www.consumer.ftc.gov Open in urlscan Pro
2a02:26f0:1700:1ab::2031  Public Scan

Submitted URL: https://castchromebtpe.dorik.io/
Effective URL: https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams
Submission Tags: 7427342
Submission: On January 27 via api from US — Scanned from FR

Form analysis 2 forms found in the DOM

POST /articles/how-recognize-and-avoid-phishing-scams

<form action="/articles/how-recognize-and-avoid-phishing-scams" method="post" id="search-block-form--2" accept-charset="UTF-8">
  <div>
    <div class="container-inline">
      <h2 class="element-invisible">Search form</h2>
      <div class="form-item form-type-textfield form-item-search-block-form">
        <label class="element-invisible" for="edit-search-block-form--4">Search </label>
        <input title="Enter the terms you wish to search for." placeholder="Search" type="text" id="edit-search-block-form--4" name="search_block_form" value="" size="15" maxlength="128" class="form-text">
      </div>
      <div class="form-actions form-wrapper" id="edit-actions--2"><input type="submit" id="edit-submit--2" name="op" value="Search" class="form-submit"></div><input type="hidden" name="form_build_id"
        value="form-j80QSJh_7R6nTBh_webZtAb-kAi4VwgRTnw7NOgwiTw">
      <input type="hidden" name="form_id" value="search_block_form">
    </div>
  </div>
</form>

POST /articles/how-recognize-and-avoid-phishing-scams

<form action="/articles/how-recognize-and-avoid-phishing-scams" method="post" id="search-block-form" accept-charset="UTF-8">
  <div>
    <div class="container-inline">
      <h2 class="element-invisible">Search form</h2>
      <div class="form-item form-type-textfield form-item-search-block-form">
        <label class="element-invisible" for="edit-search-block-form--2">Search </label>
        <input title="Enter the terms you wish to search for." placeholder="Search" type="text" id="edit-search-block-form--2" name="search_block_form" value="" size="15" maxlength="128" class="form-text">
      </div>
      <div class="form-actions form-wrapper" id="edit-actions"><input type="submit" id="edit-submit" name="op" value="Search" class="form-submit"></div><input type="hidden" name="form_build_id"
        value="form-TBgOCAhELyaVOZddggMf5BqJT_AddqFeSO4lwMw46nQ">
      <input type="hidden" name="form_id" value="search_block_form">
    </div>
  </div>
</form>

Text Content

Jump to Navigation


FEDERAL TRADE COMMISSION

Consumer Information

consumer.ftc.gov

español


SEARCH FORM

Search

Main Menu
Search
 * Money &
   Credit
   * Shopping & Saving
   * Buying & Owning a Car
   * Credit & Loans
   * Dealing with Debt
   * Resolving Consumer Problems
   Toggle submenu for Money &
   Credit
 * Homes &
   Mortgages
   * Home Loans
   * Home Improvement
   * Saving Energy at Home
   * Renting & Timeshares
   Toggle submenu for Homes &
   Mortgages
 * Health &
   Fitness
   * Healthy Living
   * Treatments & Cures
   * Weight Loss & Fitness
   Toggle submenu for Health &
   Fitness
 * Jobs &
   Making Money
   * Education & Training
   * Job Hunting
   * Working from Home
   * Going into Business
   * Investments & Grants
   Toggle submenu for Jobs &
   Making Money
 * Privacy, Identity &
   Online Security
   * Limiting Unwanted Calls and Emails
   * Online Security
     * How to Protect Your Phone and the Data on It
     * How to Recognize and Avoid Phishing Scams
     * How To Get Less Spam in Your Email
     * How To Protect Your Privacy Online
     * How To Protect Your Privacy on Apps
     * How To Recognize, Remove, and Avoid Malware
     * How To Recover Your Hacked Email or Social Media Account
     * How To Safely Use Public Wi-Fi Networks
     * How To Secure Your Home Wi-Fi Network
     * How to Protect Your Data Before You Get Rid of Your Computer
     * How to Recognize and Report Spam Text Messages
     * How to Secure Your Voice Assistant and Protect Your Privacy
     * How to Spot, Avoid and Report Tech Support Scams
     * Mobile Payment Apps: How to Avoid a Scam When You Use One
     * Password Checklist
     * Protect Your Personal Information and Data
     * Securing Your Internet-Connected Devices at Home
     * Shopping Online with Virtual Currencies infographic
     * Stalking Apps: What To Know
     * Using A Health App
     * Using IP Cameras Safely
     * Virtual Private Network (VPN) Apps on Mobile Devices
     * What To Do If You’re the Target of Revenge Porn
     * What You Need to Know About Romance Scams
   * Protecting Kids Online
   * Protecting Your Privacy Online
   * Identity Theft
   Toggle submenu for Privacy, Identity &
   Online Security
 * Scams

 * Blog
 * Video & Media


SEARCH FORM

Search



YOU ARE HERE

Home › Privacy, Identity & Online Security › Online Security › How To Recognize
and Avoid Phishing Scams
 * Vea esta página en español


HOW TO RECOGNIZE AND AVOID PHISHING SCAMS




SHARE THIS PAGE

 * Facebook
 * Twitter
 * Linked-In

Scammers use email or text messages to trick you into giving them your personal
information. But there are several things you can do to protect yourself.
 * How To Recognize Phishing
 * How To Protect Yourself From Phishing Attacks
 * What To Do if You Suspect a Phishing Attack
 * What To Do if You Responded to a Phishing Email
 * How To Report Phishing


HOW TO RECOGNIZE PHISHING

Scammers use email or text messages to trick you into giving them your personal
information. They may try to steal your passwords, account numbers, or Social
Security numbers. If they get that information, they could gain access to your
email, bank, or other accounts. Scammers launch thousands of phishing attacks
like these every day — and they’re often successful.

Scammers often update their tactics, but there are some signs that will help you
recognize a phishing email or text message.

Phishing emails and text messages may look like they’re from a company you know
or trust. They may look like they’re from a bank, a credit card company, a
social networking site, an online payment website or app, or an online store.

Phishing emails and text messages often tell a story to trick you into clicking
on a link or opening an attachment. They may

 * say they’ve noticed some suspicious activity or log-in attempts
 * claim there’s a problem with your account or your payment information
 * say you must confirm some personal information
 * include a fake invoice
 * want you to click on a link to make a payment
 * say you’re eligible to register for a government refund
 * offer a coupon for free stuff

Here’s a real world example of a phishing email.



Imagine you saw this in your inbox. Do you see any signs that it’s a scam? Let’s
take a look.

 * The email looks like it’s from a company you may know and trust: Netflix. It
   even uses a Netflix logo and header.
 * The email says your account is on hold because of a billing problem.
 * The email has a generic greeting, “Hi Dear.” If you have an account with the
   business, it probably wouldn’t use a generic greeting like this.
 * The email invites you to click on a link to update your payment details.

While, at a glance, this email might look real, it’s not. The scammers who send
emails like this one do not have anything to do with the companies they pretend
to be. Phishing emails can have real consequences for people who give scammers
their information. And they can harm the reputation of the companies they’re
spoofing.


HOW TO PROTECT YOURSELF FROM PHISHING ATTACKS

Your email spam filters may keep many phishing emails out of your inbox. But
scammers are always trying to outsmart spam filters, so it’s a good idea to add
extra layers of protection. Here are four steps you can take today to protect
yourself from phishing attacks.


> FOUR STEPS TO PROTECT YOURSELF FROM PHISHING
> 
> 1. Protect your computer by using security software. Set the software to
> update automatically so it can deal with any new security threats.
> 
> 2. Protect your mobile phone by setting software to update automatically.
> These updates could give you critical protection against security threats.
> 
> 3. Protect your accounts by using multi-factor authentication. Some accounts
> offer extra security by requiring two or more credentials to log in to your
> account. This is called multi-factor authentication. The additional
> credentials you need to log in to your account fall into two categories:
> 
>  * Something you have — like a passcode you get via an authentication app or a
>    security key.
>  * Something you are — like a scan of your fingerprint, your retina, or your
>    face.
> 
> Multi-factor authentication makes it harder for scammers to log in to your
> accounts if they do get your username and password.
> 
> 4. Protect your data by backing it up. Back up your data and make sure those
> backups aren’t connected to your home network. You can copy your computer
> files to an external hard drive or cloud storage. Back up the data on your
> phone, too.


WHAT TO DO IF YOU SUSPECT A PHISHING ATTACK

If you get an email or a text message that asks you to click on a link or open
an attachment, answer this question: Do I have an account with the company or
know the person that contacted me?

If the answer is “No,” it could be a phishing scam. Go back and review the tips
in How to recognize phishing and look for signs of a phishing scam. If you see
them, report the message and then delete it.

If the answer is “Yes,” contact the company using a phone number or website you
know is real. Not the information in the email. Attachments and links can
install harmful malware.


WHAT TO DO IF YOU RESPONDED TO A PHISHING EMAIL

If you think a scammer has your information, like your Social Security, credit
card, or bank account number, go to IdentityTheft.gov. There you’ll see the
specific steps to take based on the information that you lost.

If you think you clicked on a link or opened an attachment that downloaded
harmful software, update your computer’s security software. Then run a scan.


HOW TO REPORT PHISHING

If you got a phishing email or text message, report it. The information you give
can help fight the scammers.

Step 1. If you got a phishing email, forward it to the Anti-Phishing Working
Group at reportphishing@apwg.org.

If you got a phishing text message, forward it to SPAM (7726).

Step 2. Report the phishing attack to the FTC at ReportFraud.ftc.gov.

Tagged with: cyber security, phishing, scam
May 2019


RELATED ITEMS

 * Why Report Fraud?
 * How to File a Complaint


 * How To Spot, Avoid, and Report Tech Support Scams
 * Faking it — scammers’ tricks to steal your heart and money (Blog Post)
 * How To Recognize and Report Spam Text Messages




STAY CONNECTED

 * LinkedIn
 * Facebook
 * Twitter
 * YouTube


 * FTC.gov
 * Privacy Policy
 * About Us
 * Contact Us

 * Report Fraud to the FTC
 * Register for Do Not Call
 * Report Identity Theft

 * Get Your Free Credit Report
 * Order Free Resources
 * Get Email Updates