Curipod placeholder

Am I being phished?

Profile picture of thomasm


Updated 3 months ago

1. Slide
60 seconds
Phishing is a type of cyber-attack used to get your personal information, such as passwords, credit card numbers, etc. Scammers may pose as a legitimate company or send malicious emails that will take you to a fake website. Be wary of emails that ask for personal information, contain links, or offer deals that seem too good to be true.
What is Phishing?
2. Slide
60 seconds
Most phishing attacks are sent by email, but some use other methods such as SMS messages or phone calls. Phishing emails often use urgency and fear tactics to try to get victims to respond quickly and without thinking. Phishing emails often contain typos and poor grammar, and the sender’s address may look suspicious.
Did you know?
3. Slide
60 seconds
Phishing: An attempt by a malicious actor to acquire sensitive information such as usernames, passwords, and credit card details by disguising as a trustworthy entity in an electronic communication. Social Engineering: An attack vector that relies on human interaction and often involves manipulating people into performing actions or divulging confidential information. Phishing Emails: An email that appears to be from a legitimate organization but is actually from a malicious actor who is trying to acquire sensitive information such as usernames, passwords, and credit card details.
4. Open question
180 seconds
Work together in pairs: What tips or strategies can you use to identify if an email or online request is a phishing scam?
5. Personalised Feedback
360 seconds
What are some warning signs that indicate you might be falling victim to a phishing attempt?
6. Poll
60 seconds
Which of the following is NOT a common phishing technique?
  • Email spoofing
  • Phishing by phone call
  • Social media scams
7. Poll
60 seconds
What should you do if you receive an email asking for your personal information?
  • Delete it without responding
  • Click on any links in the email
  • Reply with your information
8. Poll
60 seconds
Which of the following is a red flag that indicates a possible phishing attempt?
  • A sense of urgency or threat in the message
  • The use of official logos and branding
  • Poor grammar or spelling errors in the email
9. Poll
60 seconds
What should you do if you receive an unsolicited phone call asking for sensitive information?
  • Hang up and call back using a trusted number to verify their identity
  • Provide them with the requested information immediately
  • Ask for their name and address to report them later
10. Poll
60 seconds
Which of these actions can help protect against phishing attacks?
  • Regularly updating passwords
  • Sharing personal information on social media with friends
  • Clicking on links from unknown senders without verifying their legitimacy
11. Word cloud
120 seconds
What is the definition of phishing?
12. Open question
210 seconds
Now it's your turn
Find five phishing attacks that have happened in Texas. Briefly summarize the articles and answer the following questions. Which type of phishing scam was attempted in these stories? What could these people have done differently and save themselves from a phishing attack? Do these stories have anything in common?

Suggested content