Scams – Spam, Phishing, Spoofing and Pharming | Be in Charge of Your Digital Life | Cybersecurity Awareness Program: Lubbock (2024)

Cyber criminals exploit people and steal confidential and sensitive information through various email-based strategies. Beware of the following:

Spam is unsolicited email, instant messages, or social media messages. These messages are fairly easy to spot and can be damaging if you open or respond.

Phishing is an email sent from an Internet criminal disguised as an email from a legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or confidential information.

Spear Phishing occurs when criminals obtain information about you from websites or social networking sites, and customize a phishing scheme to you.

Spoofing describes a criminal who impersonates another individual or organization, with the intent to gather personal or business information.

Pharming is a malicious website that resembles a legitimate website, used to gather usernames and passwords.

Clues to help you recognize a phishing scam

  • Requests for your username and/or password – credible institutions and organizations will not request personal information via email
  • Time sensitive threats (e.g., your account will be closed if you do not respond immediately)
  • Spelling and grammar mistakes
  • Vague or missing information in the “from” field or email signature
  • “To” field contains multiple random email address or is alphabetized
  • Impersonal or awkward greetings, such as “Dear Mr. account holder”
  • Unexpected files or downloads
  • Links that don't refer to the sender or sender's organization
  • Emails about accounts that you don't have, such as eBay or PayPal, or banksthat you don't have accounts with
  • Emails “from” celebrities
  • Asks you to reply in order to “opt out” of a service or
  • Plays on human emotions to evoke sympathy, kindness, fear, worry, anxiety, or excitement
Scams – Spam, Phishing, Spoofing and Pharming | Be in Charge of Your Digital Life | Cybersecurity Awareness Program: Lubbock (2024)

FAQs

What is spoofing, phishing, and pharming? ›

Spoofing describes a criminal who impersonates another individual or organization, with the intent to gather personal or business information. Pharming is a malicious website that resembles a legitimate website, used to gather usernames and passwords.

What will a scammer ask you to do in a phishing attack? ›

Phishing websites can then implore visitors to enter their payment information, home address, or login credentials — all information that could potentially needle your identity. If this happens, immediately call your credit card issuer or bank and report the scam to the Federal Trade Commission (FTC).

What are phishing questions and answers? ›

What Is Phishing? Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victim's machine.

What do I do if I get scammed by phishing? ›

You Think You've Been Scammed. Now What?
  1. STOP CONTACT WITH THE SCAMMER. Hang up the phone. ...
  2. SECURE YOUR FINANCES.
  3. CHECK YOUR COMPUTER. ...
  4. CHANGE YOUR ACCOUNT PASSWORDS. ...
  5. REPORT THE SCAM.

Can I stop my email from being spoofed? ›

As an ordinary user, you can stop email spoofing by choosing a secure email provider and practicing good cybersecurity hygiene: Use throwaway accounts when registering in sites. That way, your private email address won't appear in shady lists used for sending spoofed email messages in bulk.

What is an example of spoofing? ›

As an example of email spoofing, an attacker might create an email that looks like it comes from PayPal. The message tells the user that their account will be suspended if they don't click a link, authenticate into the site, and change the account's password.

What information does a scammer need to access my bank account? ›

The easiest way to become a victim of a bank scam is to share your banking info — e.g., account numbers, PIN codes, social security number — with someone you don't know well and trust. If someone asks for sensitive banking details, proceed with caution.

How does the FBI contact you? ›

If they wanted to contact you, they would likely stop by and talk to you or call you and ask you to come to the FBI office near where you live. If there is a name of the Agent in the email, you can call your local FBI office and ask them to check to see if the person is a real FBI Agent.

What to do if a scammer has your phone number and address? ›

What To Do If Scammers Have Your Phone Number
  1. Contact your mobile carrier.
  2. Lock your SIM card.
  3. Ignore one-ring phone scams.
  4. Never click on links in text messages from unknown senders.
  5. Use strong passwords and 2FA.
  6. Block scam calls on your phone.
  7. Remove your phone number from data broker lists.

What is the difference between phishing and spoofing? ›

Differences Between Spoofing and Phishing

Purpose: The goal of spoofing is to impersonate someone's identity while the purpose of phishing attacks is to steal information. Nature: Spoofing is not considered fraud because the victim's email address or phone number are not stolen but rather imitated.

Can phishing be done by phone? ›

And because telephone calls are still considered a secure form of communication, voice phishing scams take advantage of consumers' trust to steal money and personal information. In voice phishing—or “vishing”—scams, callers impersonate legitimate companies to steal money and personal and financial information.

What is a common example of a phishing attempt? ›

1. The fake invoice scam. Let's start with arguably the most popular phishing template out there - the fake invoice technique. Like many phishing attacks, this scam relies on fear and urgency, pressuring an end user to submit a payment for goods or services they've never even ordered or received.

Will my bank refund me if I get scammed? ›

Most banks should reimburse you if you've transferred money to someone because of a scam.

How do I know if I was phished? ›

Here are some ways to recognize a phishing email: Urgent call to action or threats - Be suspicious of emails and Teams messages that claim you must click, call, or open an attachment immediately. Often, they'll claim you have to act now to claim a reward or avoid a penalty.

How to track down someone who scammed you? ›

Tracing a scammer demands persistence, leveraging online resources, and often legal assistance. Initiating with digital footprints like email addresses or phone numbers, employing reverse search tools, and reporting to authorities can unearth valuable leads.

What is the difference between spoofing and phishing? ›

Differences Between Spoofing and Phishing

Purpose: The goal of spoofing is to impersonate someone's identity while the purpose of phishing attacks is to steal information. Nature: Spoofing is not considered fraud because the victim's email address or phone number are not stolen but rather imitated.

What is an example of phishing and pharming? ›

A simple example of phishing is bank fraud, where hackers tried to get your bank details through communication by acting as an employee of the bank which is a fraud manner. Pharming: Pharming is a more advanced technique to get users' credentials by making effort to enter users into the website.

What is the difference between phishing and spoofing in computer? ›

The main difference between Spoofing and Phishing is that in Spoofing, a hacker tries to grab the original identity of a genuine user, while in Phishing, hackers design a plot to reveal some sensitive data of the user.

What is meant by pharming? ›

Pharming is online fraud that involves the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data. Pharming is a two-step process that begins with an attacker installing malicious code on a victim's computer or server.

Top Articles
Latest Posts
Article information

Author: Annamae Dooley

Last Updated:

Views: 5563

Rating: 4.4 / 5 (65 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Annamae Dooley

Birthday: 2001-07-26

Address: 9687 Tambra Meadow, Bradleyhaven, TN 53219

Phone: +9316045904039

Job: Future Coordinator

Hobby: Archery, Couponing, Poi, Kite flying, Knitting, Rappelling, Baseball

Introduction: My name is Annamae Dooley, I am a witty, quaint, lovely, clever, rich, sparkling, powerful person who loves writing and wants to share my knowledge and understanding with you.