Differences
This shows you the differences between two versions of the page.
| Next revision | Previous revision | ||
| engineering:computer_science:security:identify_protect_email_scam_phishing [2024/08/26 23:10] – created carlossousa | engineering:computer_science:security:identify_protect_email_scam_phishing [2024/08/26 23:11] (current) – carlossousa | ||
|---|---|---|---|
| Line 5: | Line 5: | ||
| **Last Reviewed:** 26/08/2024 | **Last Reviewed:** 26/08/2024 | ||
| - | * | + | ---- |
| **Verify the ' | **Verify the ' | ||
| - | | + | |
| - | * Look for common tricks such as similar-looking domains (e.g., " | + | * Always check the email address of the sender to ensure it matches exactly with the official domain of the organization it claims to be from. |
| - | * | + | * Look for common tricks such as similar-looking domains (e.g., " |
| **Inspect the ' | **Inspect the ' | ||
| - | * Check if the ' | ||
| - | * | ||
| - | **Check ' | + | * Check if the ' |
| - | * In Gmail, examine the ' | + | |
| - | * A mismatch can indicate a potential spoofing attempt. | + | **Check ' |
| - | * | + | |
| + | | ||
| + | * A mismatch can indicate a potential spoofing attempt. | ||
| + | |||
| + | **Look for ' | ||
| + | |||
| + | | ||
| + | |||
| + | **Use Email Authentication Records (SPF, DKIM, DMARC):** | ||
| + | |||
| + | * **SPF (Sender Policy Framework): | ||
| + | * **DKIM (DomainKeys Identified Mail): | ||
| + | * **DMARC (Domain-based Message Authentication, | ||
| + | **Examine the Domain Closely: | ||
| + | |||
| + | * Be wary of domains with subtle differences, | ||
| + | |||
| + | **Check for Unicode and ASCII Characters: | ||
| + | |||
| + | * Use tools like a ' | ||
| + | |||
| + | **Inspect the Full Email Headers: | ||
| + | |||
| + | * In Gmail or other email programs, you can view the full headers to see the path the email took and verify the SPF, DKIM, and DMARC results manually. | ||
| + | |||
| + | **Be Wary of Unexpected Attachments or Links:** | ||
| + | |||
| + | * Phishing emails often contain links or attachments that lead to malware or fake login pages. Avoid clicking on these unless you are certain of the email’s legitimacy. | ||
| + | |||
| + | **Critical Thinking and Awareness: | ||
| + | |||
| + | * Always scrutinize emails, especially unexpected ones, that ask for sensitive information or urge immediate action. Phishing attempts often create a sense of urgency. | ||
| + | |||
| + | **Use Spam Filters and Anti-Phishing Tools:** | ||
| + | |||
| + | * Employ robust spam filters and anti-phishing tools in your email client. These can automatically detect and block many phishing attempts before they reach your inbox. | ||
| + | |||
| + | **Check for Grammatical Errors and Unusual Language:** | ||
| - | **Look for ' | + | |
| - | * If Gmail shows a ' | + | |
| - | * | + | |
| - | **Use Email Authentication Records (SPF, DKIM, DMARC):** | + | **Hover Over Links to Verify URLs:** |
| - | * **SPF (Sender Policy Framework): | + | |
| - | * **DKIM (DomainKeys Identified Mail):** Ensures the email content has not been altered and confirms the sender’s identity via an encrypted signature. | + | |
| - | * **DMARC (Domain-based Message Authentication, | + | |
| - | | + | |
| - | **Examine the Domain Closely: | + | |
| - | * Be wary of domains with subtle differences, such as using foreign characters or combining letters | + | |
| - | * | + | |
| - | **Check for Unicode and ASCII Characters:** | + | **Verify Requests Through Official Channels:** |
| - | * Use tools like a ' | + | |
| - | | + | |
| - | **Inspect the Full Email Headers: | + | |
| - | * In Gmail or other email programs, you can view the full headers to see the path the email took and verify the SPF, DKIM, and DMARC results manually. | + | |
| - | * | + | |
| - | **Be Wary of Unexpected Attachments or Links:** | + | **Monitor Financial Statements and Accounts:** |
| - | * Phishing emails often contain links or attachments that lead to malware or fake login pages. Avoid clicking on these unless you are certain of the email’s legitimacy. | + | |
| - | | + | |
| - | **Critical Thinking | + | |
| - | * Always scrutinize emails, especially unexpected ones, that ask for sensitive information or urge immediate action. Phishing attempts often create a sense of urgency. | + | |
| - | * | + | |
| - | **Use Spam Filters and Anti-Phishing Tools:** | + | **Enable Two-Factor Authentication (2FA):** |
| - | * Employ robust spam filters and anti-phishing tools in your email client. These can automatically detect and block many phishing attempts before they reach your inbox. | + | |
| - | | + | |
| - | **Check for Grammatical Errors and Unusual Language: | + | |
| - | * Many phishing emails contain poor grammar, unusual language, or awkward phrasing, which can be a red flag. | + | |
| - | * | + | |
| - | **Hover Over Links to Verify URLs:** | + | **Update Software Regularly:** |
| - | * Before clicking any link, hover your mouse over it to see the actual URL. Ensure it matches the legitimate site and doesn’t redirect to a suspicious domain. | + | |
| - | | + | |
| - | **Verify Requests Through Official Channels: | + | |
| - | * If you receive an email asking for personal information or claiming there’s an issue with your account, contact the organization directly using their official website or phone number. | + | |
| - | * | + | |
| - | **Monitor Financial Statements | + | **Educate Yourself |
| - | * Regularly check your bank and credit card statements for any unauthorized transactions. Early detection of fraud can limit damage. | + | |
| - | | + | |
| - | **Enable Two-Factor Authentication (2FA):** | + | |
| - | * Enable 2FA on all accounts that support it. This adds an additional layer of security, requiring a second verification step beyond just your password. | + | |
| - | * | + | |
| - | **Update Software Regularly:** | + | **Report Phishing Attempts:** |
| - | * Keep your operating system, browser, and antivirus software updated to protect against vulnerabilities that phishing attacks may exploit. | + | |
| - | | + | |
| - | **Educate Yourself and Others:** | + | |
| - | * Stay informed about the latest | + | |
| - | * | + | |
| - | **Report Phishing Attempts:** | + | **Use Email Sandboxing or Virtual Machines for Suspicious Attachments:** |
| - | * If you receive a phishing email, report it to your email provider or the company being impersonated. Many companies have dedicated email addresses or forms for reporting phishing. | + | |
| - | | + | |
| - | **Use Email Sandboxing or Virtual Machines for Suspicious Attachments: | + | |
| - | | + | |