staysafeonline.org Open in urlscan Pro
2606:4700:10::ac43:2750  Public Scan

Submitted URL: https://commerzbanksicherheit.org/RED.php
Effective URL: https://staysafeonline.org/theft-fraud-cybercrime/spam-and-phishing/
Submission: On June 30 via manual from DE — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://staysafeonline.org/

<form role="search" method="get" class="search_form" action="https://staysafeonline.org/" data-inited-validation="1">
  <input type="hidden" value="" name="post_types">
  <input type="text" class="search_field" placeholder="Search" value="" name="s">
  <button type="submit" class="search_submit trx_addons_icon-search"></button>
</form>

GET https://staysafeonline.org/

<form role="search" method="get" class="search_form" action="https://staysafeonline.org/" data-inited-validation="1">
  <input type="hidden" value="" name="post_types">
  <input type="text" class="search_field" placeholder="Search" value="" name="s">
  <button type="submit" class="search_submit trx_addons_icon-search"></button>
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/20740408/3f15009c-f6ee-4fbc-95e7-e3844ba45d2a

<form novalidate="" accept-charset="UTF-8" action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/20740408/3f15009c-f6ee-4fbc-95e7-e3844ba45d2a" enctype="multipart/form-data"
  id="hsForm_3f15009c-f6ee-4fbc-95e7-e3844ba45d2a" method="POST"
  class="hs-form stacked hs-form-private hsForm_3f15009c-f6ee-4fbc-95e7-e3844ba45d2a hs-form-3f15009c-f6ee-4fbc-95e7-e3844ba45d2a hs-form-3f15009c-f6ee-4fbc-95e7-e3844ba45d2a_ce4b4ab4-2d96-45db-a33e-dbc7bb2b4c45"
  data-form-id="3f15009c-f6ee-4fbc-95e7-e3844ba45d2a" data-portal-id="20740408" target="target_iframe_3f15009c-f6ee-4fbc-95e7-e3844ba45d2a" data-reactid=".hbspt-forms-0">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$0"><label id="label-email-3f15009c-f6ee-4fbc-95e7-e3844ba45d2a" class="" placeholder="Enter your " for="email-3f15009c-f6ee-4fbc-95e7-e3844ba45d2a"
      data-reactid=".hbspt-forms-0.1:$0.0"><span data-reactid=".hbspt-forms-0.1:$0.0.0"></span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$0.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-0.1:$0.$email"><input id="email-3f15009c-f6ee-4fbc-95e7-e3844ba45d2a" class="hs-input" type="email" name="email" required="" placeholder="Email*" value="" autocomplete="email"
        data-reactid=".hbspt-forms-0.1:$0.$email.0" inputmode="email"></div>
  </div>
  <div class="hs_i_would_like_to_subscribe_to_the_national_cyber_security_alliance_newsletter_ hs-i_would_like_to_subscribe_to_the_national_cyber_security_alliance_newsletter_ hs-fieldtype-booleancheckbox field hs-form-field" style="display:none;"
    data-reactid=".hbspt-forms-0.1:$1">
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$1.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-0.1:$1.$i_would_like_to_subscribe_to_the_national_cyber_security_alliance_newsletter_"><input name="i_would_like_to_subscribe_to_the_national_cyber_security_alliance_newsletter_" class="hs-input"
        type="hidden" value="true" data-reactid=".hbspt-forms-0.1:$1.$i_would_like_to_subscribe_to_the_national_cyber_security_alliance_newsletter_.0"></div>
  </div><noscript data-reactid=".hbspt-forms-0.2"></noscript>
  <div class="hs_recaptcha hs-recaptcha field hs-form-field" data-reactid=".hbspt-forms-0.3">
    <div class="input" data-reactid=".hbspt-forms-0.3.0">
      <div class="grecaptcha-badge" data-style="inline" style="width: 256px; height: 60px; box-shadow: gray 0px 0px 5px;">
        <div class="grecaptcha-logo"><iframe title="reCAPTCHA"
            src="https://www.google.com/recaptcha/enterprise/anchor?ar=1&amp;k=6Ld_ad8ZAAAAAAqr0ePo1dUfAi0m4KPkCMQYwPPm&amp;co=aHR0cHM6Ly9zdGF5c2FmZW9ubGluZS5vcmc6NDQz&amp;hl=de&amp;v=4rwLQsl5N_ccppoTAwwwMrEN&amp;size=invisible&amp;badge=inline&amp;cb=ptk3qxvj3fhp"
            width="256" height="60" role="presentation" name="a-fh7mq3p2dze9" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe>
        </div>
        <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
          style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
      </div><iframe style="display: none;"></iframe>
    </div><input type="hidden" name="g-recaptcha-response" id="hs-recaptcha-response" value="" data-reactid=".hbspt-forms-0.3.1">
  </div>
  <div class="hs_submit hs-submit" data-reactid=".hbspt-forms-0.5">
    <div class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.5.0"></div>
    <div class="actions" data-reactid=".hbspt-forms-0.5.1"><input type="submit" value="Subscribe" class="hs-button primary large" data-reactid=".hbspt-forms-0.5.1.0"></div>
  </div><noscript data-reactid=".hbspt-forms-0.6"></noscript><input name="hs_context" type="hidden"
    value="{&quot;rumScriptExecuteTime&quot;:1249.8000001907349,&quot;rumServiceResponseTime&quot;:1734.5,&quot;rumFormRenderTime&quot;:2.5,&quot;rumTotalRenderTime&quot;:1738.8000001907349,&quot;rumTotalRequestTime&quot;:428.30000019073486,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;clonedFromForm&quot;:&quot;96ba64be-de38-4c55-8b4d-61ab3a4dce74&quot;,&quot;embedType&quot;:&quot;REGULAR&quot;,&quot;embedAtTimestamp&quot;:&quot;1656582077202&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1654195895890&quot;,&quot;pageUrl&quot;:&quot;https://staysafeonline.org/theft-fraud-cybercrime/spam-and-phishing/&quot;,&quot;pageTitle&quot;:&quot;Spam and Phishing - National Cybersecurity Alliance&quot;,&quot;source&quot;:&quot;FormsNext-static-5.508&quot;,&quot;sourceName&quot;:&quot;FormsNext&quot;,&quot;sourceVersion&quot;:&quot;5.508&quot;,&quot;sourceVersionMajor&quot;:&quot;5&quot;,&quot;sourceVersionMinor&quot;:&quot;508&quot;,&quot;timestamp&quot;:1656582077202,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36&quot;,&quot;originalEmbedContext&quot;:{&quot;region&quot;:&quot;na1&quot;,&quot;portalId&quot;:&quot;20740408&quot;,&quot;formId&quot;:&quot;3f15009c-f6ee-4fbc-95e7-e3844ba45d2a&quot;,&quot;target&quot;:&quot;#hbspt-form-1656582076953-8264786581&quot;},&quot;boolCheckBoxFields&quot;:&quot;i_would_like_to_subscribe_to_the_national_cyber_security_alliance_newsletter_&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;],&quot;formTarget&quot;:&quot;#hbspt-form-1656582076953-8264786581&quot;,&quot;correlationId&quot;:&quot;cc1d3f34-f93c-43fc-a46c-81535085814e&quot;,&quot;captchaStatus&quot;:&quot;LOADED&quot;}"
    data-reactid=".hbspt-forms-0.7"><iframe name="target_iframe_3f15009c-f6ee-4fbc-95e7-e3844ba45d2a" style="display:none;" data-reactid=".hbspt-forms-0.8"></iframe>
</form>

Text Content

Skip to content Skip to footer

Menu
 * Resources + Guides
   *  * All
      * Online Safety + Privacy Basics
      * Career + Education
      * Theft, Fraud + Cybercrime
      * Cybersecurity for Business
     
     THE IMPORTANCE OF USING A VPN
     
     March 29, 20164 min readRead time
     
     ONLINE SHOPPING SAFETY TIPS
     
     April 14, 201610 min readRead time
     
     6 ESSENTIAL MEASURES TO PROTECT YOUR NETWORK FROM HACKERS
     
     June 13, 20168 min readRead time
     
     A HISTORY OF ETHICAL HACKING
     
     August 29, 20169 min readRead time
     
     YOU CAN’T HAVE PRIVACY WITHOUT SECURITY
     
     October 13, 20168 min readRead time
     
     
 * Events + Programs
 * About Us
 * Sponsorship Opportunities
 * 

Menu
 * Resources + Guides
   *  * All
      * Online Safety + Privacy Basics
      * Career + Education
      * Theft, Fraud + Cybercrime
      * Cybersecurity for Business
     
     THE IMPORTANCE OF USING A VPN
     
     March 29, 20164 min readRead time
     
     ONLINE SHOPPING SAFETY TIPS
     
     April 14, 201610 min readRead time
     
     6 ESSENTIAL MEASURES TO PROTECT YOUR NETWORK FROM HACKERS
     
     June 13, 20168 min readRead time
     
     A HISTORY OF ETHICAL HACKING
     
     August 29, 20169 min readRead time
     
     YOU CAN’T HAVE PRIVACY WITHOUT SECURITY
     
     October 13, 20168 min readRead time
     
     
 * Events + Programs
 * About Us
 * Sponsorship Opportunities





 * Resources + Guides
   *  * All
      * Online Safety + Privacy Basics
      * Career + Education
      * Theft, Fraud + Cybercrime
      * Cybersecurity for Business
     
     THE IMPORTANCE OF USING A VPN
     
     March 29, 20164 min readRead time
     
     ONLINE SHOPPING SAFETY TIPS
     
     April 14, 201610 min readRead time
     
     6 ESSENTIAL MEASURES TO PROTECT YOUR NETWORK FROM HACKERS
     
     June 13, 20168 min readRead time
     
     A HISTORY OF ETHICAL HACKING
     
     August 29, 20169 min readRead time
     
     YOU CAN’T HAVE PRIVACY WITHOUT SECURITY
     
     October 13, 20168 min readRead time
     
     
 * Events + Programs
 * About Us
 * Sponsorship Opportunities

Online Safety + Privacy Basics Resources Theft, Fraud + Cybercrime


SPAM AND PHISHING

May 26, 2022
8 min readRead time

SHARE THIS ARTICLE

Share Post



CYBERCRIMINALS HAVE BECOME QUITE SAVVY IN THEIR ATTEMPTS TO LURE PEOPLE IN AND
GET YOU TO CLICK ON A LINK OR OPEN AN ATTACHMENT.

MALICIOUS EMAIL

A malicious email can look just like it comes from a financial institution, an
e-commerce site, a government agency or any other service or business.

It often urges you to act quickly, because your account has been compromised,
your order cannot be fulfilled or there is another urgent matter to address.

If you are unsure whether an email request is legitimate, try to verify it with
these steps:

 * Contact the company directly – using information provided on an account
   statement, on the company’s official website or on the back of a credit card.
 * Search for the company online – but not with information provided in the
   email.

SPAM

Spam is the electronic equivalent of junk mail. The term refers to unsolicited,
bulk – and often unwanted – email. Here are ways to reduce spam:

ENABLE FILTERS ON YOUR EMAIL PROGRAMS:

Most internet service providers (ISPs) and email providers offer spam filters;
however, depending on the level you set, you may end up blocking emails you
want. It’s a good idea to occasionally check your junk folder to ensure the
filters are working properly.

REPORT SPAM

Most email clients offer ways to mark an email as spam or report instances of
spam. Reporting spam will also help to prevent the messages from being directly
delivered to your inbox.

OWN YOUR ONLINE PRESENCE

Consider hiding your email address from online profiles and social networking
sites or only allowing certain people to view your personal information. 


PHISHING

Phishing attacks use email or malicious websites (clicking on a link) to collect
personal and financial information or infect your machine with malware and
viruses.

SPEAR PHISHING

Spear phishing involves highly specialized attacks against specific targets or
small groups of targets to collect information or gain access to systems. For
example, a cybercriminal may launch a spear phishing attack against a business
to gain credentials to access a list of customers. From that attack, they may
launch a phishing attack against the customers of the business. Since they have
gained access to the network, the email they send may look even more authentic
and because the recipient is already customer of the business, the email may
more easily make it through filters and the recipient maybe more likely to open
the email.

The cybercriminal can use even more devious social engineering efforts such as
indicating there is an important technical update or new lower pricing to lure
people.

SPAM & PHISHING ON SOCIAL NETWORKS

Spam, phishing and other scams aren’t limited to just email. They’re also
prevalent on social networking sites. The same rules apply on social networks:
When in doubt, throw it out. This rule applies to links in online ads, status
updates, tweets and other posts. Here are ways to report spam and phishing on
major social networks:

 * Reporting spam and phishing on Facebook
 * Reporting spam on Twitter
 * Reporting spam and phishing on YouTube

TIPS FOR AVOIDING BEING A VICTIM

DON’T REVEAL PERSONAL OR FINANCIAL INFORMATION IN AN EMAIL, AND DO NOT RESPOND
TO EMAIL SOLICITATIONS FOR THIS INFORMATION. THIS INCLUDES FOLLOWING LINKS SENT
IN EMAIL.

BEFORE SENDING OR ENTERING SENSITIVE INFORMATION ONLINE, CHECK THE SECURITY OF
THE WEBSITE.

PAY ATTENTION TO THE WEBSITE’S URL

Malicious websites may look identical to a legitimate site, but the URL may use
a variation in spelling or a different domain (e.g., .com versus .net).

IF YOU ARE UNSURE WHETHER AN EMAIL REQUEST IS LEGITIMATE, TRY TO VERIFY IT BY
CONTACTING THE COMPANY DIRECTLY.

Contact the company using information provided on an account statement, not
information provided in an email. Check out the Anti-Phishing Working
Group (APWG) to learn about known phishing attacks and/or report phishing.

KEEP A CLEAN MACHINE.

Keep all software on internet-connected devices – including PCs, smartphones and
tablets – up to date to reduce risk of infection from malware.

WHAT TO DO IF YOU ARE A VICTIM

Report it to the appropriate people within the organization, including network
administrators. They can be alert for any suspicious or unusual activity.

If you believe your financial accounts may be compromised, contact your
financial institution immediately and close the account(s).

Watch for any unauthorized charges to your account.

Consider reporting the attack to your local police department, and file a report
with the Federal Trade Commission or the Internet Crime Complaint Center.

PROTECT YOURSELF WITH THESE TIPS

WHEN IN DOUBT, THROW IT OUT

Links in email, tweets, posts and online advertising are often how
cybercriminals try to compromise your information. If it looks suspicious, even
if you know the source, it’s best to delete or – if appropriate – mark it as
junk.

THINK BEFORE YOU ACT

Be wary of communications that implores you to act immediately, offers something
that sounds too good to be true or asks for personal information.

MAKE YOUR PASSPHRASE A SENTENCE

A strong passphrase is a sentence that is at least 12 characters long. Focus on
positive sentences or phrases that you like to think about and are easy to
remember (for example, “I love country music.”). On many sites, you can even use
spaces!

UNIQUE ACCOUNT, UNIQUE PASSPHRASE

Having separate passphrases for every account helps to thwart cybercriminals. At
a minimum, separate your work and personal accounts and make sure that your
critical accounts have the strongest passphrases.

LOCK DOWN YOUR LOGIN

Fortify your online accounts by enabling the strongest authentication tools
available, such as biometrics, security keys or a unique one-time code through
an app on your mobile device. Your usernames and passphrases are not enough to
protect key accounts like email, banking and social media.

ADDITIONAL RESOURCES

 * Anti-Phishing Working Group
 * OnGuardOnline
 * United States Computer Emergency Readiness Team (US-CERT)

 
Share Post


POST NAVIGATION

Previous

MANAGE YOUR PRIVACY SETTINGS

May 26, 2022
Next

ONLINE SHOPPING

May 26, 2022


POST NAVIGATION

Previous

MANAGE YOUR PRIVACY SETTINGS

May 26, 2022
Next

ONLINE SHOPPING

May 26, 2022

WANT MORE WAYS TO GET INVOLVED?

SIGN UP TO STAY CONNECTED WITH THE LATEST NCA EVENTS + PROGRAMS.



Empowering a more secure, interconnected world.
 * Resources + Guides
   * Career + Education
   * Online Safety + Privacy Basics
   * Theft, Fraud + Cybercrime
   * Cybersecurity for Business

 * Events + Programs
   * Upcoming Events
   * Program Specific

 * About Us
   * Board of Directors
   * Careers
   * News + Press

 * Sponsorship Opportunities

 * Contact Us





Copyright © 2022. Stay Safe Online – NCA. All Rights Reserved.      |      1875
K Street NW, Washington, DC 20006

NCA STORE




SIGN UP TO OUR NEWSLETTER

Be the first to know the latest updates

[yikes-mailchimp form="1"]

Our site uses cookies. Learn more about our use of cookies: cookie policy ACCEPT
REJECT
Privacy & Cookies Policy
Close

PRIVACY OVERVIEW

This website uses cookies to improve your experience while you navigate through
the website. Out of these cookies, the cookies that are categorized as necessary
are stored on your browser as they are essential for the working of basic
functionalities...

SAVE & ACCEPT