• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Biology of Technology
  • About
  • Quotes
  • Contact Us
  • BoT Blog

Biology Of Technology

Tech Power for People

Technology news and trends for empowering people. 

  • Tech Tips
  • WordPress
  • SEO
  • Biology
  • Internet
  • General
  • Mobile
  • Deals
  • TV Tech

Email Phishing Scams – Don’t Take the Bait

August 4, 2024 by Rick Howington 6 Comments

In the 1990s, when the internet was young and innocent, America Online (AOL) brought electronic mail to the masses. A computer pronouncing “you’ve got mail” heralding the arrival of an email was part of the 90s tech soundtrack, along with the beep and hiss of a modem. The 1998 movie “You’ve Got Mail” cemented the phrase into the culture of the era.

As the top service provider in the early days of the internet, AOL became a prime target for cybercriminals.  So, AOL users became some of the first victims of a major phishing attack.  Scammers began by stealing users’ credentials and using algorithms to generate random credit card numbers. They used these fake credit cards to create new accounts, which were then employed to spam other AOL users via email.

Email Phishing Scam Tecadvocates

Most of these fraudulent messages asked users to verify their accounts or confirm billing information. Since phishing was not a well-known threat at the time, many people fell for these scams. To combat this, AOL eventually added warnings to its email and instant messenger services to prevent users from sharing sensitive information through these methods.

To this day, online scammers love email, and email phishing remains one of their favorite ways to steal your money and personal information. But can you spot a phony phishing email? Here are some ways to help you avoid taking the bait from an email phishing scam.

What is Phishing?

The term “phishing” is a play on the word fishing because cyber-criminals bait users with phony emails and websites to get info. The FBI’s Internet Crime Complaint Center reports losses in excess of $30 million to phishing schemes in one year.

The endgame of an online phishing exhibition is to extort your money. It usually starts with an email that looks legitimate with an ominous warning that your account has been hacked or heralding an offer that’s too good to be true. The email provides convenient links that take you to what appears to be the company’s website. However, the website is a clever fake that usually includes forms to get passwords, social security numbers, and other personal info. The online crooks use this data to hack your accounts, steal your online identity, and take your hard-earned cash.

What are the properties of a scammy email?

Online scammers are smart and constantly updating their tactics, but there are signs that will help you recognize phishing emails.

It’s not personal

The first and best sign of a scam is when the email is not addressed to the recipient. It often starts with “Dear Customer”.  A Netflix email scam opened with “Hello Dear”. That’s bold!

Grammatical errors

If scammers are so smart then why do their emails have grammatical errors? The answer may surprise you, but it’s intentional. Spam filters often block keywords and phrases commonly found in phishing emails. So the misspelling is designed to sidestep the filter so the email lands in your inbox.

As a savvy online user armed with the knowledge of purposeful imperfect grammar, you can sidestep their scam with the power of the delete key.

Bad links

The phony links are the hooks of the phishing scheme. The best defense from a phishing email scam is to NEVER click on the links in the email.

Trends in Phishing Tactics

Phishers constantly evolve tactics, making staying informed about the latest trends crucial.

Email Phishing Scams – Don’t Take the Bait, by Rick Howington of Biology of Technology

Spear Phishing

Unlike traditional phishing, which targets a broad audience, spear phishing is highly targeted. Scammers research their victims and craft personalized emails that appear to come from trusted sources, such as colleagues or business partners. These emails often contain malicious links or attachments designed to steal sensitive information.

Vishing (Voice Phishing)

Vishing involves scammers using phone calls to trick individuals into revealing personal information. To gain your trust, they might pose as tech support, bank representatives, or even government officials. Always verify the caller’s identity before sharing any information.

Smishing (SMS Phishing)

Smishing uses text messages to lure victims into clicking on malicious links or providing personal information. Be cautious of unsolicited texts, especially those that urge immediate action or ask for sensitive data.

Tools to Combat Phishing

Fortunately, technological advancements have led to the development of tools that can help identify and prevent phishing attacks. Consider implementing these solutions to enhance your security.

Spam Filters

Advanced spam filters use machine learning to detect and block phishing emails before they reach your inbox.

Email Authentication Protocols

Technologies like DMARC, SPF, and DKIM help verify the sender’s identity and ensure the email hasn’t been tampered with. To implement this measure, you will need the help of someone with technical knowledge of DNS.  Contact TecAdvocates for assistance.

Anti-Phishing Software

These programs continuously scan for phishing threats and provide real-time alerts when suspicious activity is detected.

Join the Fight – Report Phishing Emails

Here’s your chance to get back at those online bullies for polluinting your inbox with contaminated email.

  • Forward the email to the Anti-Phishing Working Group at [email protected]
  • Report the phishing attack to the FTC at ftc.gov/complaint
Email Phishing Scams - Don't Take the Bait, by Biology of Technology

Filed Under: Email, Featured, Security




Reader Interactions

Trackbacks

  1. Email Phishing Scams – Don’t Take the Bait - TecAdvocates says:
    December 11, 2019 at 10:52 am

    […] Email Phishing Scams – Don’t Take the Bait […]

  2. The Rise of Ransomware – How to Avoid It | Biology Of Technology says:
    August 18, 2021 at 12:18 pm

    […] Avoid email phishing scams […]

  3. Beware of Spoofing and How to Protect Yourself - TecAdvocates says:
    October 4, 2022 at 8:54 am

    […] spoofing and phishing scams are often partners in crime.  It occurs when an attacker purports to be a known, familiar or […]

  4. Social Media Scams Are on the Rise. | Biology Of Technology says:
    October 11, 2023 at 7:01 pm

    […] Here are some ways to avoid phishing scams. […]

  5. Holiday Safety Hacks for Online Christmas Shopping | Biology Of Technology says:
    December 5, 2024 at 6:49 pm

    […] sophisticated tactics to trick people out of their money. From fake ads on social media to phishing emails and even fraudulent payment texts, it’s clear that protecting yourself online has never been […]

  6. A Hole in Krispy Kreme Doughnut’s Online Security | Biology Of Technology says:
    December 13, 2024 at 4:33 am

    […] Further details on the attackers and their motives remain unclear. But this incident is a stark reminder of the growing threat posed by cyberattacks, particularly ransomware and email phishing scams. […]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar




The TecAdvocate full Website Service provides a complete end-to-end solution for website development, hosting, maintenance, and expansion options.
CLICK HERE FOR MORE INFO!

Contact Us

Contact Us

Featured

5 tips for better SEO health from Biology of Technology

5 Tips for Better SEO Health for Your Website

Is your website SEO healthy?  For good Search Engine Optimization, your website may need an SEO … [Read More...] about 5 Tips for Better SEO Health for Your Website

Recent Post

Is Business Blogging Still Relevant Today?

… [Read More...] about Is Business Blogging Still Relevant Today?

Time to Take Website Security Seriously

… [Read More...] about Time to Take Website Security Seriously

Answer Engine Optimization (AEO) vs. SEO – Are You Ready for 2025?

… [Read More...] about Answer Engine Optimization (AEO) vs. SEO – Are You Ready for 2025?

A Hole in Krispy Kreme Doughnut’s Online Security

… [Read More...] about A Hole in Krispy Kreme Doughnut’s Online Security

Holiday Safety Hacks for Online Christmas Shopping

… [Read More...] about Holiday Safety Hacks for Online Christmas Shopping

Read More from The BoT Blog

Search

Footer

Follow Us!

Follow Us on FacebookFollow Us on TwitterFollow Us on LinkedInFollow Us on Instagram

Links

  • Dropbox
  • Freshbooks
  • TecAdvocates
  • Privacy Policy

Get Biology of Technology Updates

* indicates required


© Copyright 2008-2025 · All Rights Reserved · Website by TecAdvocates