Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Phishing is still a common and growing event.  Watch this Defense Works sketch on where some common phishing and scam emails you could receive are played out in real life. Maybe after viewing you can better spot phishing scams.

...

Phishing attacks use email or malicious websites to get you to respond to steal your personal information or money and can infect your machine with malware and viruses in order to collect personal and financial information. Cybercriminals attempt to lure users to respond to, click on a link, or open an attachment that infects their computers, creating vulnerability to attacks

Phishing emails may appear to come from a real financial institution, e-commerce site, government agency, or any other service, business, or individual. The email may also request personal information such as account numbers, passwords, or Social Security numbers.
When users respond with the information or click on a link, attackers use it to access users’ accounts.


HOW CRIMINALS LURE YOU IN
The following messages are examples of what attackers may email, use social media, or even text you when phishing;

  • "Are you available? Can you buy me some Gift Cards? I will pay you back"
  • "Need a Virtual Assistant. I will send you a Check now... or for the exchange of Gift Cards"
  • “We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below, and confirm your identity.”
  • “During our regular verification of accounts, we couldn’t verify your information. Please click here to update and verify your information.”
  • “Our records indicate that your account was overcharged. You must call us within 7 days to receive your refund.”

...