MCCC Knowledge Base

Phishing

2016

Phishing

  Cyber criminals often attempt to acquire valuable information like usernames, passwords, credit cards, social security numbers, etc. You may hear the terms Phishing or Social Engineering when referring to the miscreants who will pretend to be someone we trust and use psychological tricks like fear, uncertainty and doubt to entice us to take action like providing information, clicking links or installing software. Emails and phone calls are popular methods of contact.

What does a phishing email message look like?

Here is an example of what a phishing scam in an email message might look like. 

  • Web site Security — Verify that website you login is taking security measures to help protect you. The address bar will have https:// then the address and will look like this:   
  • Spelling and bad grammar -  Cybercriminals are not known for their grammar and spelling. Professional companies or organizations usually have a staff of copy editors that will not allow a mass email like this to go out to its users. If you notice mistakes in an email, it might be a scam.
  • Beware of links in email - If you see a link in a suspicious email message, don’t click on it. Rest your mouse (but don’t click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company’s web address.

Links might also lead you to .exe files. These kinds of file are known to spread malicious software.

  • Threats - Have you ever received a threat that your account would be closed if you didn’t respond to an email message? The email message shown above is an example of the same trick. Cybercriminals often use threats that your security has been compromised. For more information, see Watch out for fake alerts.
5 (1)
Article Rating (1 Votes)
Rate this article
Attached Files
There are no attachments for this article.
Comments (1)
Comment by Sharon on Fri, Oct 31st, 2014 at 4:57 PM
The article was most infomitive. I scored 100% on the quiz no need to say more.
Name
Email
Related Articles RSS Feed
Protecting Sensitive Data
Viewed 3757 times since Mon, Mar 2, 2015
Adding Trusted Sites (Windows 10)
Viewed 29601 times since Mon, Nov 21, 2016
Secured Print
Viewed 5080 times since Thu, Mar 12, 2015
Enabling Automatic Updates
Viewed 2505 times since Mon, Jul 18, 2016
Creating a Rule for Secure File Transfer (SFT) Notifications
Viewed 1243 times since Wed, May 24, 2017
GlobalProtect VPN: Overview, Setup, and Troubleshooting
Viewed 727 times since Wed, Nov 22, 2017
College Data and Storage System Quick Reference
Viewed 2356 times since Wed, Jan 6, 2016
Sending an encrypted email to an external email address
Viewed 7094 times since Thu, Mar 12, 2015
Software Updates on College Owned Windows Computers
Viewed 2124 times since Wed, Jul 8, 2015
How to Change or Update your Password - Complete Guide
Viewed 16435 times since Tue, May 24, 2016

Need Help?