Phishing is a type of cyber-attack used to get your personal information, such as passwords, credit card numbers, etc. Scammers may pose as a legitimate company or send malicious emails that will take you to a fake website. Be wary of emails that ask for personal information, contain links, or offer deals that seem too good to be true.
What is Phishing?
Most phishing attacks are sent by email, but some use other methods such as SMS messages or phone calls. Phishing emails often use urgency and fear tactics to try to get victims to respond quickly and without thinking. Phishing emails often contain typos and poor grammar, and the sender’s address may look suspicious.
Did you know?
Phishing: An attempt by a malicious actor to acquire sensitive information such as usernames, passwords, and credit card details by disguising as a trustworthy entity in an electronic communication. Social Engineering: An attack vector that relies on human interaction and often involves manipulating people into performing actions or divulging confidential information. Phishing Emails: An email that appears to be from a legitimate organization but is actually from a malicious actor who is trying to acquire sensitive information such as usernames, passwords, and credit card details.
Concepts:
Work together in pairs: What tips or strategies can you use to identify if an email or online request is a phishing scam?
What are some warning signs that indicate you might be falling victim to a phishing attempt?
Which of the following is NOT a common phishing technique?
- Email spoofing
- Phishing by phone call
- Social media scams
What should you do if you receive an email asking for your personal information?
- Delete it without responding
- Click on any links in the email
- Reply with your information
Which of the following is a red flag that indicates a possible phishing attempt?
- A sense of urgency or threat in the message
- The use of official logos and branding
- Poor grammar or spelling errors in the email
What should you do if you receive an unsolicited phone call asking for sensitive information?
- Hang up and call back using a trusted number to verify their identity
- Provide them with the requested information immediately
- Ask for their name and address to report them later
Which of these actions can help protect against phishing attacks?
- Regularly updating passwords
- Sharing personal information on social media with friends
- Clicking on links from unknown senders without verifying their legitimacy
What is the definition of phishing?
Now it's your turn
Find five phishing attacks that have happened in Texas. Briefly summarize the articles and answer the following questions. Which type of phishing scam was attempted in these stories? What could these people have done differently and save themselves from a phishing attack? Do these stories have anything in common?