White keyboard with woman's fingers typing

Phishing

All articles tagged "Phishing"

Beware of phishing emails: New risks in 2022

Have you recently gotten an email asking you to enter your mail.com password or your account will be deactivated? Or received a request to log in to consent to changes in a company’s terms of use? Warning: These messages are examples of a kind of  email scam known as “phishing”.
Man in hoodie sits in office looking at laptop with serious expression on face
Not sure if an email is legit? Here's what you can look for.
Because there are a lot of phishing mails circulating these days, here’s a refresher in how to protect yourself. more
40 people found this article helpful.

What is pharming and how can you protect yourself?

Online scams can take many forms, but the aim is often the same: harvesting personal data, login credentials, and account information to commit identity theft. And pharming is no different.
Bearded man at desk holding credit card and looking at tablet computer
Pharming sites try to “harvest” information like your credit card number
Learn to recognize the signs of online fraud so you can protect yourself. more
38 people found this article helpful.

Ransomware attacks: How you can recognize and prevent ransomware

Red-on-black image of locked computer screen against a background of binary code
Do you know how to recognize and protect yourself against ransomware?
You may have seen headlines about ransomware attacks on institutions ranging from banks to hospitals to gas-pipelines. But what is ransomware, why is it dangerous, and can such attacks be prevented? Today, we answer your questions about ransomware. more
39 people found this article helpful.

Phishing emails: How to protect yourself

Image of fishhook hooking an @ symbol above a white computer keyboard

Be on the alert for phishing scams that aim to hook your personal information

You have probably heard about phishing scams – fraudulent emails designed to rob you of sensitive data. Because phishing is one of the most widespread forms of cybercrime, it’s important to learn how to recognize these scams so you don’t get caught in the net. more
94 people found this article helpful.

Beware of online romance scams!

Nowadays it’s common for romance to blossom online, with almost one-third of US adults having used a dating website or app. Unfortunately for all the lonely hearts out there, there are also lots of scammers online looking for money rather than love.
Man’s hands typing love messages on a smartphone
Is it true love or an online scam? Learn the signs of a romance scammer.
Romance scams, which often take the form of catfishing, are online dating hoaxes that target unsuspecting singles. But there are steps you can take to protect yourself. more
22 people found this article helpful.

Black Friday: mail.com provides more protection against phishing with DMARC security standard

The email provider mail.com is now using the international security standard DMARC (Domain-based Message Authentication, Reporting and Conformance). This improves the protection of its users against fraud emails with forged sender addresses. more
13 people found this article helpful.

Inactive accounts: What can happen to unused email addresses?

Suppose your mail.com email account is your primary email address, but you still have one from your college days that you rarely log in to. Or you mostly communicate by text message, so you have an email address for when you need to register for various online services, but you don’t really check it otherwise. Many of us have such dormant accounts and don’t give them much thought.
Close-up of hourglass in front of businessperson working in office
Make sure time doesn’t run out on an inactive email account
But an inactive email address could put you at risk – either of losing data and messages in the account, or of becoming an easy target for hackers. more
38 people found this article helpful.

What is typosquatting?

Fraudulent websites are a common example of a cybersecurity risk. Cybercriminals mimic the sites of trusted businesses to phish for visitors’ personal data or spread malware. One tool in their arsenal is typosquatting, where they buy domain names that are intentional misspellings of popular websites.
Two women dressed in black in dark warehouse room working on computer with two screens
Typosquatting turns simple typos into a tool for cybercrime
But how can a simple typo leave you vulnerable to online scams? more
19 people found this article helpful.

What is spear phishing? Can you prevent it?

Phishing scams – where you receive fraudulent messages pretending to be from a trusted sender designed to trick you into revealing personal data – have unfortunately become widespread and the criminals behind them have refined their techniques. For example, there are phishing phone calls (called “vishing” for voice-phishing) and phishing text messages (“smishing” for SMS-phishing).
Several padlocks and combination locks caught on a fishing hook
Protect yourself against scammers who are phishing for your password
And there is “spear phishing,” a specific form of email phishing that targets individual users. more
22 people found this article helpful.

What is a mailer daemon – and why did my email bounce back?

It’s the dreaded bounce message: “Mail delivery failed: returning message to sender.” If you receive it, it means something went wrong and your email never made it to the intended recipient. But why can’t some emails be delivered, and who is the mysterious “mailer daemon” who sends them back to you?
Internet email communication in cyberspace with envelope sign hologram over working cpu in background
Not sure why you received a bounce message? mail.com explains how to fix a bounced email.
mail.com sheds some light on these error messages and what you can do about them. more
163 people found this article helpful.