{"id":27388,"date":"2017-12-05T17:26:46","date_gmt":"2017-12-05T22:26:46","guid":{"rendered":"https:\/\/www.computeradvantage.us\/v3\/?p=27388"},"modified":"2017-12-05T15:29:14","modified_gmt":"2017-12-05T20:29:14","slug":"watch-out-for-phishing-attacks-hidden-in-your-email","status":"publish","type":"post","link":"http:\/\/www.computeradvantage.us\/v3\/watch-out-for-phishing-attacks-hidden-in-your-email\/","title":{"rendered":"Watch Out for Phishing Attacks Hidden in Your Email"},"content":{"rendered":"<p>One of the most important things you can do to stay safe on the Internet is to be careful while reading email. That\u2019s because online criminals know that we\u2019re all busy, and we often don\u2019t pay enough attention to what we\u2019re reading or where we\u2019re clicking.<\/p>\n<p>To take advantage of our inattention, these Internet information thieves forge email messages to look like they come from the likes of Apple, Facebook, and Amazon, along with well-known banks, payment services, retailers, and even government agencies. Even more dangerous are messages that appear to come from a trusted individual and include personal details\u2014these messages are often targeted at executives and company managers. Generally speaking, these attacks are called <i>phishing<\/i>\u2014you can <a href=\"https:\/\/it.cornell.edu\/phish-bowl\">see examples here<\/a>.<\/p>\n<p>The goal? Get you to click a link in the message and visit a malicious Web site. That site usually continues to masquerade as being run by a company or organization you trust. Its aim is to sucker you into revealing confidential information by asking you to log in, pay for a product or service, or fill out a survey. The site\u2014or an attachment in the email message\u2014might also try to install malware. Although macOS is quite secure, if you approve security prompts, it can still be infected.<\/p>\n<p>Although phishing is a huge problem that costs businesses hundreds of millions of dollars every year, you can easily identify phishing messages by looking for telltale signs:<\/p>\n<ul>\n<li>Be suspicious of email messages, particularly from people you don\u2019t know or from well-known companies, that ask you to click a link and do something with an online account.<\/li>\n<li>Look closely at email addresses and URLs (hover the pointer over a link to see the underlying URL). Phishing messages don\u2019t use official domains, so instead of paypal.com, the addresses and links might use paypa1.com\u2014close enough to pass a quick glance, but clearly a fake.<\/li>\n<li>Watch out for highly emotional or urgent requests. They\u2019re designed to make you act without thinking. Take any such messages with a grain of salt.<\/li>\n<li>Channel your inner English teacher and look for poor grammar or odd phrasing, which are red flags for phishing messages. Email from real companies may not be perfect, but it won\u2019t have multiple egregious errors.<\/li>\n<\/ul>\n<p><img decoding=\"async\" data-src=\"https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2017\/11\/Phishing-example.png\" data-sizes=\"(max-width: 561px) 100vw, 561px\" data-srcset=\"https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2017\/11\/Phishing-example.png 804w, https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2017\/11\/Phishing-example-300x168.png 300w, https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2017\/11\/Phishing-example-768x431.png 768w\" alt=\"\" width=\"561\" height=\"315\" data-attachment-id=\"5535\" data-permalink=\"https:\/\/tcn.tidbits.com\/watch-out-for-phishing-attacks-hidden-in-your-email\/phishing-example\/\" data-orig-file=\"https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2017\/11\/Phishing-example.png\" data-orig-size=\"804,451\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Phishing-example\" data-image-description=\"\" data-medium-file=\"https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2017\/11\/Phishing-example-300x168.png\" data-large-file=\"https:\/\/tcn.tidbits.com\/wp-content\/uploads\/2017\/11\/Phishing-example.png\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 561px; --smush-placeholder-aspect-ratio: 561\/315;\" \/><\/p>\n<p>So what do you do if you get a message that may be phishing for sensitive information? Most of the time you can just ignore it. If you\u2019re worried that it might be legit, instead of clicking any links in the message, navigate to the site in question manually by typing the organization\u2019s URL into your browser\u2014use a URL that you know to be correct, not the one in the email message. Whatever you do, do not open attachments that you aren\u2019t expecting and never send confidential information via email.<\/p>\n<p>If you think you\u2019ve fallen prey to a phishing attack and given away a password, you\u2019ll want to change passwords on any affected accounts. If you\u2019ve opened any attachments or approved any installs, run anti-malware software to determine whether your Mac has been infected. Contact us if you need help. And remember, regular backups protect you from a multitude of sins.<\/p>\n<hr \/>\n<p><b>Twitter:<\/b> Can you tell if you\u2019ve been targeted by a phishing attack? Read on to learn how to identify malicious messages!<\/p>\n<p><b>Facebook:<\/b> Phishing attacks\u2014email containing links that try to get you to reveal usernames, passwords, or credit card details\u2014are all too common these days. Follow our advice to learn how to identify malicious messages.<\/p>\n<p class=\"wpematico_credit\">\n","protected":false},"excerpt":{"rendered":"<p>One of the most important things you can do to stay safe on the Internet is to be careful while reading email. That\u2019s because online criminals know that we\u2019re all busy, and we often don\u2019t pay enough attention to what we\u2019re reading or where we\u2019re clicking. To take advantage of our inattention, these Internet information [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":27389,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"wds_primary_category":0,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[157,193,66,39,328,329,196,124,79],"tags":[],"class_list":["post-27388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apple-pros","category-apros-archive","category-article","category-blog","category-email","category-phishing","category-restricted-content","category-security","category-solution"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2017\/12\/Phishing-example.png","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6YLEm-77K","jetpack-related-posts":[{"id":31848,"url":"https:\/\/www.computeradvantage.us\/v3\/5-new-years-resolutions-that-will-improve-your-digital-security\/","url_meta":{"origin":27388,"position":0},"title":"5 New Year\u2019s Resolutions That Will Improve Your Digital Security","author":"computeradv","date":"January 11, 2021","format":false,"excerpt":"Have a safer 2021 with New Year\u2019s resolutions that will help you secure your devices, avoid email and text scams, and stay safe from malware, as well as benefit from the security and ease-of-use of password managers, which can even fill in passwords for iPhone apps.","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"http:\/\/www.computeradvantage.us\/v3\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2021\/01\/5-new-years-resolutions-that-will-improve-your-digital-security.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2021\/01\/5-new-years-resolutions-that-will-improve-your-digital-security.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2021\/01\/5-new-years-resolutions-that-will-improve-your-digital-security.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2021\/01\/5-new-years-resolutions-that-will-improve-your-digital-security.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2021\/01\/5-new-years-resolutions-that-will-improve-your-digital-security.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":28501,"url":"https:\/\/www.computeradvantage.us\/v3\/troubles-with-messages-read-on-for-ten-possible-solutions\/","url_meta":{"origin":27388,"position":1},"title":"Troubles with Messages? Read On for Ten Possible Solutions","author":"computeradv","date":"February 15, 2019","format":false,"excerpt":"Apple\u2019s Messages app for iOS and macOS generally works well, but when it doesn\u2019t, figuring out what\u2019s wrong and how to fix it can take some doing. Here are a few of the most common solutions we\u2019ve come across for problems with sending and receiving messages. Help Android-switcher friends turn\u2026","rel":"","context":"In &quot;Apple Pros&quot;","block_context":{"text":"Apple Pros","link":"http:\/\/www.computeradvantage.us\/v3\/category\/apple-pros\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2019\/02\/Messages-iMessage-switch-1024x290.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2019\/02\/Messages-iMessage-switch-1024x290.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2019\/02\/Messages-iMessage-switch-1024x290.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2019\/02\/Messages-iMessage-switch-1024x290.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":30688,"url":"https:\/\/www.computeradvantage.us\/v3\/what-to-do-if-you-run-low-on-icloud-storage-space\/","url_meta":{"origin":27388,"position":2},"title":"What to Do If You Run Low on iCloud Storage Space","author":"computeradv","date":"March 30, 2020","format":false,"excerpt":"Running low on iCloud storage space? Rather than automatically paying Apple for a larger iCloud plan, check out these tips on how to recover gigabytes of wasted space.","rel":"","context":"In &quot;backup&quot;","block_context":{"text":"backup","link":"http:\/\/www.computeradvantage.us\/v3\/category\/backup\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2020\/03\/what-to-do-if-you-run-low-on-icloud-storage-space.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2020\/03\/what-to-do-if-you-run-low-on-icloud-storage-space.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2020\/03\/what-to-do-if-you-run-low-on-icloud-storage-space.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2020\/03\/what-to-do-if-you-run-low-on-icloud-storage-space.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2020\/03\/what-to-do-if-you-run-low-on-icloud-storage-space.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":1621,"url":"http:\/\/www.computeradvantage.us\/v3\/take-advantage-of-extra-features-in-messages-group-conversations\/","url_meta":{"origin":27388,"position":3},"title":"Take Advantage of Extra Features in Messages Group Conversations","author":"computeradv","date":"July 25, 2016","format":false,"excerpt":"When you\u2019re in a group chat in Messages on either the Mac or in iOS, Apple has provided a slew of extra features that make for a better group experience. You can share locations, access attachments, mute a chatty conversation temporarily, and add new people as necessary. Learn how on\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"http:\/\/www.computeradvantage.us\/v3\/category\/blog\/"},"img":{"alt_text":"Tips for Group Messages on iPhone","src":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/07\/Messages-group-chat-1080x401.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/07\/Messages-group-chat-1080x401.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/07\/Messages-group-chat-1080x401.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/07\/Messages-group-chat-1080x401.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/07\/Messages-group-chat-1080x401.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":25877,"url":"http:\/\/www.computeradvantage.us\/v3\/cool-new-features-in-ios-10\/","url_meta":{"origin":27388,"position":4},"title":"Cool New Features in iOS 10","author":"computeradv","date":"September 26, 2016","format":false,"excerpt":"Apple has released iOS 10, with a major change to how you interact with the Lock screen of your iPhone or iPad, along with significant enhancements to Messages, Photos, Safari, and Maps. Hop on over to our blog for a quick rundown of what\u2019s new!","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"http:\/\/www.computeradvantage.us\/v3\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/09\/iOS-10-photo-1080x675.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/09\/iOS-10-photo-1080x675.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/09\/iOS-10-photo-1080x675.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/09\/iOS-10-photo-1080x675.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.computeradvantage.us\/v3\/wp-content\/uploads\/2016\/09\/iOS-10-photo-1080x675.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":27108,"url":"http:\/\/www.computeradvantage.us\/v3\/the-top-features-youll-want-to-try-in-ios-11\/","url_meta":{"origin":27388,"position":5},"title":"The Top Features You\u2019ll Want to Try in iOS 11","author":"computeradv","date":"September 19, 2017","format":false,"excerpt":"Even if you\u2019re not buying a new iPhone this year, you can still enjoy a hefty dose of \u201cNew and Improved!\u201d with Apple\u2019s iOS 11, which provides a host of new capabilities. Hold on tight, there\u2019s a lot to cover, and we have another article coming about the iPad-specific changes\u2026","rel":"","context":"In &quot;Apple Pros&quot;","block_context":{"text":"Apple Pros","link":"http:\/\/www.computeradvantage.us\/v3\/category\/apple-pros\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/tcn.tidbits.com\/wp-content\/uploads\/2017\/09\/iOS11-iPhone-Storage-1024x592.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/tcn.tidbits.com\/wp-content\/uploads\/2017\/09\/iOS11-iPhone-Storage-1024x592.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/tcn.tidbits.com\/wp-content\/uploads\/2017\/09\/iOS11-iPhone-Storage-1024x592.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/tcn.tidbits.com\/wp-content\/uploads\/2017\/09\/iOS11-iPhone-Storage-1024x592.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/posts\/27388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/comments?post=27388"}],"version-history":[{"count":0,"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/posts\/27388\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/media\/27389"}],"wp:attachment":[{"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/media?parent=27388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/categories?post=27388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.computeradvantage.us\/v3\/wp-json\/wp\/v2\/tags?post=27388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}