These tips help you identify dangerous emails
Many internet users have been victims of a so-called phishing email, some fake emails are easier to identify than others. The aim of emails is always to get valuable data from the recipient. Such as credit card data, access data for online banking but also passwords for other accounts such as Amazon, PayPal, Ebay and Co. With the personal access, the fraudsters clear away entire accounts or order expensive goods to wrong addresses. At the moment, more and more fraudulent emails are landing in the mailboxes of thousands of people. We show how you can recognize dangerous virtual mail.
The phishing emails often look deceptively real. The company logo of well-known corporations, online shops, banks and credit institutions can be seen, even the sender of the email looks serious at first glance and includes the name of the company. Nevertheless, there are seven striking features that can quickly identify phishing emails as such:
1. Grammar and spelling mistakes:
Phishing emails are very often written in incorrect German. These range from minor comma errors to completely incomprehensible texts. Foreign fraudsters don't put much effort into translating their texts, they work with simple online translators. Missing umlauts or Cyrillic characters are another indication of a fake email.
2. Mails in foreign language:
Phishing emails that are written in another national language are easy to identify. Your bank would never think of sending you an urgent email in French.
3. Missing title:
If you receive a suspicious email and the title does not contain your personal name, it is very often a fake email. "Dear customer" or "Dear user" are very impersonal and indicate that the senders do not even know you. Conversely, the following applies: Your name can also appear in a phishing email! Despite your name, an email is not always trustworthy.
4. Urgent action:
In the typical phishing emails, those affected are asked to take action within a short period of time. About logging in with his data under a certain link within three hours. This requirement is usually associated with a consequence if you do not follow it up - for example, blocking the bank account, credit card, customer account, etc. You should never click on the link provided, because at this moment a virus can already be found be installed on your computer, which can intercept your data even after the mail has been deleted.
Never open attachments from unknown senders!
5. Entering personal data:
If you are asked to log on to a page using a PIN or TAN, this is a sign of a phishing email. You would never ask reputable senders because such entries are only ever entered on encrypted websites. Nobody but you should know your passwords and TAN numbers.
6. Prompt to open an attachment:
A very popular scam for online fraudsters is sending a supposed invoice or reminder attached to the email. As soon as you click on the attachment, a file will open, but it will install a virus on your computer without being noticed. Even the entire remote control and real-time monitoring of your PC are then possible. An easy game for the fraudsters.
7. You don't have an account with the provider:
This is an easy game for you, because if you are not a customer of the supposed sender of the email, you can immediately put the email in the trash. The problem: Most people now have an Amazon, Ebay or PayPal account. Therefore, the fraudsters always use shops or banks that are used by many people worldwide.
- 0 Users Found This Useful
Why have my services been blocked / suspended?
If one or more of your services is blocked by our support team, you will receive a...Can I host more than one website per account?
Yes. With ORC Webhosting you have the possibility to host several websites on one ACCOUNT for...Was ist eine Uptime-Garantie?
Uptime ist ein englischer Ausdruck für die Zeit, in der ein System läuft und...How do I choose the right domain name?
10 tips for the right domain name Finding a domain name is not easy. People like to be...Was sind Domain-Namen?
Eine Domain ist ein zusammenhängender Teilbereich des hierarchischen Domain Name System (DNS). Im...