• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » data privacy » Avoiding Phishing Emails and Social Engineering

Avoiding Phishing Emails and Social Engineering

2021-07-14 by Michelle Dvorak

Security Blob Phishing

Cybercriminals Use Simple Emails to Steal Your Money

Note: We may earn a commission from products or services when you click on a link and make a purchase.

A Phishing email is a seemingly ordinary email a cybercriminal sends to you with hopes of tricking you into taking action. The phishing email will contain links to harmful websites, malware downloads, or email attachments that can take over your computer. Exceptionally bold attackers will even try to get you to call them so they can talk you out of your money and your passwords.

Most phishing emails try to scare you into taking action quickly without thinking about it or scrutinizing the contents of the email.

Phishing emails can be engineered to look like they were sent from someone you know. Often, they appear to be sent from a business that you’re familiar with. Most people have heard of PayPal, eBay Amazon, Citibank, American Express and thousands of other major companies. They are household names.

Cybercriminals send fraudulent emails that impersonate a company name that everyone recognizes. That way they increase the odds that you’ll open the email and follow the instructions inside.

Instructions usually include clicking on the link or opening an email attachment. Both of these actions can result in your identity and money getting stolen.

Your computer may also be taken over by malware or ransomware. It could be used to attack your friends too.

Hackers use malware to infect your computer and then steal all the banking and credit card logins store it on your computer.  Computers, tablets, or phones could be infected with malware, and you might not even know it.

See our free guide on signs that your computer is infected or if your phone is running slowly.

Another tactic is to infect your computer with ransomware and then demand payment to release control.

That means when a hacker sends out a phishing email, they can use a fake sending email address that may appear to come from PayPal – on closer inspection you’ll see that it doesn’t.

READ Can RAT Malware Infect an iPhone?

What are social engineering attacks?

Social engineering is when an attacker uses information that is publicly available in another online scheme. For example, they might get your email address from your employer’s website or from your LinkedIn profile. Cyber criminals will scrape Facebook for information about your hometown, school, and your friends’ names. They use this information to send phishing emails to tens of thousands of people at once.

This is called social engineering.

Social engineering is commonly used to gather information used in phishing email attacks.

Guard Against Phishing Attacks

The more familiar a phishing email seems to the recipient the more likely they are to follow the instructions in the email.  Taking just a few moments to scrutinize the contents of the email and the actual sender’s email address are some of your best defenses against phishing attacks.

  • Always scrutinize every email you open.
  • Never click on a link in an email that you were not expecting. For example, if you receive an email asking you to reset your password NEVER trust it. Instead, go to the company’s website directly using a web browser and reset your password from there.
  • Never download an email attachment that seems suspicious. you weren’t expecting an email from someone call them and ask if they sent it
  • Use a reliable antivirus app to protect your phones, laptops, and computers from phishing emails and malware attacks.
  • When in doubt take no action!
  • Call the email sender to see if they actually sent the email or ask if there’s a problem

Filed Under: data privacy

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version