Recently, email phishing has increased. The criminal Internet users are trying to elicit confidential access data with fake e-mails. Amazon, the Telekom, Paypal and other well-known enterprises are abused thereby. How to unmask phishing e-mails while reading, I'll show you in this post. Your email mailbox is handy because you can exchange in seconds with friends around the world. However, the digital mailbox is also a gateway for malicious programs. For a long time, cybercriminals have speculated on how to elicit access data from online Internet shops, banks, telecommunication providers or auction houses. The method is called phishing, is brand-threatening, but also to be unmasked, if you notice some important points.
Note 1: Incorrect links
In order to elicit confidential access data , most phishing e-mails use links. In the message section of the e-mail is usually reported by a supposed emergency or an account review. In the end, you will be redirected to a deceptively real-looking page from Amazon, Ebay, Telekom, Online-Bank & Co.. The page is wrong. Your logon data is intercepted here and forwarded directly to the hacker, who then has access to your account.
Basically you should never follow links in suspicious mails. If you are not sure whether an e-mail is genuine, call the sender's website manually in the browser. Then login with your access data. If there are really problems or important messages, the provider will inform you on his page. You can also find links to where you left the mouse over the link for a while. Outlook displays the destination address in a balloon and in the footer.
Note 2: Check the sender address
Check the sender's address for each suspicious e-mail. For example, at the end, Amazon should be "@ amazon.co.uk" or "@ amazon.com". This is the same with Telekom, Paypal & Co. If the address is different, even if it sounds similar, it is probably a phishing attempt.
Note 3: Incorrect spelling
Many e-mails are spelled out by spelling and grammar errors, as well as incorrect punctuation. The cybercriminals have, however, recently learned a lot. Since phishing e-mails often come from abroad, they can often be detected by missing umlauts. In any case, you should also react to suspicious e-mails even with the smallest errors with skepticism.
Note 4: No personal salutation
The hackers often lack complete address data. You are then not addressed in an e-mail with the correct name or general flare, such as "Ladies and Gentlemen". If an e-mail is disagreeable, delete it immediately.