy of a Scam
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
Fraudulent bank wiring
Fraudulent bank wiringFraudulent bank wiring
Fraudulent bank wiring
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 

Mehr von John Poster

Improving Employee Retention in Trucking
Improving Employee Retention in TruckingImproving Employee Retention in Trucking
Improving Employee Retention in TruckingJohn Poster
 
Truck Accidents & Electronic Stability Control
Truck Accidents & Electronic Stability ControlTruck Accidents & Electronic Stability Control
Truck Accidents & Electronic Stability ControlJohn Poster
 
The Role of Virtual Healthcare During COVID-19
The Role of Virtual Healthcare During COVID-19The Role of Virtual Healthcare During COVID-19
The Role of Virtual Healthcare During COVID-19John Poster
 
Understanding Credit Reports
Understanding Credit ReportsUnderstanding Credit Reports
Understanding Credit ReportsJohn Poster
 
Protecting Children from Identity Theft
Protecting Children from Identity TheftProtecting Children from Identity Theft
Protecting Children from Identity TheftJohn Poster
 
The Benefits of Biophilic Design in the Workplace
The Benefits of Biophilic Design in the WorkplaceThe Benefits of Biophilic Design in the Workplace
The Benefits of Biophilic Design in the WorkplaceJohn Poster
 
7 Steps to Take After a Car Accident
7 Steps to Take After a Car Accident7 Steps to Take After a Car Accident
7 Steps to Take After a Car AccidentJohn Poster
 
Infographic Reveals Challenges of Remote Working
Infographic Reveals Challenges of Remote WorkingInfographic Reveals Challenges of Remote Working
Infographic Reveals Challenges of Remote WorkingJohn Poster
 

Mehr von John Poster (8)

Improving Employee Retention in Trucking
Improving Employee Retention in TruckingImproving Employee Retention in Trucking
Improving Employee Retention in Trucking
 
Truck Accidents & Electronic Stability Control
Truck Accidents & Electronic Stability ControlTruck Accidents & Electronic Stability Control
Truck Accidents & Electronic Stability Control
 
The Role of Virtual Healthcare During COVID-19
The Role of Virtual Healthcare During COVID-19The Role of Virtual Healthcare During COVID-19
The Role of Virtual Healthcare During COVID-19
 
Understanding Credit Reports
Understanding Credit ReportsUnderstanding Credit Reports
Understanding Credit Reports
 
Protecting Children from Identity Theft
Protecting Children from Identity TheftProtecting Children from Identity Theft
Protecting Children from Identity Theft
 
The Benefits of Biophilic Design in the Workplace
The Benefits of Biophilic Design in the WorkplaceThe Benefits of Biophilic Design in the Workplace
The Benefits of Biophilic Design in the Workplace
 
7 Steps to Take After a Car Accident
7 Steps to Take After a Car Accident7 Steps to Take After a Car Accident
7 Steps to Take After a Car Accident
 
Infographic Reveals Challenges of Remote Working
Infographic Reveals Challenges of Remote WorkingInfographic Reveals Challenges of Remote Working
Infographic Reveals Challenges of Remote Working
 

KĂŒrzlich hochgeladen

Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfGale Pooley
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...Call Girls in Nagpur High Profile
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptxFinTech Belgium
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfMichael Silva
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...ssifa0344
 
VIP Independent Call Girls in Mumbai đŸŒč 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai đŸŒč 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai đŸŒč 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai đŸŒč 9920725232 ( Call Me ) Mumbai Escorts ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaipriyasharma62062
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfGale Pooley
 
VIP Independent Call Girls in Andheri đŸŒč 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri đŸŒč 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri đŸŒč 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri đŸŒč 9920725232 ( Call Me ) Mumbai Escorts...dipikadinghjn ( Why You Choose Us? ) Escorts
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfGale Pooley
 
Indore Real Estate Market Trends Report.pdf
Indore Real Estate Market Trends Report.pdfIndore Real Estate Market Trends Report.pdf
Indore Real Estate Market Trends Report.pdfSaviRakhecha1
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfGale Pooley
 
VIP Independent Call Girls in Mira Bhayandar đŸŒč 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar đŸŒč 9920725232 ( Call Me ) Mumbai ...VIP Independent Call Girls in Mira Bhayandar đŸŒč 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar đŸŒč 9920725232 ( Call Me ) Mumbai ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptxFinTech Belgium
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Call Girls in Nagpur High Profile
 
Call Girls in New Friends Colony Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escort...
Call Girls in New Friends Colony Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escort...Call Girls in New Friends Colony Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escort...
Call Girls in New Friends Colony Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escort...Delhi Call girls
 

KĂŒrzlich hochgeladen (20)

Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdf
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
 
VIP Independent Call Girls in Mumbai đŸŒč 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai đŸŒč 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai đŸŒč 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai đŸŒč 9920725232 ( Call Me ) Mumbai Escorts ...
 
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
 
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdf
 
VIP Independent Call Girls in Andheri đŸŒč 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri đŸŒč 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri đŸŒč 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri đŸŒč 9920725232 ( Call Me ) Mumbai Escorts...
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdf
 
Indore Real Estate Market Trends Report.pdf
Indore Real Estate Market Trends Report.pdfIndore Real Estate Market Trends Report.pdf
Indore Real Estate Market Trends Report.pdf
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdf
 
VIP Independent Call Girls in Mira Bhayandar đŸŒč 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar đŸŒč 9920725232 ( Call Me ) Mumbai ...VIP Independent Call Girls in Mira Bhayandar đŸŒč 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar đŸŒč 9920725232 ( Call Me ) Mumbai ...
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
 
Call Girls in New Friends Colony Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escort...
Call Girls in New Friends Colony Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escort...Call Girls in New Friends Colony Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escort...
Call Girls in New Friends Colony Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escort...
 
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
 

Understanding Phishing E-Mail Scams

  • 1. Understanding Phishing E-Mail Scams What They Are and How To Protect Yourself
  • 2. What is Phishing? “Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identiïŹable information, banking and credit card details, and passwords. The information is then used to access important accounts and can result in identity theft and ïŹnancial loss.” Source: Phishing.org
  • 3. Common Ploys Used in Phishing Emails Scammers have been known to use a wide range of messages to get people to provide their personal information and they’re always looking for new ways to take advantage of people. Some common ploys used by phishers include: ● Fake invoices ● Messages about suspicious account activity or other problems with an account ● Links to make a payment ● OïŹ€ers for free things ● Messages about being eligible for a government refund
  • 4. Common Features of Phishing Emails According to Phishing.org, phishing emails very often have some of the following features: ● “Too good to be true” oïŹ€ers and statements ● Messages that create a sense of urgency to get people to act quickly ● Hyperlinks that are misspelled or, when hovered over with a mouse pointer, show a URL that’s diïŹ€erent from what you expect ● Unusual attachments ● The message was sent from an unfamiliar sender
  • 5.
  • 6. Example of a Phishing Email
  • 8. How Can You Tell This is a Phishing Email? The email looks like it’s from a familiar, trusted company and even uses the company’s logo. But the following signs signify the email is part of a phishing scam: ● The email says your account is on hold because of a billing problem, a common phishing ploy. ● The email uses the greeting, “Hi Dear.” A real email would likely use your real name, not a generic greeting like this. ● The email also includes a link to provide payment information.
  • 10. Protecting Yourself from Phishing Scams ● Install a SPAM ïŹlter to reduce the number of fraudulent and malicious emails you receive. ● Don’t trust any email urgently requesting personal information, such as checking account or credit card numbers, Social Security numbers, user names, passwords, PIN codes or other ïŹnancial information. ● When clicking on links in an email, watch the “address bar” of your browser to ensure you’re directed to the authentic, branded domain. It is easy for a phisher to spoof a web link and redirect it to another web site. ● Rather than using hyperlinks in an email that you suspect may not be authentic, you should directly type in the URL in the Internet browser address bar. CertiïŹcates for the site ensure that the site you type in is where you’re going. In an email, hyperlinks may appear to be going to one site, but can direct you to another. ● When entering personal information on secure sites, look for the locked padlock on the Internet browser’s status bar or make sure that you see https:// at the start of the URL in the address bar. This indicates SSL security is in place, although it does not guarantee the site’s legitimacy. Without these, however, the web site is deïŹnitely not secure. ● Be alert to scammers phishing using any communication method and asking you to conïŹrm using any communication method (phone, fax, email, etc.) ● Keep in mind that legitimate companies would never ask their customers for private information in an email. Source: USC Credit Union
  • 11. What to Do If You Become a Phishing Victim
  • 12. Steps to Take After Becoming a Phishing Victim ● File a police report. Get a copy of the report to submit to your creditors and others that may require proof of the crime. ● Contact the fraud departments of any of the three major credit bureaus to place a fraud alert on your credit ïŹle. The fraud alert requests creditors to contact you before opening any new accounts or changing information on existing accounts. The credit bureau is required to notify the other two bureaus after conïŹrming your fraud alert. You will then receive a copy of your credit report from all three credit bureaus. (See below for contact information for all three major credit bureaus.) ● Contact your credit union or bank and notify all with whom you have a ïŹnancial relationship. ● Immediately close those accounts that you know or suspect have been tampered with or opened fraudulently. ● File your complaint with the Federal Trade Commission (FTC). The FTC maintains a database of identity theft cases used by law enforcement agencies for investigation. Further information regarding identity theft can be obtained from the FTC at www.consumer.gov/idtheft or 1-877-ID-THEFT. ● Report the theft of your checks to check veriïŹcation companies. ● Check the post oïŹƒce for unauthorized change of address requests on your behalf. ● Follow-up all telephone calls with letters and keep a copy of all correspondence. Source: USC Credit Union