grayscale photo of man using macbook
E-mail

5 Ways to Detect a Phishing Email

One of the most common forms of cybercrime is phishing, but despite our best efforts to avoid falling for these con artists, we still fall for them far too frequently.

 

In the 2022 State of the Phish Report from Proofpoint, 83% of businesses experienced a phishing attack in the previous year.

 

Meanwhile, phishing accounts for 25% of all data breaches, according to Verizon’s 2021 Data Breach Investigations Report.

 

These figures assist with making sense of why phishing is viewed as among the greatest network protection takes a chance with that associations face. Criminal hackers can infect our devices with malware or steal our personal information with a single email.

 

Fortunately, recognizing a phishing email can be all it takes to avoid these attacks.

This blog utilizes five genuine guides to exhibit the normal signs that somebody is attempting to trick you.

  • The message is being sent from a public email domain. No legitimate organization will ever send emails from an address that ends with “@gmail.com.”

Google, not even. The majority of businesses will have their own email accounts and domain, with the exception of a few small businesses. For instance, genuine Google emails will include the address “@google.com.”

 

On the off chance that the area name (the piece after the @ image) matches the evident shipper of the email, the message is presumably authentic.

 

In contrast, it is almost certainly a scam if the email comes from an address that is not associated with the apparent sender.

  • The domain name is spelled incorrectly There is another clue in domain names that strongly suggests phishing scams, but it complicates our previous clue.

The issue is that a registrar allows anyone to purchase a domain name. Even though each domain name must be unique, it is possible to create addresses that are indistinguishable from the spoofed one in numerous ways.

Swindlers have registered the domain “microsfrtfonline.com” in this instance, which, to the uninitiated, sounds like “Microsoft Online” and could be considered a legitimate address.

In the meantime, some con artists get even more inventive. That was demonstrated in the episode “What Kind of Idiot Gets Phished?

The show’s producer, Phia Bennin, hired an ethical hacker to phish several employees. He assumed the persona of Bennin and purchased the domain name “gimletrnedia.com” (pronounced “r-n-e-d-i-a” rather than “m-e-d-i-a”).

 

He deceived the show’s hosts, CEO, and president of Gimlet Media because his con was so successful.

 

Bennin went on to explain that a criminal hacker can get important information even if they don’t get caught.

  • The email is written badly You can usually tell if it’s a scam if it has bad spelling and grammar.

You will hear from a lot of people that such errors are part of a “filtering system” that cybercriminals use to target only the most gullible individuals.

The theory goes that if someone doesn’t pay attention to clues about how the message is written, it will be harder for them to figure out the scammer’s plan at the end.

However, this only applies to bizarre schemes like the Nigerian prince scam, which is frequently mocked and to which you would have to be extremely naive to fall victim.

Additionally, similar con schemes are manually operated: The con artist must respond when someone takes the bait. Thusly, it helps the hoodlums to guarantee the pool of respondents contains just the individuals who could trust the remainder of the con.

 

  • It contains links or suspicious attachments. Phishing emails come in many different forms. In this article, we’ve only talked about emails, but you might also get fake texts, phone calls, or posts on social media.

 

However, phishing emails always come with a payload, regardless of how they are delivered. This could be a link to a fake website or an infected attachment that you are asked to download.

 

These payloads are designed to steal sensitive data like login credentials, credit card information, phone numbers, and account numbers.

 

In this case, the con artists are claiming that the recipient’s Netflix subscription is having problems. They will be taken to a mockup of Netflix’s website in the email, where they will be asked to enter their payment information.

 

By embedding the link within a button that says “Update account now,” the con artists accomplish two things.

 

First, it gives the impression that the message is genuine, and buttons are becoming more and more common in emails and websites. However, the most important feature is that it turns the destination address into a hyperlink.

 

You need to teach yourself to check where links go before opening them in order to avoid falling for schemes like this one.

 

Thank goodness, this is simple: When you hover your mouse over a link on a computer, the address of the destination will appear in a small bar at the bottom of the browser.

When using a mobile device, hold down the link to open a pop-up with the link.

 

  • The message makes us feel like we need to act quickly Swindlers are aware that most of us put things off. We decide to deal with the important information contained in the email later.

However, the likelihood of noticing anomalies increases with time spent reflecting on a topic.

Perhaps you understand that the association doesn’t reach you by that email address, or you address a partner and discover that they didn’t send you a report.

 

Even if you don’t have that “a-ha” moment, if you look at the message again with new eyes, it might help you understand its true nature.

 

Because of this, many scams require immediate action or it will be too late. This is clear from every example we’ve used thus far.

 

Since PayPal, Windows, and Netflix provide services that are frequently used, issues with those statements could cause immediate problems.

 

In workplace scams, the manufactured sense of urgency works just as well.