<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=699785206826853&amp;ev=PageView&amp;noscript=1">

Security Training: Learn to Spot a Phishing Email (& Websites)

Posted by Stephen Abbey on Feb 5, 2017 1:20:53 PM

Find me on:

 

     Phishing e-mail messages and websites are built to monetize puny humans. Cybercriminals can do it by faking an email, installing malignant software on your computer or taking private info off your PC..

 

     Cyber criminals also use social engineering to persuade you to install destructive software or hand over your private info under fake pretenses. They'd e-mail you, call you on the telephone, or convince you to download something from an internet site. Here is an instance of what a phishing swindle in an e-mail message.

 

phishing_email_example.jpg

Source: Microsoft corp.

 

     Hacker's aren't famous for their grammar and spelling. Corporations large or small have a staff to edit copy that won't permit a mass e-mail to go out to its users. If you happen to spot mistakes in an e-mail, it could be a con. Be wary of links in e-mail. If you see a suspicious e-mail message, don't click it. Rest your mouse ( but do not click ) on the relationship to determine if the link matches the link typed in the message. When the mouse was hovering over the link, it uncovers the real web address. If there is a string of mysterious numbers and it looks nothing like the corporation's web address you are more than likely being Phished. Phishing swindles masked web address Links might also steer you to a .exe file. These data are known to spread malware software.

 

Let Securable Protect You


     Ever received a threat that your account would be closed if you did not make a response to an e-mail message? Hackers regularly use threats that your security has been compromised. To get more information, see Keep an eye out for fake alerts. Spoofing favored internet sites or firms is becoming more and more mainstream.

     Sting artists use graphics in the e-mail that seem to be hooked up to valid websites but mainly take you to fake con sites or legitimate-looking pop-up windows. Cyber criminals also use web addresses that have a resemblance to the names of well-known firms but are barely changed.

 

Test your skills below!

Phishing Test

 

 

WATCH: Intro to Phishing Emails

 

 

 

Keywords: cyber security awareness, cyber awareness training, cyber education, offensive security, human firewall, security training, social engineering

Topics: Human Firewall, cyber awareness training, security training, offensive security, Social Engineering, cyber security awareness

Stephen Abbey

Written by Stephen Abbey