What is Phishing? It is the act of a person sending an email to a user and falsely claiming to be a legitimate establishment in an attempt to scam the user into surrendering private and personal information that will be used for identity theft by the one who is doing the Phishing. This email directs the user to visit a web site where they are asked to update private and personal information, such as passwords, credit cards, social security, and bank account numbers, which is information a legitimate organization should have. The Web site, however, is bogus and is set up only to steal the user’s information. Phishing emails may contain links to websites that are infected with malware. The first use of the term phishing was made in 1995. The term is similar to fishing, eluding the baits in hope that the potential victim will bite down by clicking a malicious link or opening a malicious attachment, in such case their financial information and passwords may then be stolen.
Here are some things to check for to make sure that you are not bait to an internet fraudulent shark.
First thing to look for is where is the email is being sent from is it a legitimate email address. For instance if receiving an email from FedEx does it read from: fedex.com
Second check the dates on the email attachment do they all match up.
Lastly read fully through the message sent to you in the email does it make sense as you read it or does it confuse you in anyway if so then you know you are under attack and need to close and delete the email message.
Cyber-criminals are not known for their grammar and spelling. Professional companies usually have a staff of copy editors that will not allow a mass of emails like these to go out to their users. If you notice mistakes in an email it may be a scam.
Beware of links in email. If you see a link in a suspicious email message, don’t click on it. Rest your mouse (but don’t click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company’s web address.