Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
engineering:computer_science:security:identify_protect_email_scam_phishing [2024/08/26 23:10] – created carlossousa | engineering:computer_science:security:identify_protect_email_scam_phishing [2024/08/26 23:11] (current) – carlossousa | ||
---|---|---|---|
Line 5: | Line 5: | ||
**Last Reviewed:** 26/08/2024 | **Last Reviewed:** 26/08/2024 | ||
- | * | + | ---- |
**Verify the ' | **Verify the ' | ||
- | | + | |
- | * Look for common tricks such as similar-looking domains (e.g., " | + | * Always check the email address of the sender to ensure it matches exactly with the official domain of the organization it claims to be from. |
- | * | + | * Look for common tricks such as similar-looking domains (e.g., " |
**Inspect the ' | **Inspect the ' | ||
- | * Check if the ' | ||
- | * | ||
- | **Check ' | + | * Check if the ' |
- | * In Gmail, examine the ' | + | |
- | * A mismatch can indicate a potential spoofing attempt. | + | **Check ' |
- | * | + | |
+ | | ||
+ | * A mismatch can indicate a potential spoofing attempt. | ||
+ | |||
+ | **Look for ' | ||
+ | |||
+ | | ||
+ | |||
+ | **Use Email Authentication Records (SPF, DKIM, DMARC):** | ||
+ | |||
+ | * **SPF (Sender Policy Framework): | ||
+ | * **DKIM (DomainKeys Identified Mail): | ||
+ | * **DMARC (Domain-based Message Authentication, | ||
+ | **Examine the Domain Closely: | ||
+ | |||
+ | * Be wary of domains with subtle differences, | ||
+ | |||
+ | **Check for Unicode and ASCII Characters: | ||
+ | |||
+ | * Use tools like a ' | ||
+ | |||
+ | **Inspect the Full Email Headers: | ||
+ | |||
+ | * In Gmail or other email programs, you can view the full headers to see the path the email took and verify the SPF, DKIM, and DMARC results manually. | ||
+ | |||
+ | **Be Wary of Unexpected Attachments or Links:** | ||
+ | |||
+ | * Phishing emails often contain links or attachments that lead to malware or fake login pages. Avoid clicking on these unless you are certain of the email’s legitimacy. | ||
+ | |||
+ | **Critical Thinking and Awareness: | ||
+ | |||
+ | * Always scrutinize emails, especially unexpected ones, that ask for sensitive information or urge immediate action. Phishing attempts often create a sense of urgency. | ||
+ | |||
+ | **Use Spam Filters and Anti-Phishing Tools:** | ||
+ | |||
+ | * Employ robust spam filters and anti-phishing tools in your email client. These can automatically detect and block many phishing attempts before they reach your inbox. | ||
+ | |||
+ | **Check for Grammatical Errors and Unusual Language:** | ||
- | **Look for ' | + | |
- | * If Gmail shows a ' | + | |
- | * | + | |
- | **Use Email Authentication Records (SPF, DKIM, DMARC):** | + | **Hover Over Links to Verify URLs:** |
- | * **SPF (Sender Policy Framework): | + | |
- | * **DKIM (DomainKeys Identified Mail):** Ensures the email content has not been altered and confirms the sender’s identity via an encrypted signature. | + | |
- | * **DMARC (Domain-based Message Authentication, | + | |
- | | + | |
- | **Examine the Domain Closely: | + | |
- | * Be wary of domains with subtle differences, such as using foreign characters or combining letters | + | |
- | * | + | |
- | **Check for Unicode and ASCII Characters:** | + | **Verify Requests Through Official Channels:** |
- | * Use tools like a ' | + | |
- | | + | |
- | **Inspect the Full Email Headers: | + | |
- | * In Gmail or other email programs, you can view the full headers to see the path the email took and verify the SPF, DKIM, and DMARC results manually. | + | |
- | * | + | |
- | **Be Wary of Unexpected Attachments or Links:** | + | **Monitor Financial Statements and Accounts:** |
- | * Phishing emails often contain links or attachments that lead to malware or fake login pages. Avoid clicking on these unless you are certain of the email’s legitimacy. | + | |
- | | + | |
- | **Critical Thinking | + | |
- | * Always scrutinize emails, especially unexpected ones, that ask for sensitive information or urge immediate action. Phishing attempts often create a sense of urgency. | + | |
- | * | + | |
- | **Use Spam Filters and Anti-Phishing Tools:** | + | **Enable Two-Factor Authentication (2FA):** |
- | * Employ robust spam filters and anti-phishing tools in your email client. These can automatically detect and block many phishing attempts before they reach your inbox. | + | |
- | | + | |
- | **Check for Grammatical Errors and Unusual Language: | + | |
- | * Many phishing emails contain poor grammar, unusual language, or awkward phrasing, which can be a red flag. | + | |
- | * | + | |
- | **Hover Over Links to Verify URLs:** | + | **Update Software Regularly:** |
- | * Before clicking any link, hover your mouse over it to see the actual URL. Ensure it matches the legitimate site and doesn’t redirect to a suspicious domain. | + | |
- | | + | |
- | **Verify Requests Through Official Channels: | + | |
- | * If you receive an email asking for personal information or claiming there’s an issue with your account, contact the organization directly using their official website or phone number. | + | |
- | * | + | |
- | **Monitor Financial Statements | + | **Educate Yourself |
- | * Regularly check your bank and credit card statements for any unauthorized transactions. Early detection of fraud can limit damage. | + | |
- | | + | |
- | **Enable Two-Factor Authentication (2FA):** | + | |
- | * Enable 2FA on all accounts that support it. This adds an additional layer of security, requiring a second verification step beyond just your password. | + | |
- | * | + | |
- | **Update Software Regularly:** | + | **Report Phishing Attempts:** |
- | * Keep your operating system, browser, and antivirus software updated to protect against vulnerabilities that phishing attacks may exploit. | + | |
- | | + | |
- | **Educate Yourself and Others:** | + | |
- | * Stay informed about the latest | + | |
- | * | + | |
- | **Report Phishing Attempts:** | + | **Use Email Sandboxing or Virtual Machines for Suspicious Attachments:** |
- | * If you receive a phishing email, report it to your email provider or the company being impersonated. Many companies have dedicated email addresses or forms for reporting phishing. | + | |
- | | + | |
- | **Use Email Sandboxing or Virtual Machines for Suspicious Attachments: | + | |
- | | + | |