{"id":2958,"date":"2016-08-16T09:43:35","date_gmt":"2016-08-16T14:43:35","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=2958"},"modified":"2016-08-16T09:43:35","modified_gmt":"2016-08-16T14:43:35","slug":"exercise-caution-opening-emails","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/exercise-caution-opening-emails\/","title":{"rendered":"Why You Should Exercise Caution When Opening Emails"},"content":{"rendered":"<p>In some cases, you can pick up a virus simply by opening a malicious email. So, it\u2019s best to recognize hackers before this ever happens. There are methods you can use to distinguish scam emails from others.<\/p>\n<p>If an email tries to sell or gift you something and it seems too good to be true, then it probably is too good to be true. For instance, if you are offered a cruise in the Bahamas for $20 and you need to enter your credit card information, that is an obvious red flag. However, phishers and fraudsters have also found ways to seem convincingly legitimate. Take these steps below before opening an unrecognized email.<\/p>\n<p><strong><a href=\"https:\/\/www.psafe.com\/en\/blog\/maintain-security-android-phone\/\" target=\"_blank\">Read More: How to Maintain Security on Your Android Phone<\/a><\/strong><\/p>\n<p><b>Check for a salutation, as phishers will often times address you as \u201cvalued customer.\u201d<\/b><\/p>\n<p><span style=\"font-weight: 400;\">This is an impersonal salutation. Any legitimate business will use your name in the introduction. While this certainly isn\u2019t a litmus test for fraudulent emails, it is a good place to start.<\/span><\/p>\n<p><b>Be cautious if you see an email that asks for personal information.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Whether it\u2019s a bank or a firm, businesses almost never ask for personal information over your email. Exercise caution when you see an email that mentions handing over credit card or banking information. <\/span><\/p>\n<p><b>Look for urgent or threatening subject lines<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Examples include \u201cClick here NOW for a sweet deal,\u201d \u201cYour account will be terminated,\u201d or \u201cYou will be arrested if\u2026\u201d If there seems to be a sense of urgency within the subject line, exercise caution in opening it.<\/span><\/p>\n<p><b>Look out for clickbait\u2026don\u2019t bite!<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Phishers always think of clever subject lines to try and get you to open the email. If the subject line seems like an incredibly good lead to an interesting story, then it is likely a scam. You see these all the time on social media. Examples include \u201cA man was walking down the beach. You won\u2019t believe what happened to him next!\u201d Clicking on clickbait oftentimes results in malware and hacked accounts.<\/span><\/p>\n<p><b>Keep an eye out for spelling mistakes<\/b><\/p>\n<p><span style=\"font-weight: 400;\">While fraudsters are computer savvy, computer users oftentimes find that their grammar doesn\u2019t live up to their technological knowledge. Poor grammar and typos are a red flag for malicious emails. <\/span><\/p>\n<p><b>Don\u2019t click on any attachments<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Finally, if you do end up opening a malicious email, be sure not to open any attachments. Many are plagued with malware that can badly infect your device. Assess the legitimacy of the sender prior to opening any of these attachments.<\/span><\/p>\n<p><strong>Worried about hackers accessing your computer or phone?<\/strong><\/p>\n<p>Head to <strong><a href=\"http:\/\/psafe.com\/\">PSafe.com<\/a><\/strong> and check out how to keep your devices safe and malware free!<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Even with the help of your junk folder, it can be hard to recognize malicious emails. Find out how to protect yourself from fraudsters.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[162,2075,259,545,249,161],"class_list":["post-2958","post","type-post","status-publish","format-standard","hentry","category-security","tag-antivirus","tag-emails","tag-hackers","tag-safety","tag-security","tag-virus"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/2958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=2958"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/2958\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=2958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=2958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=2958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}