White keyboard with woman's fingers typing

Phishing

All articles tagged "Phishing"

How to report a phishing mail & more: Answers to reader questions

You asked, we answer! From where to find the spellcheck to how to report a phishing email, here are the answers to frequent questions we receive from our loyal readers and mail.com customers. more
25 people found this article helpful.

Beware of phishing emails: New risks in 2022

Have you recently gotten an email asking you to enter your mail.com password or your account will be deactivated? Or received a request to log in to consent to changes in a company’s terms of use? Warning: These messages are examples of a kind of  email scam known as “phishing”.
Man in hoodie sits in office looking at laptop with serious expression on face
Not sure if an email is legit? Here's what you can look for.
Because there are a lot of phishing mails circulating these days, here’s a refresher in how to protect yourself. more
369 people found this article helpful.

What is pharming and how can you protect yourself?

Online scams can take many forms, but the aim is often the same: harvesting personal data, login credentials, and account information to commit identity theft. And pharming is no different.
Bearded man at desk holding credit card and looking at tablet computer
Pharming sites try to “harvest” information like your credit card number
Learn to recognize the signs of online fraud so you can protect yourself. more
49 people found this article helpful.

Ransomware attacks: How you can recognize and prevent ransomware

Red-on-black image of locked computer screen against a background of binary code
Do you know how to recognize and protect yourself against ransomware?
You may have seen headlines about ransomware attacks on institutions ranging from banks to hospitals to gas-pipelines. But what is ransomware, why is it dangerous, and can such attacks be prevented? Today, we answer your questions about ransomware. more
130 people found this article helpful.

Phishing emails: How to protect yourself

Image of fishhook hooking an @ symbol above a white computer keyboard

Be on the alert for phishing scams that aim to hook your personal information

You have probably heard about phishing scams – fraudulent emails designed to rob you of sensitive data. Because phishing is one of the most widespread forms of cybercrime, it’s important to learn how to recognize these scams so you don’t get caught in the net. more
186 people found this article helpful.

Beware of online romance scams!

Nowadays it’s common for romance to blossom online, with almost one-third of US adults having used a dating website or app. Unfortunately for all the lonely hearts out there, there are also lots of scammers online looking for money rather than love.
Man’s hands typing love messages on a smartphone
Is it true love or an online scam? Learn the signs of a romance scammer.
Romance scams, which often take the form of catfishing, are online dating hoaxes that target unsuspecting singles. But there are steps you can take to protect yourself. more
756 people found this article helpful.

Black Friday: mail.com provides more protection against phishing with DMARC security standard

The email provider mail.com is now using the international security standard DMARC (Domain-based Message Authentication, Reporting and Conformance). This improves the protection of its users against fraud emails with forged sender addresses. more
22 people found this article helpful.

What is typosquatting?

Fraudulent websites are a common example of a cybersecurity risk. Cybercriminals mimic the sites of trusted businesses to phish for visitors’ personal data or spread malware. One tool in their arsenal is typosquatting, where they buy domain names that are intentional misspellings of popular websites. But how can a simple typo leave you vulnerable to online scams? more
23 people found this article helpful.

What is spear phishing? Can you prevent it?

Phishing scams – where you receive fraudulent messages pretending to be from a trusted sender designed to trick you into revealing personal data – have unfortunately become widespread and the criminals behind them have refined their techniques. For example, there are phishing phone calls (called “vishing” for voice-phishing) and phishing text messages (“smishing” for SMS-phishing). more
114 people found this article helpful.