MCCC Knowledge Base




  Cyber criminals often attempt to acquire valuable information like usernames, passwords, credit cards, social security numbers, etc. You may hear the terms Phishing or Social Engineering when referring to the miscreants who will pretend to be someone we trust and use psychological tricks like fear, uncertainty and doubt to entice us to take action like providing information, clicking links or installing software. Emails and phone calls are popular methods of contact.

What does a phishing email message look like?

Here is an example of what a phishing scam in an email message might look like. 

  • Web site Security — Verify that website you login is taking security measures to help protect you. The address bar will have https:// then the address and will look like this:   
  • Spelling and bad grammar -  Cybercriminals are not known for their grammar and spelling. Professional companies or organizations usually have a staff of copy editors that will not allow a mass email like this to go out to its users. If you notice mistakes in an email, it might be a scam.
  • Beware of links in email - If you see a link in a suspicious email message, don’t click on it. Rest your mouse (but don’t click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company’s web address.

Links might also lead you to .exe files. These kinds of file are known to spread malicious software.

  • Threats - Have you ever received a threat that your account would be closed if you didn’t respond to an email message? The email message shown above is an example of the same trick. Cybercriminals often use threats that your security has been compromised. For more information, see Watch out for fake alerts.
5 (1)
Article Rating (1 Votes)
Rate this article
Attached Files
There are no attachments for this article.
Comments (1)
Comment by Sharon on Fri, Oct 31st, 2014 at 4:57 PM
The article was most infomitive. I scored 100% on the quiz no need to say more.
Related Articles RSS Feed
InCommon Federation Participant Operational Practices (POP)
Viewed 6777 times since Fri, Feb 26, 2016
Protecting Sensitive Data
Viewed 8368 times since Mon, Mar 2, 2015
What is a reputable and updated operating system?
Viewed 6080 times since Mon, Jul 18, 2016
Multi-Factor Authentication for Enhanced Security
Viewed 5493 times since Tue, Jan 15, 2019
Infographic: Multi-Factor Authentication for Secure Document Viewing
Viewed 4901 times since Wed, Jan 30, 2019
Remote Access Two-Factor Authentication Duo Security
Viewed 8068 times since Mon, Nov 24, 2014
Setting up iPhone/iPad for Auto Screen Lock
Viewed 6018 times since Wed, Oct 15, 2014
LastPass - Password Manager - Mac
Viewed 7707 times since Fri, Jan 8, 2016
Faculty and Staff - Best Practices for Hosting Secure Virtual Sessions/Meetings
Viewed 4246 times since Thu, Apr 9, 2020
Unblock a File (Windows 10)
Viewed 8129 times since Mon, Nov 21, 2016

Need Help?