Phishing Attacks: Common Ones to Watch Out For

In 2017, phishing attacks rose by 59%. As cybercriminals keep using more ingenious methods, it can be difficult to tell what’s real and what’s not. With the number of attacks rising every day, you need to take precautions and use phishing prevention methods to better safeguard your credentials.

To help you out, here are some common phishing attacks to look out for whenever you’re on the internet.

Nigerian prince scams

This is one of the original phishing scams and goes back decades. Although there are several variations on this scam, the main point is to trick people into paying advanced fees. The sender will claim to have a significant amount of cash tied up that only you can help with. If you help them out, they’ll split part of the money with you after they get access to it.

As you can guess, you’ll never see the money, and they’ll walk away with your bank account information.

MORE : Example of Spear Phishing

Deactivation scams

Cybercriminals will scare you into taking action with deactivation scams. Usually, the emails say your account will be deactivated if you don’t log in within a certain time period.

In the moment, victims panic, click on the malicious link in the email then enter their login details on the spoofed site. Their credentials are then delivered straight to the scammers.

MORE : Learn About Spear Phishing vs Phishing

“Friend in need” scams

This one also plays on a sense of urgency to get you to act. What the cybercriminals do is spoof your friend’s email address. They’ll claim to be your friend in a foreign country, stuck in horrible circumstances. Then, they’ll ask for money to alleviate the situation.

People don’t want to turn away friends in need, this phishing attack has a high success rate.

MORE : Prevent Spear Phishing

Tech support scams

In a tech support scam, the scammer will either call or email you, saying there’s been a breach in your computer’s security. They will pose as IT and ask to install remote access software so they can help you out.

Once you’ve installed it, they’ll pretend to find problems that are only fixable with the software they have. Since you’ll have to pay for it, they’ll get your credit card information.

MORE : How Does Phishing Work??

Don’t fall for phishing attacks

Although these are some of the more common spear phishing attacks, there are plenty more lurking out there. Hence it is essential to know how to protect from phishing as well as how to identify a phishing email. Always be wary when you’re online and be sure to report and block anything that seems suspicious. Follow phishing prevention best practices to keep your data safe.

MORE : Difference Between Phishing and Spear Phishing

Enterprise-class features without the enterprise price

For one low monthly price and no per-user fees, Phish Protection’s integrated solution protects your employees from malicious email. 24x7. On any device. With features you’d expect from more expensive solutions:

All Plans Come With

  • Stop threatening emails before they reach your inbox
  • Continuous link checking
  • Real-time website scanning
  • Real time alerts to users and administrators
  • Check 6 URL reputation databases
  • Protection with settings you control
  • Protection against zero day vulnerabilities
  • Complete situational awareness from a single web-based console

Phish Protection is Used by Over 1000 Businesses Worldwide

A complete suite of enterprise-class email security solutions

Fast, easy and affordable

No sales calls. No contracts. Up and running in ten minutes.

Get Free Access to Phishing Protection Best Practices

  • Learn why hosted solutions like Office 365 are vulnerable to phishing.
  • Discover why you must protect both your employees AND your customers.
  • Read why checking reputation databases once a day is a waste of time.
  • Learn what real-time website scanning should look for.
  • Get strategies for saving time and money on email protection.

Sign Up Below... and Get Instant Access to the Report