MCCC Knowledge Base

Phishing

2016

Phishing

  Cyber criminals often attempt to acquire valuable information like usernames, passwords, credit cards, social security numbers, etc. You may hear the terms Phishing or Social Engineering when referring to the miscreants who will pretend to be someone we trust and use psychological tricks like fear, uncertainty and doubt to entice us to take action like providing information, clicking links or installing software. Emails and phone calls are popular methods of contact.

What does a phishing email message look like?

Here is an example of what a phishing scam in an email message might look like. 

  • Web site Security — Verify that website you login is taking security measures to help protect you. The address bar will have https:// then the address and will look like this:   
  • Spelling and bad grammar -  Cybercriminals are not known for their grammar and spelling. Professional companies or organizations usually have a staff of copy editors that will not allow a mass email like this to go out to its users. If you notice mistakes in an email, it might be a scam.
  • Beware of links in email - If you see a link in a suspicious email message, don’t click on it. Rest your mouse (but don’t click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company’s web address.

Links might also lead you to .exe files. These kinds of file are known to spread malicious software.

  • Threats - Have you ever received a threat that your account would be closed if you didn’t respond to an email message? The email message shown above is an example of the same trick. Cybercriminals often use threats that your security has been compromised. For more information, see Watch out for fake alerts.
5 (1)
Article Rating (1 Votes)
Rate this article
Attached Files
There are no attachments for this article.
Comments (1)
Comment by Sharon on Fri, Oct 31st, 2014 at 4:57 PM
The article was most infomitive. I scored 100% on the quiz no need to say more.
Name
Email
Related Articles RSS Feed
Adding Trusted Sites (Windows 10)
Viewed 102381 times since Mon, Nov 21, 2016
Sending an encrypted email to an external email address
Viewed 16460 times since Thu, Mar 12, 2015
Enabling Automatic Updates
Viewed 5337 times since Mon, Jul 18, 2016
Unblock a File (Windows 10)
Viewed 6990 times since Mon, Nov 21, 2016
Protecting Sensitive Data
Viewed 7514 times since Mon, Mar 2, 2015
Allow sites to run Flash
Viewed 4631 times since Tue, Oct 10, 2017
Identity Finder - Scanning Removable Media
Viewed 6523 times since Fri, Mar 6, 2015
What is a Reputable Firewall?
Viewed 5168 times since Mon, Jul 18, 2016
Remote Access Two-Factor Authentication Duo Security
Viewed 7289 times since Mon, Nov 24, 2014
Software Updates on College Owned Windows Computers
Viewed 5594 times since Wed, Jul 8, 2015

Need Help?