{"id":2183,"date":"2017-02-02T14:58:10","date_gmt":"2017-02-02T19:58:10","guid":{"rendered":"http:\/\/www.paageetcie.com\/blog\/?p=2183"},"modified":"2020-04-04T23:26:10","modified_gmt":"2020-04-05T03:26:10","slug":"10-signs-target-email-phishing-scam","status":"publish","type":"post","link":"http:\/\/www.paageetcie.com\/blog\/10-signs-target-email-phishing-scam\/","title":{"rendered":"10 Signs You Are the Target of an Email Phishing Scam"},"content":{"rendered":"<p>I recently received an email from my bank asking me to update my login information. The email looked legitimate since the last four digits of one of my bank account number were provided in the email. But I quickly realized the email was a phishing scam to obtain my username and password to access my bank accounts. I called my bank immediately to report the security issue, and no harm was done.<\/p>\n<p>But what if I had clicked on the link and entered my login information? The possible harm a phishing scam can do is scary. Cyber-criminals use phishing to trick you into believing you\u2019re on a safe web page. If successful, they gain access and can ransack your emails, documents, photos or contacts. Just ask <a href=\"https:\/\/en.wikipedia.org\/wiki\/Podesta_emails\">John Podesta<\/a>, former chairman of the Democratic National Committee, whose emails were hacked. Cyber-criminals can also pretend to be you and send out harmful emails. Sometimes they use phishing to steal your identity or access your accounts, changing the login information and then shopping or make banking withdrawals without your knowledge.<\/p>\n<p>How do you know an email is a phishing attempt? There\u2019s no easy way \u2013\u2013 no simple push of a button \u00ad\u00ad\u2013\u2013 to avoid identity theft or sabotaged accounts in today\u2019s fast-paced technological world. First, whatever you do, <strong>do not<\/strong> click on a link provided in an email. Instead, review the signs of a potential scam, as provided below. Then, follow the steps at the end of this article to decrease the chances of a security breach in the first place.<\/p>\n<ol>\n<li><strong>Partial Account Numbers<\/strong><\/li>\n<\/ol>\n<p>An email message showing the last 4 digits of your account number doesn\u2019t make it legitimate. The account may have been hacked, and now the cyber-criminals are trying to trick you into taking another step to compromise additional data.<\/p>\n<ol start=\"2\">\n<li><strong>Confidential Information Requests<\/strong><\/li>\n<\/ol>\n<p>A legitimate business will never send an email asking for your social security number or EIN information. They also will not ask for your account number, credit card information or PIN number. Avoid responding to these types of emails.<\/p>\n<ol start=\"3\">\n<li><strong>Suspicious Email Addresses<\/strong><\/li>\n<\/ol>\n<p>If you receive an email from a legitimate business, the sender should use <em>@domain<\/em> name for the email address. Question emails sent from free email services.<\/p>\n<ol start=\"4\">\n<li><strong>Strange Content<\/strong><\/li>\n<\/ol>\n<p>Closely examine the content of the email. If the sender\u2019s message seems less personal than expected, it may be a scam. Also, cyber-criminals use translation software to send emails in almost any language, but the software isn\u2019t perfect. If you see grammatical errors, look more closely. Watch for links three to four lines long as this is another sign of a potential scam.<\/p>\n<ol start=\"5\">\n<li><strong>Unexpected Attachments <\/strong><\/li>\n<\/ol>\n<p>Never open attachments you\u2019re not expecting. Even if you know the sender, be cautious. If you are not expecting an attachment, email the sender to ask if they sent it. You can also look at the attachment name. For instance, documents with .exe at the end are likely meant to harm your computer.<\/p>\n<ol start=\"6\">\n<li><strong> Attachments from Friend<\/strong><\/li>\n<\/ol>\n<p>Be careful when you receive an attachment from someone you do know. For instance, a vicious scam currently affecting Gmail involves receiving an email with an attachment from a friend. What you don\u2019t know is the acquaintance\u2019s account was hacked, and now the cyber-criminal are using it to snag more innocent victims. The scammers hope you\u2019ll click on the attachment to see a preview. But instead of seeing the preview, a window or tab opens up requesting your login information to continue to Gmail. Everything looks normal. But it\u2019s not \u2013\u00a0it\u2019s a fake website created to steal your information and wreak havoc on your personal finance. \u00a0Read on to learn how to recognize these hoax sites.<\/p>\n<ol start=\"7\">\n<li><strong>Fake Sites<\/strong><\/li>\n<\/ol>\n<p>Don\u2019t assume a site with an appropriate logo and company name is legitimate. You must review the browser address to be certain:<\/p>\n<p style=\"padding-left: 30px;\">Is the website address really long? If so, this could be a fake site. Look for a bunch of characters after the basic website address. If you see lots of text, this is most likely a text block containing a file to create a fake login page.<\/p>\n<p style=\"padding-left: 30px;\">Does the address include https:\/\/? Sites that start with https:\/\/ are secure. If the address does not start with this, the link may be a phishing scam.ont<img loading=\"lazy\" class=\"aligncenter size-full wp-image-2188\" src=\"http:\/\/www.paageetcie.com\/blog\/\/wp-content\/uploads\/2017\/02\/USbank.png\" alt=\"\" width=\"576\" height=\"361\" srcset=\"http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/02\/USbank.png 576w, http:\/\/www.paageetcie.com\/blog\/wp-content\/uploads\/2017\/02\/USbank-300x188.png 300w\" sizes=\"(max-width: 576px) 100vw, 576px\" \/><\/p>\n<ol start=\"8\">\n<li><strong>Unexpected Gifts or Freebies<\/strong><\/li>\n<\/ol>\n<p>Emails promising gifts, such as reward points, free vacations or\u00a0gift cards, are scams if you aren\u2019t expecting them.<\/p>\n<ol start=\"9\">\n<li><strong>Closing Account<\/strong><\/li>\n<\/ol>\n<p>If you receive an email indicating your account may be closed if you don\u2019t act immediately, don\u2019t panic and log in. Cyber-criminals have only a short amount of time to get you to act before the company finds out about the problem, so they want you to panic and log-in. Instead, contact the holder of the account directly to inquire if they are planning to close the account in question. You can also type the vendor&#8217;s website address directly into your Internet browser, then click on your account to see what\u2019s really going on.<\/p>\n<ol start=\"10\">\n<li><strong>Unauthorized Charges<\/strong><\/li>\n<\/ol>\n<p>Avoid emails saying you have unauthorized charges and must enter your login information at the provided link. The only way to verify if you truly have unauthorized charges is to call the vendor using a phone number you receive in your billing statement or on the back of a card. Or, type the name the creditor or bank directly into your Internet browser, and then log-in to see what\u2019s going on with your account.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I recently received an email from my bank asking me to update my login information. The email looked legitimate since the last four digits of one of my bank account number were provided in the email. But I quickly realized the email was a phishing scam to obtain my username and password to access my [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2184,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[245,9,164],"tags":[],"_links":{"self":[{"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/posts\/2183"}],"collection":[{"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/comments?post=2183"}],"version-history":[{"count":7,"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/posts\/2183\/revisions"}],"predecessor-version":[{"id":2192,"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/posts\/2183\/revisions\/2192"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/media\/2184"}],"wp:attachment":[{"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/media?parent=2183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/categories?post=2183"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.paageetcie.com\/blog\/wp-json\/wp\/v2\/tags?post=2183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}