MCCC Knowledge Base

Phishing

2016

Phishing

  Cyber criminals often attempt to acquire valuable information like usernames, passwords, credit cards, social security numbers, etc. You may hear the terms Phishing or Social Engineering when referring to the miscreants who will pretend to be someone we trust and use psychological tricks like fear, uncertainty and doubt to entice us to take action like providing information, clicking links or installing software. Emails and phone calls are popular methods of contact.

What does a phishing email message look like?

Here is an example of what a phishing scam in an email message might look like. 

  • Web site Security — Verify that website you login is taking security measures to help protect you. The address bar will have https:// then the address and will look like this:   
  • Spelling and bad grammar -  Cybercriminals are not known for their grammar and spelling. Professional companies or organizations usually have a staff of copy editors that will not allow a mass email like this to go out to its users. If you notice mistakes in an email, it might be a scam.
  • Beware of links in email - If you see a link in a suspicious email message, don’t click on it. Rest your mouse (but don’t click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company’s web address.

Links might also lead you to .exe files. These kinds of file are known to spread malicious software.

  • Threats - Have you ever received a threat that your account would be closed if you didn’t respond to an email message? The email message shown above is an example of the same trick. Cybercriminals often use threats that your security has been compromised. For more information, see Watch out for fake alerts.
5 (1)
Article Rating (1 Votes)
Rate this article
Attached Files
There are no attachments for this article.
Comments (1)
Comment by Sharon on Fri, Oct 31st, 2014 at 4:57 PM
The article was most infomitive. I scored 100% on the quiz no need to say more.
Name
Email
Related Articles RSS Feed
What is a Reputable Firewall?
Viewed 5562 times since Mon, Jul 18, 2016
Enabling Automatic Updates
Viewed 5801 times since Mon, Jul 18, 2016
Remote Access Two-Factor Authentication Duo Security
Viewed 7748 times since Mon, Nov 24, 2014
LastPass - Password Manager - Mac
Viewed 7334 times since Fri, Jan 8, 2016
Setting up iPhone/iPad for Auto Screen Lock
Viewed 5815 times since Wed, Oct 15, 2014
Allow sites to run Flash
Viewed 5168 times since Tue, Oct 10, 2017
College Data and Storage System Quick Reference
Viewed 5815 times since Wed, Jan 6, 2016
Adding Trusted Sites (Windows 10)
Viewed 120923 times since Mon, Nov 21, 2016
Faculty and Staff - Best Practices for Hosting Secure Virtual Sessions/Meetings
Viewed 2407 times since Thu, Apr 9, 2020
Protecting Sensitive Data
Viewed 8035 times since Mon, Mar 2, 2015

Need Help?