|
Scammers use email and text messages to try to steal your passwords, account numbers, or Social Security number. If they get that information, they could access your email, bank, or other accounts. Or they could sell your information to other scammers. Scammers launch thousands of phishing attacks like these every day, and they're often successful.
Scammers often update their tactics to keep up with the latest news or trends, but there are some common tactics used in phishing emails and text messages:
Emails and text messages often tell a story to trick you into clicking on a link or opening an attachment. You might receive an unexpected email or text message that appears to be from a company you know or trust, such as a bank, credit card company, or utility company. Or it might be from an online payment website or app. It could be a message from a scammer who might:
The email has a generic greeting.
The email says your account is suspended because there is a billing issue.
The email invites you to click on a link to update your payment details.
While authentic companies may contact you via email, legitimate Cell Phone Number Database companies won't send you an email or text message with a link to update your payment information. Phishing emails can often have real consequences for people who give their information to scammers, including identity theft. And they could damage the reputation of the companies they're imitating.
How to protect yourself from phishing attacks
Your email account's spam filters may prevent many phishing emails from reaching your inbox. But scammers are always trying to evade spam filters, so it can be helpful to add some additional protections. Here are four ways to protect yourself from phishing attacks.
Four ways to protect yourself from phishing attacks.
1. Protect your computer using a security program . Set the program to update automatically so it can deal with any new security threats.
2. Protect your cell phone by setting up automatic software updates. These updates could offer you crucial protection against security threats.
3. Protect your accounts by using a multi-factor authentication system. Some accounts offer a higher level of security because you have to enter two or more credentials to log in to your account. This is called multi-factor authentication. The additional credentials you need to log in to your account fall into three categories:
Any information you know, such as a passcode, PIN, or the answer to a security question.
Any data you have, such as a one-time passcode you receive via text message, email, authenticator app, or security key.
Some personal identification data, such as a scan of your fingerprint, retina or face.
Multi-factor authentication makes it harder for scammers who have your username and password to access your accounts.
4. Protect your data by backing up. Back up your computer data to an external drive or device or to the cloud. Also back up your phone data.
What to do if you suspect a phishing attack
If you receive an email or text message asking you to click a link or open an attachment, answer this question:
Do I have an account with that company or do I know the person who contacted me?
If the answer is “no,” it could be a phishing scam. Review the tips in “ How to recognize phishing ” again and look for signs of a phishing scam. If you find them, report the message and then delete it.
If the answer is “yes,” contact the company by calling a phone number or website you know is authentic— do not use the information in the email. Attachments and links can install malware .
What to do if you responded to a phishing email
If you think a scammer has your information, such as your Social Security number, credit card, or bank account number, go to IdentityTheft.gov . There you can find specific steps to take based on the type of information you lost.
If you think you clicked on a link or opened an attachment that downloaded a harmful program, update your computer's security program . Then run a scan and remove anything the program identifies as a problem.
|
|