Don't be Fooled by These Phishing Emails #10

Don't be Fooled by These Phishing Emails #10

If you missed the previous articles, here is #9. In that article I linked to all of the previous examples. In 10 minutes you can learn from 9 examples of phishing attempts.

Why is learning this so important? The reality is that even if you have the best security in the world, a simple click can bypass it all. Many of today's cyber attacks are using "zero day" attacks. These are security exploits that are undocumented and haven't been patched yet. These exploits can be used to install a back door to your network on your computer.

For number 10 we use a common example, a fax from "eFax". There are a few things that stand out as to why this is a phishing attempt:

  • The sender address says eFax but the email address is completely different
  • When you hover you mouse over the "view fax" link it goes to a completely different site all together
  • In this case they were lazy and didn't even include an eFax logo
  • eFax does not require Microsoft Word

Here it is below

In this case the user was uncomfortable with this email and asked before clicking anything. This was the correct action because it was clearly a phishing attempt.

Be Safe


Jake Ruddy, President of DE/MD at PCS, helps small and medium sized businesses with IT support services, consulting, and managed services. He is passionate about the value of outsourced IT services and believes every business should have a strong relationship with a team of technology experts. PCS has a team of 100 experts supporting businesses in NJ, PA, DE, MD, DC, and VA.

If you aren't 100% happy with your current IT partner's response times, customer service, or overall value, PCS can help.


要查看或添加评论,请登录

Jake Ruddy的更多文章

  • Confessions of a Book Hater

    Confessions of a Book Hater

    This is a post I would have never imagined I would write. In fact, I write it with a smile on my face because it’s…

    9 条评论
  • Complex Passwords No Longer Make Sense

    Complex Passwords No Longer Make Sense

    -Originally written for The Delaware State Chamber. For the last 14 years, you’ve probably heard that a complex…

  • Thieves can send emails with your name on them

    Thieves can send emails with your name on them

    - Originally written for Delaware Business Times - We live in a connected world. Social media use is at an all-time…

  • Mediocre, Unexceptional, Tolerable, Average

    Mediocre, Unexceptional, Tolerable, Average

    Would you use these words to describe your current Managed Service Provider? I get it. Change is scary.

  • Don't Fall For It! PDF Links Are Dangerous As Well

    Don't Fall For It! PDF Links Are Dangerous As Well

    Attached PDFs are not uncommon by any means. In fact, they have been around long enough that we take them for granted…

  • Don't be Fooled by These Phishing Emails #9

    Don't be Fooled by These Phishing Emails #9

    This is #9 in this series. I've been trying to share as many of the common examples of phishing attempts as possible.

  • Windows XP, it's Time to Upgrade

    Windows XP, it's Time to Upgrade

    On April 14, 2014, Windows XP became officially "End of Life". This means the Operating System was no longer supported…

  • Don't be Fooled by These Phishing Emails #8

    Don't be Fooled by These Phishing Emails #8

    The one this week is going to be a little tough to read. There was a lot of text so I tried to catch most of it but it…

  • Let's Talk About Backup

    Let's Talk About Backup

    Backup is on the of those topics that will never get old. In fact, this topic gets more important every day.

  • Tips For Securing your IoT World

    Tips For Securing your IoT World

    Today we have devices like Amazon Echo, Google Home, Nest Thermostats, cameras, garage door openers, cars, and…

社区洞察

其他会员也浏览了