How to Recognize and Avoid Phishing Scams | Antivirus Software

Scammers use email or text messages to trick you into giving them your personal information. They may try to steal your passwords, account numbers, or Social Security numbers. If they get that information, they could access your email, bank, or other accounts. Scammers launch thousands of phishing attacks like these every day, and they are often successful.

Recognize and Avoid Phishing Scams

How to Recognize Phishing

Scammers often update their tactics, but there are some clues that will help you recognize a phishing-like email or text message.

Phishing emails and text messages may appear to be from a company you know or trust. They can look the same as messages sent by a bank, a credit card company, a social networking site, an online payment website or application, or an online store.

Phishing emails and text messages often tell you a story to trick you into clicking a link or opening an attachment. The messages could:

  • Say that suspicious activity or login attempts have been detected.
  • Claim that there is a problem with your account or payment information.
  • Say that you must confirm some personal data.
  • Include a false invoice.
  • Ask you to click a link to make a payment.
  • Say that you are eligible to register for a refund from the government.
  • Offer you a coupon for something free.

How to Protect Yourself From Phishing Attacks

The spam filters in your email account can prevent many phishing-type emails from reaching your inbox. But scammers are always trying to evade spam filters, so it's a good idea to add some extra protection. Here are four steps you can take today to protect yourself from phishing attacks.

Four Steps to Protect Yourself from Phishing Attacks

1. Protect your computer by using antivirus software. Set the program to update automatically so that it can address any new security threats.

2. Protect your mobile phone by setting an automatic software update. These updates could offer you crucial protection against security threats.

3. Protect your accounts using a multi-factor authentication system. There are some accounts that offer a higher level of security as you have to enter two or more credentials to log into your account. This is called multi-factor authentication. The additional credentials you need to log into your account fall into two categories:

Some data that you have, such as a code that you receive through a text message or an authentication application.

Some personal recognition data, such as a scan of your fingerprint, retina, or face.

With the multi-factor authentication system, it is more difficult for scammers who have your username and password to access your accounts.

4. Protect your data by making backup copies. Make backup copies and make sure your backups are not connected to your home network. You can copy the files from your computer to an external drive or cloud storage. Also, make backup copies of your phone data.

What to Do if You Suspect a Phishing Attack

If you receive an email or text message asking you to click a link or open an attachment, please answer this question: Do I have an account with that company or do I know the person who contacted me?

If the answer is no, it could be a phishing scam. Recheck the recommendations in How to Recognize Phishing and look for signs of a phishing scam. If you find them, report the message and then delete it.

If yes , contact the company by calling a phone number or visiting a website that you know is real. Do not use the information contained in the email. Attachments and links can install malicious programs.

What to Do if You Responded to a Phishing Email

If you think a scammer has your information, like your Social Security number, credit card, or bank account number, go to identitytheft.gov. There you can see the specific steps to follow based on the type of information you lost.

If you think you clicked a link or opened an attachment that downloaded a malicious program to you, update your computer's antivirus security. Then activate a scan.

Comments