Phishing is a type of social engineering scam where an attacker sends a fraudulent or deceptive message designed to trick the recipient into either revealing sensitive information to the attacker or deploying malicious software, like ransomware, on the victim’s electronic devices.
Phishing can occur through text message (“smishing”), voice or video calls (“vishing”), and even fraudulent QR codes (“qishing”).
How to Identify Fraudulent Emails
Phishing most commonly occurs through an email with a malicious attachment or with links that lead to malicious websites. Opening the attachment or visiting the website introduces the possibility of having malicious software secretly installed on your device. In some cases, the unauthorized software may turn your device into a base to spread even more malicious software to other users on the internet or within your company. A malicious website may also prompt you to enter certain login credentials in order to steal your information.
Fraudsters who use phishing tactics hope to convince victims to share their personal information by using clever and compelling language, such as an URGENT need for you to update your information IMMEDIATELY (“We will shut down your account if you do not log on today and update your password!”) or a need to communicate with you FOR YOUR OWN SAFETY OR SECURITY (“We have determined that your computer is not protected and you need to install our software to prevent further infections!”). Make sure to look out for spelling mistakes within the message, and hover over the sender’s information to ensure the message is from a verified email address. Fraudsters often create lookalike email addresses and domains to appear as though their email is from a trusted party.
Harmful Pop-Up Windows
Fraudsters may use pop-up windows — small windows or ads — to obtain personal information. These windows may be generated by programs hidden in free downloads, such as screen savers or music-sharing software. Some best practices can help protect you from harmful pop-up windows: