{"id":14383,"date":"2017-10-23T20:00:51","date_gmt":"2017-10-24T00:00:51","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=14383"},"modified":"2022-04-28T23:31:20","modified_gmt":"2022-04-29T03:31:20","slug":"5-phishing-clues-to-look-for-in-emails","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/5-phishing-clues-to-look-for-in-emails\/","title":{"rendered":"5 Phishing Clues to Look for in Emails from Your Contacts"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Hackers and online predators have unfortunately become very savvy in recent years. This means that they\u2019ll go to almost any lengths to trick you and obtain your sensitive information. Now, hackers are even making emails and messages appear to be from one of your contacts, then compromising your system when you click on any malicious links. Actively looking for these clues and practicing caution as you open emails \u2014 in conjunction with using the anti-hacking feature on your Android device \u2014 will ensure that you keep your information and accounts private, safe, and totally secure. Click here to protect yourself from phishing attacks<a href=\"http:\/\/www.addtoany.com\/add_to\/facebook?linkurl=http%3A%2F%2Fwww.psafe.com%2Fen%2Fblog%2Ftruth-about-phishing-attacks-infographic-dfndr-lab%2F&amp;linkname=Learn%20the%20Truth%20About%20Phishing%20Attacks%20%E2%80%93%20Infographic&amp;linknote=Infographic\">:<\/a><\/span><\/p>\n<p><center><a href=\"https:\/\/app.appsflyer.com\/com.psafe.msuite?pid=MKT_BLOG_US&amp;c=5_phishing_clues_to_look_for_in_emails_from_your_contacts\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11173 size-full\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/05\/Deeplink_Activate-Anti-Hacking.png\" alt=\"Deeplink_Activate-Anti-Hacking\" width=\"392\" height=\"79\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/05\/Deeplink_Activate-Anti-Hacking.png 392w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/05\/Deeplink_Activate-Anti-Hacking-300x60.png 300w\" sizes=\"auto, (max-width: 392px) 100vw, 392px\" \/><\/a><center><\/center><\/center><b><br \/>\nRead More:\u00a0<\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/rise-of-sophisticated-ransomware\/\"><b>The Rise of Increasingly Sophisticated Ransomware<\/b><\/a><\/p>\n<p><b>The Email Address Doesn\u2019t Match Your Records<br \/>\n<\/b><span style=\"font-weight: 400;\">As mentioned, hackers are savvy. They have the capability to make emails appear as if they\u2019re from someone in your contact list, when really, they are from a different and malicious email account. Always verify that emails containing outbound links are actually from whom they claim to be from. Check the email address in your records. You\u2019d be surprised \u2014 sometimes hackers use email addresses at domains containing dead giveaways like the word \u201cevil.\u201d<\/span><\/p>\n<p><b>It Has a General Salutation<br \/>\n<\/b><span style=\"font-weight: 400;\">Hackers may put in a general salutation that isn\u2019t personalized or isn\u2019t how your friend or family member would actually greet you. It may say \u201cHi!\u201d or something else devoid of a specific name.<\/span><\/p>\n<p><b>The URL Doesn\u2019t Go Where it Claims to Go.<br \/>\n<\/b><span style=\"font-weight: 400;\">Hackers know how to make URLs (that are embedded into emails) look like they\u2019re going to direct you somewhere that they aren\u2019t. Before clicking on a link, hover over it to verify that it is going to direct you to a trusted site or at least to where it claims it will send you.<\/span><\/p>\n<p><b>The Email Urges Immediate Action.<br \/>\n<\/b><span style=\"font-weight: 400;\">Phishing emails often attempt to trick you into clicking on a link and divulging sensitive information that you wouldn\u2019t want to be compromised. If your \u201ccontact\u201d sends an email that seems to be pushing you towards clicking a link, filling out a form, or completing a request, be cautious.<\/span><\/p>\n<p><b>The Email Contains Attachments<br \/>\n<\/b><span style=\"font-weight: 400;\">You should always be cautious when opening attachments in emails, even if they appear to come from a trusted source. Look at the attachment name, verify the email address from your records, and even follow up directly with your contact to confirm they\u2019ve sent an attachment before opening it if you find it to be questionable. It\u2019s always better to be safe than sorry!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Don&#8217;t fall for even the savviest of phishing scams. Make sure to look for these clues in every email you receive, even if from a trusted contact.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[4495,195,149,4457,349,545,249,67,223],"class_list":["post-14383","post","type-post","status-publish","format-standard","hentry","category-security","tag-android-protection","tag-app5","tag-phishing","tag-phishing-attacks","tag-phone","tag-safety","tag-security","tag-smartphone","tag-tips"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/14383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=14383"}],"version-history":[{"count":2,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/14383\/revisions"}],"predecessor-version":[{"id":18890,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/14383\/revisions\/18890"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=14383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=14383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=14383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}