{"id":28956,"date":"2024-08-25T09:44:20","date_gmt":"2024-08-25T13:44:20","guid":{"rendered":"https:\/\/www.thundercloud.net\/infoave\/new\/?p=28956"},"modified":"2024-08-25T09:44:20","modified_gmt":"2024-08-25T13:44:20","slug":"how-to-recognize-phishing-emails-and-text-messages","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/how-to-recognize-phishing-emails-and-text-messages\/","title":{"rendered":"How to Recognize Phishing Emails and Text Messages"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><span class=\"auto-style3\" style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\"><strong>How to Recognize Phishing Emails and Text Messages<\/strong><\/span><\/p>\n<p><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\"><strong>Phishing is, by far, the most common way miscreants steal your personal information and even your identity.<br \/>\n<\/strong><\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" alignleft\" src=\"https:\/\/thundercloud.net\/infoave\/images\/2024\/phish8.png\" alt=\"How to recognize a phishing scam - Cloudeight InfoAve\" width=\"142\" height=\"141\" \/><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Millions of people are tricked into giving up their personal information to criminals every single day. Almost always, th<\/span><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">is happens because these poor folks were tricked into clicking links in phishing emails or opening links in text messages.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Phishing is a type of deceptive email or message that\u2019s designed to trick you into divulging personal information, such as Social Security numbers, credit card numbers, account usernames, and passwords, as well as other sensitive information such as your cell phone number, home address, sensitive account data, passwords, or other personal or financial information.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">You might see a phishing scam:<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">In e-mail messages, even if they appear to come from a coworker or someone you know. For computer-savvy criminals, email \u201cfrom\u201d addresses are easy to forge.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">On your social networking Web site.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">On a counterfeit website that accepts donations for charity or offers to help victims of a recent catastrophe.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">On websites that spoof familiar sites using slightly misspelled Web addresses like mircosoft.com (it&#8217;s called typo-squatting or cybersquatting) hoping to fool you \u2013 or just hoping you won\u2019t notice.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">In your instant messaging program.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Spam, <a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/smishing-the-sneaky-text-message-scam\/\" target=\"_blank\" rel=\"noopener\">smishing<\/a>, <a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/lets-talk-about-vishing-and-number-spoofing\/\" target=\"_blank\" rel=\"noopener\">vishing<\/a> voice calls or text messages on your cell phone.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Voice calls to your home telephone (<a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/lets-talk-about-vishing-and-number-spoofing\/\" target=\"_blank\" rel=\"noopener\">vishing<\/a>).<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Most often though, phishing scams rely on getting you to click links in emails or text messages. These messages often appear to come from a company or other entity you trust, such as your bank, credit card company, your favorite online shopping sites,\u00a0 or social networking sites. The links often lead to counterfeit websites that look identical to sites you know and trust. Sometimes, unless you look at the address in your browser\u2019s address bar, you cannot tell these counterfeit sites from the authentic site. That\u2019s why it\u2019s so important that you never click links in suspicious emails, even if the emails appear to be from someone you know and trust. Email headers, \u201cfrom\u201d addresses, and \u201cfrom\u201d phone numbers, can be easily forged even by those who are not computer experts. It\u2019s easy to do.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">What to look for\u2026<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Here are a few phrases to look for in messages that practically scream out \u201cThis is a phishing scam\u201d.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">\u201cVerify your account.\u201d<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Legitimate businesses never ask you to send passwords, login names, Social Security numbers, or other personal information via email.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">\u201cYou have won the lottery.\u201d<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">The lottery scam is a common phishing scam known as \u201cadvanced fee\u201d fraud. The most common form of this type of fraud is a message that claims that you have won a large sum of money, or that a person will pay you a large sum of money for little or no work on your part. If you didn\u2019t buy an entry to a lottery, you could not have won a lottery, could you? Common sense should be your guide here.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">\u201cIf you don\u2019t respond within 48 hours, your account will be closed (or suspended).\u201d<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">The sense of urgency these messages convey tries to induce you to respond immediately without thinking. Ah, see? Common sense prevails. Never click without thinking. Use the common sense you apply every day in your normal (non-internet) life to the Internet \u2013 especially when it comes to email and text messages.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">In another version of this, an email message might claim that your immediate response is required because your account may have been compromised.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">\u201cYou have been caught doing illegal things on the Internet\u201d<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">This type of phishing email may appear to have come from your ISP or even from the police or other authorities. Police aren\u2019t going to notify you by email that you\u2019ve been doing illegal things. They\u2019d be at your door with a search warrant.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Your ISP isn\u2019t going to write you about your illegal activities, they\u2019re going to notify the authorities who will then appear at your door with a search warrant. Think!<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Even if you have been doing illegal things with your computer \u2013 which we know you haven\u2019t, you\u2019re not going to be notified by email that you\u2019ve been caught. Think about it. Why would the FBI or police tip you off first? So you could flee to Lower Slobovia and avoid arrest? Think!<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">\u201cYour ISP is going to suspend your account\u201d<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Oh really? It\u2019s not even from my ISP \u2013 and even if it appeared to be from my ISP is not going to notify me by email. They have my home address and phone number. Think! Don\u2019t fall for this one.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Most phishing scams use email and cellphone calls or text messaging to fish (\u201cphish\u201d) for victims.\u00a0<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Phishing is used to scam you via email, cell phones, and home phones too.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">You can defeat any phishing scam with nothing more than the gray matter between your ears. Use your head. Always keep your favorite browser up to date and use a good antivirus \/ anti-malware program.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; How to Recognize Phishing Emails and Text Messages Phishing is, by far, the most common way miscreants steal your personal information and even your identity. Millions of people are tricked into giving up their personal information to criminals every single day. Almost always, this happens because these poor folks were tricked into clicking links in phishing\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/how-to-recognize-phishing-emails-and-text-messages\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":28957,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1678,3590,4507,4512],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/28956"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=28956"}],"version-history":[{"count":2,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/28956\/revisions"}],"predecessor-version":[{"id":28959,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/28956\/revisions\/28959"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/28957"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=28956"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=28956"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=28956"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}