{"id":24011,"date":"2022-08-07T08:54:08","date_gmt":"2022-08-07T12:54:08","guid":{"rendered":"https:\/\/www.thundercloud.net\/infoave\/new\/?p=24011"},"modified":"2022-08-07T08:54:08","modified_gmt":"2022-08-07T12:54:08","slug":"dont-be-a-victim-learn-how-to-recognize-phishing-emails","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/dont-be-a-victim-learn-how-to-recognize-phishing-emails\/","title":{"rendered":"Don&#8217;t be a Victim. Learn How to Recognize Phishing Emails"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\"><strong>Don&#8217;t be a Victim. Learn How to Recognize Phishing Emails<\/strong><\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; color: #999999;\"><strong><span style=\"font-size: 18pt;\">Phishing is the number one way that miscreants steal personal information and identities.<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Every single day, hundreds of thousands of people are tricked into giving up personal information to criminals. And the many of these poor folks were tricked into clicking links in phishing emails or messages.<\/span><strong><br \/>\n<\/strong><br \/>\n<span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Phishing is a type of deceptive email or message that&#8217;s designed to trick you into divulging personal information, such as Social Security numbers, credit card numbers, account usernames ands passwords, and other sensitive information such as your cell phone number, home address, sensitive account data, passwords, or other personal and\/or financial information.<\/span><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">You might see a phishing scam:<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">In e-mail messages, even if they appear to be from a coworker or someone you know. Email &#8220;from&#8221; addresses are very easy to forge.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">On your social networking Web site.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">On a fake website that accepts donations for charity or offers to help victims of a recent catastrophe.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">On websites that spoof familiar sites using slightly different Web addresses (typo-squatting or cybersquatting) hoping to fool you &#8211; or just hoping that you won&#8217;t notice.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">In your instant messaging program.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Spam text messages on your cell phone.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Voice calls to your home telephone<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Most often though, phishing scams rely on getting you to click links in e-mail messages or text messages. These messages often seem to come from a service that you trust, like your bank, credit card company, your favorite online shopping sites,\u00a0 or social networking sites. The links often lead to counterfeit websites that look identical to sites that you know and trust. Sometimes, unless you look at the address in your browser&#8217;s address bar, you cannot tell these counterfeit sites from the authentic site. That&#8217;s why it&#8217;s so important that you never click links in suspicious emails, even if the emails appear to be from someone you know and trust. Email headers, &#8220;from&#8221; addresses and &#8220;from&#8221; phone numbers, can be easily forged even by those who are not computer experts. It&#8217;s very easy to do.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\"><strong><span style=\"font-size: 18pt;\">What to look for&#8230;<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Here are a few phrases to look for in messages that practically scream out <strong>&#8220;this is a phishing scam&#8221;.<\/strong><\/span><\/p>\n<p><strong><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">&#8220;Verify your account.&#8221;<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Legitimate businesses never ask you to send passwords, login names, Social Security numbers, or other personal information via email.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">&#8220;You have won the lottery.&#8221;<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The lottery scam is a common phishing scam known as &#8220;advanced fee&#8221; fraud. The most common form of this type of fraud is a message that claims that you have won a large sum of money, or that a person will pay you a large sum of money for little or no work on your part. If you didn&#8217;t buy an entry to a lottery, you could not have won a lottery, could you? Common sense should be your guide here.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">&#8220;If you don&#8217;t respond within 48 hours, your account will be closed.&#8221;<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The sense of urgency these messages convey tries to induce you to respond immediately without thinking. Ah, see? Common sense prevails. Never click without thinking. Use common sense you apply every day in your normal (non-internet) life to the Internet &#8211; and especially when it comes to email and text messages.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">In another version of this, an email message might claim that your immediate response is required because your account may have been compromised.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">&#8220;You have been caught doing illegal things on the Internet&#8221;<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">This type of phishing email may appear to have come from your ISP or even from the police or other authorities. Police aren&#8217;t going to notify you by email that you&#8217;ve been doing illegal things. They&#8217;d be at your door with a search warrant. <\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Your ISP isn&#8217;t going to write you about your illegal activities, they&#8217;re going to notify the authorities who will then appear at your door with a search warrant. Think! <\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Even if you have been doing illegal things with your computer &#8211; which we know you haven&#8217;t, you&#8217;re not going to be notified by email that you&#8217;ve been caught. Think about it. Why would the FBI or police tip you off first? So you could flee to Lower Slobovia and avoid arrest? Think!<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">&#8220;Your ISP is going to suspend your account&#8221;<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Oh really? It&#8217;s not even from my ISP &#8211; and even if it appeared to be from my ISP is not going to notify me by email. They have my home address and phone number. Think! Don&#8217;t fall for this one.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Most phishing scams use email and cellphone calls or text messaging to fish (&#8220;phish&#8221;) for victims.\u00a0<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Phishing is used to scam you via email, cell phones, and home phones too.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">You can defeat any phishing scam with nothing more than the gray matter between your ears. Use your head. And always keep your favorite browser up to date and use a good antivirus \/ anti-malware program.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Don&#8217;t be a Victim. Learn How to Recognize Phishing Emails Phishing is the number one way that miscreants steal personal information and identities. Every single day, hundreds of thousands of people are tricked into giving up personal information to criminals. And the many of these poor folks were tricked into clicking links in phishing emails or\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/dont-be-a-victim-learn-how-to-recognize-phishing-emails\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":14573,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4179,1461,3590,1670,1680,1656,3766,4202],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/24011"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=24011"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/24011\/revisions"}],"predecessor-version":[{"id":24012,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/24011\/revisions\/24012"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/14573"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=24011"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=24011"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=24011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}