{"id":973,"date":"2018-02-14T09:00:59","date_gmt":"2018-02-14T05:00:59","guid":{"rendered":"https:\/\/virtualteamit.com\/en\/?p=973"},"modified":"2022-03-21T09:03:18","modified_gmt":"2022-03-21T05:03:18","slug":"spotphishing","status":"publish","type":"post","link":"https:\/\/www.virtualteamit.com\/en\/2018\/02\/spotphishing\/","title":{"rendered":"LEARN HOW TO SPOT ONLINE SCAM\/SPAM"},"content":{"rendered":"\n<p><strong>What is Phishing?<\/strong><br>Phishing attacks are email messages try to use social engineering and information gathering, so hackers use deception to manipulate you into providing confidential or personal information, and then use that information for fraudulent purposes. Phishing attacks usually come as email. Hackers pose as trustworthy people and organizations to trick you into giving them sensitive data like your username, password, social security number, or credit card information. And sometimes they can get these details by asking you to click a link to renew your account or download an invoice, but it will gather your information as soon as you click the link.<\/p>\n\n\n\n<p><strong>How can I tell if an email is a phishing attempt?<\/strong><br>When you get an email that seems suspicious, follow these tips to avoid becoming a victim of phishing.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>1. <\/strong>Look at the URL of any link included in an email. Phishing emails typically include a link. Scammers want you to click this link to gain access to your computer or access to your sensitive data. Beware! Hover over any link to see where it is taking you before you click. If you do not recognize the URL, do not click the link.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"466\" height=\"176\" src=\"https:\/\/virtualteamit.com\/en\/wp-content\/uploads\/email-phishing-hover.gif\" alt=\"\" class=\"wp-image-975\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>\u200b2. <\/strong>Watch for poor spelling and grammar. Scammers have become very sophisticated. Many now use specialized translation tools; improper grammar and spelling are no longer a giveaway. Remember that official SIU emails are always spell-checked, and should be error-free.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"456\" height=\"314\" src=\"https:\/\/virtualteamit.com\/en\/wp-content\/uploads\/paypal-fake-phishing-2015.jpg\" alt=\"\" class=\"wp-image-976\" srcset=\"https:\/\/www.virtualteamit.com\/en\/wp-content\/uploads\/paypal-fake-phishing-2015.jpg 456w, https:\/\/www.virtualteamit.com\/en\/wp-content\/uploads\/paypal-fake-phishing-2015-300x207.jpg 300w, https:\/\/www.virtualteamit.com\/en\/wp-content\/uploads\/paypal-fake-phishing-2015-380x262.jpg 380w\" sizes=\"(max-width: 456px) 100vw, 456px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>3.<\/strong> Beware of urgent or threatening language. Do not trust emails that say \u201cyour account has been suspended\u201d or \u201cverify your information.\u201d Scammers use language like this to get your attention. You should also be aware of requests for financial aid documents, job offers, and email account information.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"630\" height=\"356\" src=\"https:\/\/virtualteamit.com\/en\/wp-content\/uploads\/phishinglarge.jpg\" alt=\"\" class=\"wp-image-977\" srcset=\"https:\/\/www.virtualteamit.com\/en\/wp-content\/uploads\/phishinglarge.jpg 630w, https:\/\/www.virtualteamit.com\/en\/wp-content\/uploads\/phishinglarge-300x170.jpg 300w, https:\/\/www.virtualteamit.com\/en\/wp-content\/uploads\/phishinglarge-575x325.jpg 575w, https:\/\/www.virtualteamit.com\/en\/wp-content\/uploads\/phishinglarge-380x215.jpg 380w\" sizes=\"(max-width: 630px) 100vw, 630px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>4.<\/strong> Be suspicious! sometimes a hacker will use a name of a person you know to cover their sender email address, think about it, if it seems suspicious, always call the sender to confirm.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n\n\n\n<p>Phishing can happen anywhere, to anybody. When in doubt, don\u2019t click any links in the scam email, and report it by calling or forwarding the message to someone who can help.<\/p>\n\n\n\n<p>To check you phishing IQ, visit the links below:<br><a href=\"https:\/\/www.sonicwall.com\/en-us\/phishing-iq-test\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.sonicwall.com\/en-us\/phishing-iq-test<\/a><br><a href=\"https:\/\/www.phishingbox.com\/phishing-test\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.phishingbox.com\/phishing-test<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Phishing?Phishing attacks are email messages try to use social engineering and information gathering, so hackers use deception to manipulate you into providing confidential or personal information, and then use that information for fraudulent purposes. Phishing attacks usually come as email. Hackers pose as trustworthy people and organizations to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-973","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.virtualteamit.com\/en\/wp-json\/wp\/v2\/posts\/973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtualteamit.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtualteamit.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtualteamit.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtualteamit.com\/en\/wp-json\/wp\/v2\/comments?post=973"}],"version-history":[{"count":2,"href":"https:\/\/www.virtualteamit.com\/en\/wp-json\/wp\/v2\/posts\/973\/revisions"}],"predecessor-version":[{"id":978,"href":"https:\/\/www.virtualteamit.com\/en\/wp-json\/wp\/v2\/posts\/973\/revisions\/978"}],"wp:attachment":[{"href":"https:\/\/www.virtualteamit.com\/en\/wp-json\/wp\/v2\/media?parent=973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtualteamit.com\/en\/wp-json\/wp\/v2\/categories?post=973"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtualteamit.com\/en\/wp-json\/wp\/v2\/tags?post=973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}