DATA DOCTORS

Tips and tools to detect and avoid computer phishing scams

Oct 31, 2022, 8:00 PM | Updated: 9:27 pm

In this photo illustration a spam 'Phishing' email is displayed on a laptop screen on March 21,2022...

In this photo illustration a spam 'Phishing' email is displayed on a laptop screen on March 21,2022 in London,England. (Photo by Peter Dazeley/Getty Images)

(Photo by Peter Dazeley/Getty Images)

Q: Are there any resources to help me teach my elderly parents how to spot phishing emails?

A: Despite all the sophisticated methods used to prevent hackers from breaking into our personal accounts, they can all be bypassed if they can trick you into giving up sensitive information.

Far and away, the method of choice for compromising users is through sophisticated phishing messages in email, via text messaging and through social media accounts.

An International coalition known as the Anti-Phishing Working Group observed 1.097,811 phishing attacks in the second quarter of 2022, which is the highest number that they have ever seen.

Social media threats grew at the fastest rate with a nearly 50% increase from Q1 to Q2 of 2022.

This trend is expected to grow because of the simplicity of launching widespread phishing attacks and frankly, because it works so well when it comes to compromising users around the world.

Learning how to spot the obvious signs that something is ‘phishy’ is a skill that everyone should be working to develop as the sophistication level continues to increase.

Common Signs of Phishing
Just about everyone knows that a file attachment in an email message should be considered suspicious, but scammers have resorted to tricks that overcome this suspicion.

A corporate logo, a sense of urgency, and fear are just a few ways that scammers get you to let your guard down.

As a general rule, every file attachment from anyone including those that you know should always be considered ‘guilty until proven innocent’ and should never be opened or downloaded.

If it’s someone you know call, text, or send a separate email to them asking about the file to confirm that it’s valid.

If you receive any file attachment that appears to be from any major delivery service such as FedEx, USPS, UPS or DHL, they are all scams as none of those services will ever send you a file attachment.

Poor grammar, strange greetings and misspelled or strange words are usually a tip-off that someone that doesn’t speak English generated the message and is most likely a phishing scam.

The two biggest tip-offs of a clear scam are the email address that is used as the sender and the URL of any links that are contained in the message. These are also the most difficult to decipher for those that aren’t very tech-savvy.

Oftentimes, the scammers will use a legitimate web address at the beginning of the web address, but if you continue to inspect the rest of the link, it leads to a completely different website.

Another red flag is any message that asks you to verify any kind of information or tells you that you need to reset your password. If you suspect that something is legitimate, manually go to that company’s website and sign into your account. If the warning is legitimate, it will show up in your account notifications.

Online Phishing Quizzes
One of the best ways to help anyone learn how to spot these increasingly more sophisticated phishing tactics is through the many online phishing quizzes:

Federal Trade Commission:
Google:
OpenDNS:
SonicWall:
PhishingBox:
NexusTek:
ESET (video):

Data Doctors

Man checks Wi-Fi connection...

Ken Colburn, Data Doctors

Computer tips: How Wi-Fi 7 can be beneficial and why you should consider the upgrade

Now, here’s the big question: Do you really need to upgrade to Wi-Fi 7? The answer depends largely on how you use the internet and what kind of performance you expect from your wireless network.

4 days ago

Which backup option is better: cloud storage or cloud backup?...

Data Doctors

How to compare and contrast cloud storage and cloud backup

So you're considering both cloud storage and cloud backup. Not sure which backup option is better for you? This guide can help.

11 days ago

If you’re on your computer all day long, you’ll wonder how you ever lived without it once you s...

Ken Colburn, Data Doctors

Here are some benefits of having dual displays

If you’re on your computer all day long, you’ll wonder how you ever lived without it once you start having dual displays.

18 days ago

A person holding up their smartphone....

Ken Colburn, Data Doctors

Here are the tips on how to enable crash detection on mobile devices

Various mobile devices have different ways to enable crash detection and here are the tips to enable them on certain devices.

25 days ago

Various versions of Windows include the option to use BitLocker, which is Microsoft’s built-in en...

Ken Colburn, Data Doctors

Here are the pros and cons of using Windows BitLocker

Various versions of Windows include the option to use BitLocker, which is Microsoft’s built-in encryption tool. Here are pros and cons.

1 month ago

Various versions of Windows include the option to use BitLocker, which is Microsoft’s built-in en...

Sponsored Content by

Various versions of Windows include the option to use BitLocker, which is Microsoft’s built-in encryption tool. Here are pros and cons.

Sponsored Articles

...

Sanderson Ford

3 new rides for 3 new road trips in Arizona

It's time for the Sanderson Ford Memorial Day sale with the Mighty Fine 69 Anniversary, as Sanderson Ford turned 69 years old in May.

...

Collins Comfort Masters

Here’s how to be worry-free when your A/C goes out in the middle of summer

PHOENIX -- As Arizona approaches another hot summer, Phoenix residents are likely to spend more time indoors.

...

Desert Institute for Spine Care

Desert Institute for Spine Care is the place for weekend warriors to fix their back pain

Spring has sprung and nothing is better than March in Arizona. The temperatures are perfect and with the beautiful weather, Arizona has become a hotbed for hikers, runners, golfers, pickleball players and all types of weekend warriors.

Tips and tools to detect and avoid computer phishing scams