Phishing Mails
Phishing attacks are frequently carried out using emails. The attackers frequently send emails impersonating a person or a reputable company to persuade their target to divulge vital information. They may instruct a target to share credentials with them while imitating a trusted party.
Think before you click: When you get a message, whether it is from a colleague or a legitimate company, don’t be in a hurry to answer or disclose the information requested. It is best to be certain that:
- The sender’s email address corresponds to the trusted parties.
- A cursory inspection of the contents of the mail to check that there is nothing strange or suspicious about it.
- Check the mail for any unusual typos or grammatical problems.
- There is no link in the email that redirects you to share or reset your account credentials if you have not requested one.
Malicious Attachments
Some phishing emails include instructions for downloading a file that has been attached to the message. In most situations, these attachments contain malicious content that may infect the target machine. Windows executables, office documents, compressed archives, pdf files, and other types of executables are some of the most typical harmful files attached to these emails.
Think before you click: when you receive an email with an attachment, whether it is from a colleague or a respectable business, don’t be tempted to download or open it right away. It is best to be certain that:
- The email comes from a known source
- The sender’s email address is the same as the trusted parties.
- It is not an unexpected request, even if the sender’s email address appears to be legitimate.
- The filename is not a random string of characters or a strange name that has nothing to do with what you would expect.
If you truly requested an attachment, the file extension should match what you expect to receive. If you asked for a picture, anticipate file extensions like jpeg, jpg, or png rather than exe.
Regardless of how urgent the message appears to be, double-check the content of the message, and confirm with the sender whether he/she sent the email.
Online Forms
These have become ideal choices for phishing attacks to take place. After being persuaded to visit phishing sites, victims are made to complete a series of forms to advance. For nefarious purposes, several types of user data are collected and kept.
Think before you click: when you get a link that asks you to give some personal information or user credentials, do not be rushed into sharing or disclosing that information via the form. It’s best to be certain that:
- The form’s website is authentic.
- The information required is relevant; for example, why would an online news outlet request your credit card information in addition to your email address for their mailing list?
- The form is secure, which means it is https form rather than http
- Nothing on the page is suspicious