Archives - Phishing Emails


Look out for phishing email scams

Cybercriminals will often send emails posing as representatives of trusted entities, such as insurance companies and banks, with the intention of retrieving your private information. If a hacker finds out which car insurance company you use, they might send you an email from an address that appears to be from that company. The message could […]

Play hard to get with strangers

Cyber criminals use phishing tactics, hoping to fool their victims. If you’re unsure who an email is from—even if the details appear accurate—or if the email looks “phishy,” do not respond and do not click on any links or attachments found in that email. When available use the “junk” or “block” option to no longer […]

Look out for mismatches between an email sender’s name and address

Phishing emails often purport to be from a familiar institution like your bank or Amazon. The sender’s name might be something meant to indicate this (e.g., “Amazon Orders”), but often it won’t match the actual return address, which might be something very long and garbled. That mismatch is a sign to stay away.

Be careful with unsolicited emails

Say someone emails you out of the blue. The best course of action is usually to do nothing. Don’t respond or click a link or attachment in their message, as doing so might be risky and make you vulnerable to phishing scams.

How to ensure a safer online experience for your family

Managing the online presence of your children can be challenging. Many kids quickly become fascinated with devices like tablets and use them to play games or watch videos. These activities can be beneficial for helping them learn new concepts and keeping them occupied throughout the day, but there’s some degree of risk, too. It’s useful […]

Use caution when providing your personal information

Emails that appear to come from a legitimate source and websites that appear to be legitimate may be malicious. An example is an email claiming to be sent from a system administrator requesting your password or other sensitive information or directing you to a website that requests your information. Online services (e.g., banking, ISPs, retailers) […]