Categories: Security

5 Phishing Clues to Look for in Emails from Your Contacts

Hackers and online predators have unfortunately become very savvy in recent years. This means that they’ll go to almost any lengths to trick you and obtain your sensitive information. Now, hackers are even making emails and messages appear to be from one of your contacts, then compromising your system when you click on any malicious links. Actively looking for these clues and practicing caution as you open emails — in conjunction with using the anti-hacking feature on your Android device — will ensure that you keep your information and accounts private, safe, and totally secure. Click here to protect yourself from phishing attacks:


Read More:
The Rise of Increasingly Sophisticated Ransomware

The Email Address Doesn’t Match Your Records
As mentioned, hackers are savvy. They have the capability to make emails appear as if they’re from someone in your contact list, when really, they are from a different and malicious email account. Always verify that emails containing outbound links are actually from whom they claim to be from. Check the email address in your records. You’d be surprised — sometimes hackers use email addresses at domains containing dead giveaways like the word “evil.”

It Has a General Salutation
Hackers may put in a general salutation that isn’t personalized or isn’t how your friend or family member would actually greet you. It may say “Hi!” or something else devoid of a specific name.

The URL Doesn’t Go Where it Claims to Go.
Hackers know how to make URLs (that are embedded into emails) look like they’re going to direct you somewhere that they aren’t. Before clicking on a link, hover over it to verify that it is going to direct you to a trusted site or at least to where it claims it will send you.

The Email Urges Immediate Action.
Phishing emails often attempt to trick you into clicking on a link and divulging sensitive information that you wouldn’t want to be compromised. If your “contact” sends an email that seems to be pushing you towards clicking a link, filling out a form, or completing a request, be cautious.

The Email Contains Attachments
You should always be cautious when opening attachments in emails, even if they appear to come from a trusted source. Look at the attachment name, verify the email address from your records, and even follow up directly with your contact to confirm they’ve sent an attachment before opening it if you find it to be questionable. It’s always better to be safe than sorry!

PSafe Newsroom

The dfndr blog is an informative channel that presents exclusive content on security and privacy in the mobile and business world, with tips to keep users protected. Populated by a select group of expert reporters, the channel has a partnership with dfndr lab's security team. Together they bring you, first-notice news about attacks, scams, internet vulnerabilities, malware and everything affecting cybersecurity.

Recent Posts

Vulnerabilities in Cyber Security: what they are and how to fix them?

Learn all about one of the hackers' favorite breach method and keep your company safe…

1 year ago

3 ways to recover deleted photos on Android

Have you ever wondered how to recover deleted photos on Android? After all, the lack…

1 year ago

What is worm?

Digital worms are among the most serious threats in the wild kingdom of the Internet.

2 years ago

Spoofing: What’s it all about?

Spoofing is a fairly sophisticated virtual scam that can fool even the most cautious and…

2 years ago

Careful With That QR Code! Five Steps For QR Code Safety

Five Steps to Reduce QR Code Risk! Step one? Read this article…

2 years ago

Pharming: Phishing’s Nasty Big Brother

Pharming is creating a new, dangerous brand of impostor syndrome. Check how to avoid pharming…

2 years ago