Archives - Phishing


Always report suspicious account activity

For most online accounts, you’ll receive a login notification or verification email whenever you input your credentials. These are a great way for service providers to confirm it’s really you trying to access your account, but if it’s something you do frequently you might get a little complacent about receiving those emails or messages. Don’t […]

Stay alert for smishing

Despite SMS being a somewhat outdated medium, “smishing” (SMS phishing) presents a real risk to your personal information and online security. It’s a perfect method for scammers because the limitations of simple text characters and links makes it easy to hide their true intentions. As texts are often received and read on smartphones, scammers can […]

Look for the ‘verified’ tick on YouTuber comments

Sometimes, a well-known YouTube series – especially those by an influencer – will feature fake accounts  in the comments section. These people or bots may pretend to be the YouTuber, mimicking their language to encourage you to click a phishing link. Fake prizes are a common hook; they often target some of the biggest accounts […]

Be careful with links and when entering website addresses

Use caution when clicking directly on links in emails, even if the sender appears to be someone you know. Attempt to independently verify website addresses (e.g., contact your organization’s helpdesk, search the internet for the sender organization’s website or the topic mentioned in the email). Pay attention to the website addresses you click on, as […]

How to avoiding social engineering and phishing attacks

Do not give sensitive information to others unless you are sure that they are indeed who they claim to be and that they should have access to the information. Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be […]

Use caution when providing your information

Emails that appear to come from a legitimate source and websites that appear to be legitimate may be malicious. An example is an email claiming to be sent from a system administrator requesting your password or other sensitive information or directing you to a website that requests your information. Online services (e.g., banking, ISPs, retailers) […]