phishingCybercriminals commonly use phishing via email as a strategy to acquire usernames, credit card details, and passwords.  These emails include malicious links or attachments to corrupt  computers and mobile devices.

According to a recent study, cybercriminals use certain email subject lines more often than others. It’s critical to keep an eye out for all suspicious emails.  The following are the top four commonly used subject lines:

1.   Invitation to connect on LinkedIn
2.   Dear <Insert bank name> customer
3.   Undelivered mail returned to sender
4.   Mail delivery failed: returning message to sender

Cybercriminals conduct research to entice victims to open an email attachment. They use a variety of strategies to trick victims, including social networking invitations, “returned mail” messages, and bank notifications.

Phishing emails come in a variety of forms, but the majority are created to steal information about your identity and banking details.

Protect yourself from sophisticated phishing attacks by:

  • Not Sharing Personal Information

If an attachment takes you to a website that asks for your name, address, password, and/or banking information, don’t share this personal information. If you have any doubts, always call the company headquarters and verify the message came from them.

  • Not Opening Attachments From Unknown Senders

If you don’t know the sender, don’t download attachments or click on links. These attachments or links may install malware on your device once they’re opened. If you know the sender but you’re suspicious of an attachment, call to verify the email.

  • Using Caution When On Social Networks

Cybercriminals take advantage of our ability to trust our friends. Often, a cybercriminal will hack into someone’s social media account and post links or send emails to you and friends. If something looks suspicious, call your friend and ask if they sent you the message.

  • Installing Security Software

If you click a malicious link or download an attachment, a comprehensive security solution can protect you by detecting and removing the malware. Don’t depend on security software, but keep it updated just in case.

  • Watching Out For Pop-Up Screens

A legitimate company won’t ask you to submit personal information in a pop-up screen. If a pop-up appears, don’t click the link and don’t enter any personal information. Also, don’t copy web addresses into your browser from pop-ups.

Keep the above email subject lines in mind and be careful with suspicious looking emails. Take the necessary precautions to protect your sensitive information.

To learn more about phishing attacks and how to protect your personal information, give us a call at (613) 828-1384 or send us an email at info@fuellednetworks.com. Fuelled Networks can help you stay protected from the latest malware attacks and phishing scams.

Latest Blog Posts

10 Signs Your IT Network Has Been Hacked
10 Signs Your IT Network Has Been Hacked
Read More
What is IT Modernization?
What is IT Modernization?
Read More
How to Train ChatGPT
How to Train ChatGPT
Read More
Read The Tech Blog