SlideShare ist ein Scribd-Unternehmen logo
1 von 9
AVG.COM.AU
AVG.CO.NZ




How To Spot An Email Scam
Michael McKinnon, AVG (AU/NZ) Security Advisor
Overview
     Received a suspicious-looking email that wasn’t caught by
     your anti-spam filter? Here’s what to do:

     1. Check the sender and subject

     2. Look for spelling and grammatical errors

     3. Exercise caution with links and attachments

     4. Spot unusual images or logos

     5. Be aware of existing common scams




AVG.COM.AU                                                       AVG.CO.NZ
Sender and subject details
     Things to look for:

     • A subject line that doesn‟t make sense, or seems overly „spammy‟

     • The sender‟s „from‟ address being completely different to the one
       the message asks you to reply to

     • The automatic „reply-to‟ address being different (hit „reply‟ to test
       – but don‟t send of course!)

     • A blank sender and subject




AVG.COM.AU                                                                AVG.CO.NZ
Spelling and grammatical errors
     Things to look for:

     • Text that is readable, but riddled with odd punctuation, grammar
       or spelling

     • Extra and unnecessary spaces and paragraphs

     • A lack of required spaces or paragraphs




AVG.COM.AU                                                            AVG.CO.NZ
Links and attachments
     Attempting to click on links or open attachments within
     unknown emails is incredibly dangerous – so exercise
     extreme care!

     • Always hover your mouse over the links first, to see where they
       lead

     • Internet security software with LinkScanning technology is a must
       (but even with this, there is STILL a risk!)




AVG.COM.AU                                                               AVG.CO.NZ
Images and logos
     Things to look for:

     • Squashed logos and images that just don‟t look right!

     • Logos that are outdated




AVG.COM.AU                                                     AVG.CO.NZ
Common email scams
     Be wary of any of these types of email messages:

     1. Standard phishing – “We need you to supply your account
        details…”

     2. Something is wrong – “There is a problem with your
        transaction…”

     3. Something is waiting – “A package has arrived for you…”

     4. You’ve won – “Congratulations! $1 million is yours…”

     5. Work at home – “Start earning $$$ working from home…”



     View other common email scams on the Australian Government‟s
     SCAMWatch website or the AVG (AU/NZ) blog


AVG.COM.AU                                                          AVG.CO.NZ
Summary
     1. Email cannot always be trusted

     2. If unsure, simply delete!

     3. Use an anti-spam filter – this is included in AVG Internet Security



     Happy scam-free emailing! 




AVG.COM.AU                                                              AVG.CO.NZ
Thank you!

                Connect with us to stay up to date with the
                latest news and information about online
                threats and scams.
                Come and say hello!




   avg.com.au                                           facebook.com/avgaunz

   avg.co.nz
                                                        twitter.com/avgaunz



             Copyright © 2012 AVG (AU/NZ) Pty Ltd, an Avalanche Technology Group company. All rights reserved.

AVG.COM.AU                                                                                                       AVG.CO.NZ

Weitere ähnliche Inhalte

Mehr von AVG Technologies AU

Mehr von AVG Technologies AU (10)

How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!
 
AVG Threat Report Q4 2012
AVG Threat Report Q4 2012AVG Threat Report Q4 2012
AVG Threat Report Q4 2012
 
AVG Q3 2012 Threat Report
AVG Q3 2012 Threat ReportAVG Q3 2012 Threat Report
AVG Q3 2012 Threat Report
 
How To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your JobHow To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your Job
 
Keeping hackers out of your POS!
Keeping hackers out of your POS!Keeping hackers out of your POS!
Keeping hackers out of your POS!
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
 
AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online Security
 
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
 

Kürzlich hochgeladen

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 

How To Spot An Email Scam

  • 1. AVG.COM.AU AVG.CO.NZ How To Spot An Email Scam Michael McKinnon, AVG (AU/NZ) Security Advisor
  • 2. Overview Received a suspicious-looking email that wasn’t caught by your anti-spam filter? Here’s what to do: 1. Check the sender and subject 2. Look for spelling and grammatical errors 3. Exercise caution with links and attachments 4. Spot unusual images or logos 5. Be aware of existing common scams AVG.COM.AU AVG.CO.NZ
  • 3. Sender and subject details Things to look for: • A subject line that doesn‟t make sense, or seems overly „spammy‟ • The sender‟s „from‟ address being completely different to the one the message asks you to reply to • The automatic „reply-to‟ address being different (hit „reply‟ to test – but don‟t send of course!) • A blank sender and subject AVG.COM.AU AVG.CO.NZ
  • 4. Spelling and grammatical errors Things to look for: • Text that is readable, but riddled with odd punctuation, grammar or spelling • Extra and unnecessary spaces and paragraphs • A lack of required spaces or paragraphs AVG.COM.AU AVG.CO.NZ
  • 5. Links and attachments Attempting to click on links or open attachments within unknown emails is incredibly dangerous – so exercise extreme care! • Always hover your mouse over the links first, to see where they lead • Internet security software with LinkScanning technology is a must (but even with this, there is STILL a risk!) AVG.COM.AU AVG.CO.NZ
  • 6. Images and logos Things to look for: • Squashed logos and images that just don‟t look right! • Logos that are outdated AVG.COM.AU AVG.CO.NZ
  • 7. Common email scams Be wary of any of these types of email messages: 1. Standard phishing – “We need you to supply your account details…” 2. Something is wrong – “There is a problem with your transaction…” 3. Something is waiting – “A package has arrived for you…” 4. You’ve won – “Congratulations! $1 million is yours…” 5. Work at home – “Start earning $$$ working from home…” View other common email scams on the Australian Government‟s SCAMWatch website or the AVG (AU/NZ) blog AVG.COM.AU AVG.CO.NZ
  • 8. Summary 1. Email cannot always be trusted 2. If unsure, simply delete! 3. Use an anti-spam filter – this is included in AVG Internet Security Happy scam-free emailing!  AVG.COM.AU AVG.CO.NZ
  • 9. Thank you! Connect with us to stay up to date with the latest news and information about online threats and scams. Come and say hello! avg.com.au facebook.com/avgaunz avg.co.nz twitter.com/avgaunz Copyright © 2012 AVG (AU/NZ) Pty Ltd, an Avalanche Technology Group company. All rights reserved. AVG.COM.AU AVG.CO.NZ