$57 million is lost every year in the US</a> due to phishing scams alone. Phishing is therefore among the top online threats.&nbsp;</p>\r\n<h2>What is Phishing?</h2>\r\n<p>It is a deceptive tactic used by scammers and hackers to gather your personal and financial information by mimicking a reputable company or person. It is commonly initiated through emails and text messages that contain links to malicious sites or have attachment files with hidden <a title=\"https://www.scamadviser.com/scam-reports/scam-trends/4188/malware-scams-beware-of-infected-files-links-and-email-attachments\" href=https://www.scamadviser.com/"scam-reports/scam-trends/4188/malware-scams-beware-of-infected-files-links-and-email-attachments/">malware. Once you click on them, your account information and login credentials are stolen.&nbsp;</p>\r\n<p>The scammers will then use your credentials to <a title=\"https://www.scamadviser.com/scam-reports/scam-trends/4051/buying-selling-social-media-accounts-an-open-secret\" href=https://www.scamadviser.com/"scam-reports/scam-trends/4051/buying-selling-social-media-accounts-an-open-secret/">misuse your accounts</a> or withdraw money from them. The goal of these scams ultimately is money obtained by the data stolen through Phishing.&nbsp;</p>\r\n<h2>Common Types of Phishing</h2>\r\n<p>Phishing is a broad term that encompasses a number of different attacks that scammers use to gain unauthorized access to accounts:</p>\r\n<ul>\r\n<li><strong>Spear Phishing</strong>: A highly targeted phishing attack that builds a fairly accurate social profile of the victim, then launches a personalized assault via email. Scammers may use your real name or job title to look legitimate and so avoid arousing suspicion. This way, you are highly likely to follow the links given and submit whatever credentials are asked.<br /><br /></li>\r\n<li><strong>Whale phishing:</strong> Targeting a &lsquo;whale&rsquo; is the idea here. The &lsquo;whale&rsquo; here is a CEO or a top executive with high access/clearance in a company.&nbsp; Once compromised, the whole organization can be defrauded. A CEO may have access to some business bank accounts and the credentials for accessing them may be found in his emails or computer folders.<br /><br /></li>\r\n<li><strong>Pharm Phishing:</strong> This attack is aimed at strategic Domain Name Server (DNS) which once compromised, can be made to re-route all connections of a particular kind to the scammer&rsquo;s phishing website. Therefore, a high number of potential victims can be deceptively redirected to a malicious page.<br /><br /></li>\r\n<li><strong>Voice Phishing/Vishing:</strong> Here scammers record and mimic the voices of their target victim then use them to gain access to their sensitive data through scam calls.<br /><br /></li>\r\n<li><strong>SMS Phishing/Smishing:</strong> This is a phishing tactic that&rsquo;s initiated through SMS. The scammers send you a clickable link via SMS that leads to a phishing website.&nbsp;</li>\r\n</ul>\r\n<h2>5 Common Signs of a Phishing Scam</h2>\r\n<ul>\r\n<li><strong>Mis-spelt or oddly worded URLs</strong> that mimic big brands and companies like Paypal, Amazon, Apple, Netflix, Walmart. Such URLs characteristically deviate from the conventional.<br /><br /></li>\r\n<li><strong>Corporate messages that originate from free email accounts,</strong> for example, an email pretending to be from PayPal email that was sent from a free Gmail account. Authentic emails will originate from the website&rsquo;s own domain, such as &lsquo;[username]@paypal.com&rsquo;<br /><br /></li>\r\n<li><strong>A sense of urgency and fear</strong> to get you to click on a provided link that is already booby-trapped with malware.<br /><br /></li>\r\n<li><strong>Unprompted requests to confirm your email or password</strong>. Whenever you get any such email without actually trying to log in, you are being targeted for a phishing scam.<br /><br /></li>\r\n<li><strong>Promotional/Marketing email with an enticing message</strong> to get you to click on a link or open an attachment. Usually, there is the promise of free stuff, discounts, free coupons, or even money.&nbsp;</li>\r\n</ul>\r\n<h2>Examples of Phishing Emails and Text Messages</h2>\r\n<p>Scammers do their research well. Their messages are designed to make you act on the information they feed you. Issues to do with an online account are the most common as we see here below:&nbsp;</p>\r\n<ol>\r\n<li><strong>Your Account has been hacked</strong> - Follow this link to secure your account data.&nbsp;<br /><br /></li>\r\n<li>You need to <strong>Reset your password</strong> or restore your account.</li>\r\n</ol>"}},{"_template":"Articles\\ImageHalf","_identifier":"block-39346","data":{"imageLeft":"https://whitelabel-manager-production.ams3.digitaloceanspaces.com/thumbs/netfl1-42522.jpg_900x.jpg","imageRight":null}},{"_template":"Articles\\Text","_identifier":"block-39349","data":{"text":"<p>3. <strong>Payment Request</strong>, claim a refund/reimbursement</p>"}},{"_template":"Articles\\ImageHalf","_identifier":"block-39361","data":{"imageLeft":"https://whitelabel-manager-production.ams3.digitaloceanspaces.com/thumbs/netfl2-2a60a.png_900x.png","imageRight":null}},{"_template":"Articles\\Text","_identifier":"block-39364","data":{"text":"<p>4. <strong>Charity</strong> donation.&nbsp;</p>\r\n<p>&nbsp;</p>\r\n<h2>How to Protect Yourself From Phishing Emails and Texts</h2>\r\n<ol>\r\n<li><strong>Do not click on links</strong> in any suspicious email or download attachments regardless of the reason given.&nbsp;<br /><br /></li>\r\n<li><strong>Install reliable antivirus protection</strong> with malware detection. Go for one with web browser integration to flag new and upcoming phishing sites.&nbsp;<br /><br /></li>\r\n<li><strong>Set up and use your PC firewall security</strong>. Do the same for your home and work network.&nbsp;<br /><br /></li>\r\n<li><strong>Make use of the SPAM button in your email application.</strong> Mark as spam all emails that have the signs of phishing shown above.&nbsp;<br /><br /></li>\r\n<li><strong>Never follow links in emails to payment sites</strong> or your bank account. Instead, navigate manually on your web browser. Phishing sites mimic the real site to get you to give your login credentials.&nbsp;<br /><br /></li>\r\n<li><strong>Check a website's Trust Score </strong>on <a href=https://www.scamadviser.com/"ScamAdviser.com/">ScamAdviser.com&nbsp;before you buy.</li>\r\n</ol>"}}],"sidebarBlocks":[{"_template":"Small\\Content\\Cta","_identifier":"block-157084","data":{"title":"Report a Scam!","consumer":null,"description":"Have you fallen for a hoax, bought a fake product? Report the site and warn others!","image":"https://files.scamadviser.com/thumbs/tell-your-story-8910e.png_200x200.png","button":"Report a Scam!","link":"https://www.scamadviser.com/leave-review"}},{"_template":"Small\\Content\\Taxonomy","_identifier":"block-157123","data":{"title":"Scam Categories","taxonomies":[{"id":7,"name":"Scam Alerts (1025)","url":"https://www.scamadviser.com/articles/scam-alerts"},{"id":6,"name":"Scam Trends (372)","url":"https://www.scamadviser.com/articles/scam-trends"},{"id":8,"name":"Global Scam Country Guide (44)","url":"https://www.scamadviser.com/articles/global-scam-country-guide"},{"id":87,"name":"Product Reviews (43)","url":"https://www.scamadviser.com/articles/product-reviews"},{"id":88,"name":"Fact Check (43)","url":"https://www.scamadviser.com/articles/fact-check"},{"id":3,"name":"News about Scamadviser (42)","url":"https://www.scamadviser.com/articles/news-about-scamadviser"},{"id":5,"name":"Reliable Sites (37)","url":"https://www.scamadviser.com/articles/reliable-sites"},{"id":1,"name":"Tips & Support (32)","url":"https://www.scamadviser.com/articles/tips-support"},{"id":2,"name":"Research & Reports (26)","url":"https://www.scamadviser.com/articles/research-reports"},{"id":4,"name":"Advice for Companies (2)","url":"https://www.scamadviser.com/articles/advice-for-companies"}]}},{"_template":"Default\\Content\\Heading","_identifier":"block-59407","data":{"align":"left","text":"Help & Info","size":"large"}},{"_template":"Default\\Content\\Articles","_identifier":"block-157795","data":{"articles":[{"_template":"Home\\Articles","_identifier":"block-157824","data":{"title":"Scam Alerts","link":"https://www.scamadviser.com/articles/scam-alerts","icon":"fa-exclamation-triangle","bgImage":"https://files.scamadviser.com/uploads/img-scam-alert-f348b.svg"}},{"_template":"Home\\Articles","_identifier":"block-157839","data":{"title":"Learn Scams","link":"https://www.scamadviser.com/articles/scam-trends","icon":"fa-tags","bgImage":"https://files.scamadviser.com/uploads/img-learn-scam-737a6.svg"}},{"_template":"Home\\Articles","_identifier":"block-157854","data":{"title":"Reliable Sites","link":"https://www.scamadviser.com/articles/reliable-sites","icon":"fa-check-circle","bgImage":"https://files.scamadviser.com/uploads/img-website-213fb.svg"}},{"_template":"Home\\Articles","_identifier":"block-157869","data":{"title":"Advices","link":"https://www.scamadviser.com/articles/advice-for-companies","icon":"fa-comment","bgImage":"https://files.scamadviser.com/uploads/img-advice-f32d8.svg"}},{"_template":"Home\\Articles","_identifier":"block-157884","data":{"title":"Studies","link":"https://www.scamadviser.com/articles/research-reports","icon":"fa-search","bgImage":"https://files.scamadviser.com/uploads/img-report-ebc61.svg"}},{"_template":"Home\\Articles","_identifier":"block-161131","data":{"title":"Global Scams","link":"https://www.scamadviser.com/global-scam-country-guide","icon":"fa-globe","bgImage":"https://files.scamadviser.com/uploads/img-global-scam-005ad.svg"}}],"buttonText":"See all","buttonLink":"https://www.scamadviser.com/help-info"}},{"_template":"Default\\Content\\Heading","_identifier":"block-167997","data":{"align":"left","text":"Top Safety Picks","size":"large"}},{"_template":"Default\\Content\\Lists","_identifier":"block-167811","data":{"heading":"Your Go-To Tools for Online Safety","hint":"Disclaimer: Some of the links here are affiliate links. If you click them and make a purchase, we may earn a commission at no extra cost to you.","description":null,"listItems":[{"_template":"Default\\Items\\ListItem","_identifier":"block-167891","data":{"title":"ScamAdviser App - iOS","titleUrl":"https://apps.apple.com/us/app/scamadviser/id6480509109","linkTarget":"1","text":"Your personal scam detector, on the go! Check website safety, report scams, and get instant alerts. Available on iOS"}},{"_template":"Default\\Items\\ListItem","_identifier":"block-167944","data":{"title":"ScamAdviser App - Android","titleUrl":"https://play.google.com/store/apps/details?id=com.tech.scamadviser","linkTarget":"1","text":"Your personal scam detector, on the go! Check website safety, report scams, and get instant alerts. Available on Android."}},{"_template":"Default\\Items\\ListItem","_identifier":"block-169734","data":{"title":"NordVPN","titleUrl":"http://www.jdoqocy.com/click-101566658-13382109","linkTarget":"1","text":"NordVPN keeps your connection private and secure whether you are at home, traveling, or streaming from another country. It protects your data, blocks unwanted ads and trackers, and helps you access your paid subscriptions anywhere. Try it Today!"}},{"_template":"Default\\Items\\ListItem","_identifier":"block-171573","data":{"title":"Incogni","titleUrl":"http://www.jdoqocy.com/click-101566658-15718702","linkTarget":"1","text":"Incogni automatically removes your personal data from data brokers that trade in personal information online, helping reduce scam and identity theft risks without the hassle of manual opt-outs. Reclaim your privacy now!"}}]}},{"_template":"Default\\Content\\Heading","_identifier":"block-59517","data":{"align":"left","text":"Popular Stories","size":"large"}},{"_template":"Default\\Content\\Blogs","_identifier":"block-59530","data":{"items":[{"id":1406,"title":"7 Best VPN Services for Security, Speed, and Privacy","url":"https://www.scamadviser.com/articles/7-best-vpn-services-for-security-speed-and-privacy","excerpt":"In a nutshell: A good VPN protects your privacy with strong encryption, a strict no-logs policy, and fast protocols like WireGuard. The best VPNs also offer wide server coverage, leak protection, and easy-to-use apps for all devices. For 2025, the top providers are NordVPN, ExpressVPN, Surfshark, Proton VPN, Private Internet Access, CyberGhost, and Mullvad—each excelling in speed, security, or value.\r\n\r\nIn an age where every click is tracked, a Virtual Private Network (VPN) is no longer just a luxury—it's an essential tool for digital privacy and security. A VPN works by creating a secure, encrypted tunnel between your device and the internet, masking your real IP address and protecting your sensitive data from prying eyes.\r\nBut with hundreds of providers out there, how do you sort the secure from the suspect? This guide breaks down the non-negotiable features of a quality VPN and highlights the 7 top-rated services for 2025.\r\nWhat to Look for in a Good VPN: The 4 Non-Negotiable Pillars\r\n1. Ironclad Security Features\r\n\r\nStrong Encryption: AES-256, the gold standard.\r\nSecure Protocols: OpenVPN, WireGuard, NordLynx, Lightway. Avoid PPTP.\r\nKill Switch: Ensures no accidental IP leaks.\r\nLeak Protection: Covers DNS, IPv6, and WebRTC.\r\n\r\n2. Verified Privacy Practices\r\n\r\nNo-Logs Policy: No activity or metadata tracking.\r\nIndependent Audits: Verification by third parties.\r\nSafe Jurisdiction: Prefer countries outside the 5/9/14 Eyes alliances.\r\n\r\n3. High-Speed Performance\r\n\r\nFast Protocols: WireGuard and equivalents.\r\nLarge Server Network: Less crowding, more reliable speeds.\r\n\r\n4. Essential Usability Features\r\n\r\nMulti-Device Apps: Windows, Mac, iOS, Android, routers.\r\nSimultaneous Connections: One account, many devices.\r\nUnblocking Power: Netflix, Hulu, BBC ","buttonText":"Read more","renderAsInertiaLink":false},{"id":1475,"title":"Data Breach Victim? Your Emergency Action Plan Starts Now","url":"https://www.scamadviser.com/articles/data-breach-victim-your-emergency-action-plan-starts-now","excerpt":"How to Protect Yourself and Your Family After a Data Breach\r\nWhen Your Data Falls Into the Wrong Hands\r\nJust received that terrifying notification? Or perhaps you've noticed suspicious activity in your accounts? Take a deep breath. A data breach, the unauthorized access or exposure of sensitive, protected, or confidential data, is a deeply unsettling event. It can plunge you into a world of worry, bringing risks from financial losses and identity theft to significant emotional distress and reputational damage.\r\nThe numbers don't lie: according to a 2024 report, the number of data breach victim notices has grown by a staggering 211% year-over-year. This isn't just a distant threat; it's a stark reality many individuals face. This year alone, we've seen major organizations like Adidas and Qantas grapple with high-profile data breaches, affecting countless customers. This underscores a critical truth: nobody is untouchable. Subsequently, strategic action is the only way to minimize the risk and protect your future.\r\nThis guide is your emergency action plan, designed to walk you through every crucial step—from confirming the breach to fortifying your digital life for the long term.\r\nPart 1: Confirming the Breach and Understanding the Damage\r\nThe very first step is to answer the question definitively: Was my data compromised, and if so, how badly?\r\nStart with the basics:\r\n\r\nCheck Official NotificationsReputable companies are legally obligated to inform you if your data was part of a breach. Look for official emails, letters, or public announcements.\r\nCheck Verified Breach DatabasesPlatforms like HaveIBeenPwned help you see if","buttonText":"Read more","renderAsInertiaLink":false}]}}],"meta":{"title":"5 Signs Of Online Phishing Scams | ScamAdviser","description":"Unprompted emails and messages about your accounts could be traps to steal your information. Read about Phishing Scams and how to protect your data.","canonical":"https://www.scamadviser.com/articles/phishing-scams-watch-where-you-click","alternates":[{"language":"x-default","url":"https://www.scamadviser.com/articles/phishing-scams-watch-where-you-click"},{"language":"nl","url":"https://www.scamadviser.com/nl/articles/phishing-oplichting-kijk-uit-waar-je-klikt"},{"language":"pt","url":"https://www.scamadviser.com/pt/articles/phishing-scams-veja-onde-clica"},{"language":"es","url":"https://www.scamadviser.com/es/articles/estafas-de-phishing-cuidado-al-hacer-clic"},{"language":"de","url":"https://www.scamadviser.com/de/articles/phishing-betruegereien-passen-sie-auf-wo-sie-klicken"},{"language":"fr","url":"https://www.scamadviser.com/fr/articles/escroqueries-par-hameconnage-faites-attention-ou-vous-cliquez"},{"language":"it","url":"https://www.scamadviser.com/it/articles/truffe-di-phishing-attenti-a-dove-cliccate"},{"language":"uk","url":"https://www.scamadviser.com/uk/articles/fishynhovi-afery-dyvitsia-kudy-klatsayete"},{"language":"ro","url":"https://www.scamadviser.com/ro/articles/escrocherii-de-tip-phishing-aveti-grija-unde-faceti-clic"},{"language":"ru","url":"https://www.scamadviser.com/ru/articles/fishingovye-afery-sledite-za-tem-kuda-vy-nazhimaete"},{"language":"zh","url":"https://www.scamadviser.com/zh/articles/wang-luo-diao-yu-zha-pian-xiao-xin-dian-ji"},{"language":"tc","url":"https://www.scamadviser.com/tc/articles"},{"language":"ja","url":"https://www.scamadviser.com/jp/articles/huitsushinguzha-qi-kuritsukusuruchang-suo-nizhu-yi"}]},"language":"en","head":[],"pendingCookieConsent":false,"isHomePage":false,"navigation":{"items":{"data":[{"id":1082,"name":"Report a Scam","template_name":"report_a_scam","newwindow":false,"url":"https://www.scamadviser.com/report-a-scam"},{"id":1103,"name":"Scam IQ Test","template_name":"redirect","newwindow":true,"url":"https://digital-survival-challenge-beta.vercel.app/"},{"id":1100,"name":"Business","template_name":"redirect","newwindow":true,"url":"https://www.scamadviserbiz.com/"}]},"languages":{"current":"en","available":[{"label":"Deutsch","code":"de","url":"https://www.scamadviser.com/de/articles/phishing-betruegereien-passen-sie-auf-wo-sie-klicken"},{"label":"English","code":"en","url":"https://www.scamadviser.com/articles/phishing-scams-watch-where-you-click"},{"label":"Español","code":"es","url":"https://www.scamadviser.com/es/articles/estafas-de-phishing-cuidado-al-hacer-clic"},{"label":"Français","code":"fr","url":"https://www.scamadviser.com/fr/articles/escroqueries-par-hameconnage-faites-attention-ou-vous-cliquez"},{"label":"Italiano","code":"it","url":"https://www.scamadviser.com/it/articles/truffe-di-phishing-attenti-a-dove-cliccate"},{"label":"日本","code":"jp","url":"https://www.scamadviser.com/jp/articles/huitsushinguzha-qi-kuritsukusuruchang-suo-nizhu-yi"},{"label":"Nederlands","code":"nl","url":"https://www.scamadviser.com/nl/articles/phishing-oplichting-kijk-uit-waar-je-klikt"},{"label":"Português","code":"pt","url":"https://www.scamadviser.com/pt/articles/phishing-scams-veja-onde-clica"},{"label":"Romanian","code":"ro","url":"https://www.scamadviser.com/ro/articles/escrocherii-de-tip-phishing-aveti-grija-unde-faceti-clic"},{"label":"Russian","code":"ru","url":"https://www.scamadviser.com/ru/articles/fishingovye-afery-sledite-za-tem-kuda-vy-nazhimaete"},{"label":"繁体中文","code":"tc","url":"https://www.scamadviser.com/tc/articles"},{"label":"Ukrainian","code":"uk","url":"https://www.scamadviser.com/uk/articles/fishynhovi-afery-dyvitsia-kudy-klatsayete"},{"label":"简体中文","code":"zh","url":"https://www.scamadviser.com/zh/articles/wang-luo-diao-yu-zha-pian-xiao-xin-dian-ji"}]},"search":{"placeholders":{"website":"Enter any website, phone number, crypto address, IBAN number...","phone":"Search phone","crypto":"Search a cryptoaddress...","iban":"Search a IBAN address..."},"urls":{"website":"https://www.scamadviser.com/check-website","phone":"https://www.scamadviser.com/check-phone","crypto":"https://www.scamadviser.com/check-crypto","iban":"https://www.scamadviser.com/check-iban"}}},"footer":{"consumerSection":{"title":"For Consumers","items":{"data":[{"id":37,"name":"Report a Scam","template_name":"redirect","newwindow":false,"url":"https://www.scamadviser.com/leave-review"},{"id":1048,"name":"How to get your money back","template_name":"redirect","newwindow":false,"url":"https://www.scamadviser.com/how-to-get-your-money-back-from-a-scam"},{"id":1078,"name":"ScamAdviser App & Browser Extension","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/download-browser-extension-app"},{"id":1058,"name":"How to Recognize a Scam","template_name":"redirect","newwindow":false,"url":"https://www.scamadviser.com/how-to-recognize-a-scam"},{"id":1072,"name":"Check a site for me","template_name":"redirect","newwindow":false,"url":"https://www.scamadviser.com/check-a-site-for-me"}]}},"businessSection":{"title":"For Businesses","items":{"data":[{"id":1017,"name":"Claim your Website","template_name":"claim-website","newwindow":false,"url":"https://www.scamadviser.com/claim-your-site"},{"id":1085,"name":"API & Data Feed","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/scamadviser-api"},{"id":1025,"name":"Install Our Logo","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/install-our-logo"},{"id":1015,"name":"Become our Partner","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/become-a-partner"},{"id":1023,"name":"Advertise on ScamAdviser","template_name":"redirect","newwindow":false,"url":"https://www.scamadviser.com/advertise-on-scamadviser"}]}},"aboutUsSection":{"title":"About Scamadviser","items":{"data":[{"id":20,"name":"About Us","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/about-scamadviser"},{"id":14,"name":"FAQ","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/faq"},{"id":1012,"name":"In the Press","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/in-the-press"},{"id":13,"name":"Contact","template_name":"contact","newwindow":false,"url":"https://www.scamadviser.com/contact"}]}},"subFooter":{"items":{"data":[{"id":16,"name":"Privacy Policy","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/privacy-policy"},{"id":17,"name":"Terms & Conditions","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/terms-conditions"},{"id":1061,"name":"Imprint","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/imprint"},{"id":28,"name":"Disclaimer","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/disclaimer"},{"id":18,"name":"Content Guidelines","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/review-guidelines"},{"id":1039,"name":"Notice and Take Down","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/notice-and-take-down-procedure"},{"id":1040,"name":"Sitemap","template_name":"sitemap","newwindow":false,"url":"https://www.scamadviser.com/sitemap"},{"id":1016,"name":"Copyright","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/copyright-notice"}]}},"initiativeText":"ScamAdviser is a member of"},"socials":[{"url":"https://www.facebook.com/sadviser/","icon":"facebook-square"},{"url":"https://www.youtube.com/channel/UCERAPMuOxhqOg6WqIDR1G2w","icon":"youtube"},{"url":"https://twitter.com/scamadviser","icon":"twitter-square"},{"url":"https://www.linkedin.com/company/scamadviser","icon":"linkedin-square"},{"url":"https://t.me/scamadviser_scammybot","icon":"telegram"},{"url":"https://wa.me/31612902070","icon":"whatsapp"},{"url":"https://www.scamadviser.com/scammy-chatbot","icon":"university"}]},"url":"/articles/phishing-scams-watch-where-you-click","version":"b585c9c1f4996e80265fb32e550ca3c3","encryptHistory":false,"clearHistory":false}">

Phishing Scams: Watch Where You Click

Header

Author: Nichlaus O.

November 9, 2021

The Federal Bureau of Investigation (FBI) estimates that $57 million is lost every year in the US due to phishing scams alone. Phishing is therefore among the top online threats. 

What is Phishing?

It is a deceptive tactic used by scammers and hackers to gather your personal and financial information by mimicking a reputable company or person. It is commonly initiated through emails and text messages that contain links to malicious sites or have attachment files with hidden malware. Once you click on them, your account information and login credentials are stolen. 

The scammers will then use your credentials to misuse your accounts or withdraw money from them. The goal of these scams ultimately is money obtained by the data stolen through Phishing. 

Common Types of Phishing

Phishing is a broad term that encompasses a number of different attacks that scammers use to gain unauthorized access to accounts:

  • Spear Phishing: A highly targeted phishing attack that builds a fairly accurate social profile of the victim, then launches a personalized assault via email. Scammers may use your real name or job title to look legitimate and so avoid arousing suspicion. This way, you are highly likely to follow the links given and submit whatever credentials are asked.

  • Whale phishing: Targeting a ‘whale’ is the idea here. The ‘whale’ here is a CEO or a top executive with high access/clearance in a company.  Once compromised, the whole organization can be defrauded. A CEO may have access to some business bank accounts and the credentials for accessing them may be found in his emails or computer folders.

  • Pharm Phishing: This attack is aimed at strategic Domain Name Server (DNS) which once compromised, can be made to re-route all connections of a particular kind to the scammer’s phishing website. Therefore, a high number of potential victims can be deceptively redirected to a malicious page.

  • Voice Phishing/Vishing: Here scammers record and mimic the voices of their target victim then use them to gain access to their sensitive data through scam calls.

  • SMS Phishing/Smishing: This is a phishing tactic that’s initiated through SMS. The scammers send you a clickable link via SMS that leads to a phishing website. 

5 Common Signs of a Phishing Scam

  • Mis-spelt or oddly worded URLs that mimic big brands and companies like Paypal, Amazon, Apple, Netflix, Walmart. Such URLs characteristically deviate from the conventional.

  • Corporate messages that originate from free email accounts, for example, an email pretending to be from PayPal email that was sent from a free Gmail account. Authentic emails will originate from the website’s own domain, such as ‘[username]@paypal.com’

  • A sense of urgency and fear to get you to click on a provided link that is already booby-trapped with malware.

  • Unprompted requests to confirm your email or password. Whenever you get any such email without actually trying to log in, you are being targeted for a phishing scam.

  • Promotional/Marketing email with an enticing message to get you to click on a link or open an attachment. Usually, there is the promise of free stuff, discounts, free coupons, or even money. 

Examples of Phishing Emails and Text Messages

Scammers do their research well. Their messages are designed to make you act on the information they feed you. Issues to do with an online account are the most common as we see here below: 

  1. Your Account has been hacked - Follow this link to secure your account data. 

  2. You need to Reset your password or restore your account.

3. Payment Request, claim a refund/reimbursement

4. Charity donation. 

 

How to Protect Yourself From Phishing Emails and Texts

  1. Do not click on links in any suspicious email or download attachments regardless of the reason given. 

  2. Install reliable antivirus protection with malware detection. Go for one with web browser integration to flag new and upcoming phishing sites. 

  3. Set up and use your PC firewall security. Do the same for your home and work network. 

  4. Make use of the SPAM button in your email application. Mark as spam all emails that have the signs of phishing shown above. 

  5. Never follow links in emails to payment sites or your bank account. Instead, navigate manually on your web browser. Phishing sites mimic the real site to get you to give your login credentials. 

  6. Check a website's Trust Score on ScamAdviser.com before you buy.

Report a Scam!

Have you fallen for a hoax, bought a fake product? Report the site and warn others!

Help & Info

Top Safety Picks

Your Go-To Tools for Online Safety
Disclaimer: Some of the links here are affiliate links. If you click them and make a purchase, we may earn a commission at no extra cost to you.

  1. ScamAdviser App - iOS : Your personal scam detector, on the go! Check website safety, report scams, and get instant alerts. Available on iOS
  2. ScamAdviser App - Android : Your personal scam detector, on the go! Check website safety, report scams, and get instant alerts. Available on Android.
  3. NordVPN : NordVPN keeps your connection private and secure whether you are at home, traveling, or streaming from another country. It protects your data, blocks unwanted ads and trackers, and helps you access your paid subscriptions anywhere. Try it Today!
  4. Incogni : Incogni automatically removes your personal data from data brokers that trade in personal information online, helping reduce scam and identity theft risks without the hassle of manual opt-outs. Reclaim your privacy now!

Popular Stories

In a nutshell: A good VPN protects your privacy with strong encryption, a strict no-logs policy, and fast protocols like WireGuard. The best VPNs also offer wide server coverage, leak protection, and easy-to-use apps for all devices. For 2025, the top providers are NordVPN, ExpressVPN, Surfshark, Proton VPN, Private Internet Access, CyberGhost, and Mullvad—each excelling in speed, security, or value. In an age where every click is tracked, a Virtual Private Network (VPN) is no longer just a luxury—it's an essential tool for digital privacy and security. A VPN works by creating a secure, encrypted tunnel between your device and the internet, masking your real IP address and protecting your sensitive data from prying eyes. But with hundreds of providers out there, how do you sort the secure from the suspect? This guide breaks down the non-negotiable features of a quality VPN and highlights the 7 top-rated services for 2025. What to Look for in a Good VPN: The 4 Non-Negotiable Pillars 1. Ironclad Security Features Strong Encryption: AES-256, the gold standard. Secure Protocols: OpenVPN, WireGuard, NordLynx, Lightway. Avoid PPTP. Kill Switch: Ensures no accidental IP leaks. Leak Protection: Covers DNS, IPv6, and WebRTC. 2. Verified Privacy Practices No-Logs Policy: No activity or metadata tracking. Independent Audits: Verification by third parties. Safe Jurisdiction: Prefer countries outside the 5/9/14 Eyes alliances. 3. High-Speed Performance Fast Protocols: WireGuard and equivalents. Large Server Network: Less crowding, more reliable speeds. 4. Essential Usability Features Multi-Device Apps: Windows, Mac, iOS, Android, routers. Simultaneous Connections: One account, many devices. Unblocking Power: Netflix, Hulu, BBC

How to Protect Yourself and Your Family After a Data Breach When Your Data Falls Into the Wrong Hands Just received that terrifying notification? Or perhaps you've noticed suspicious activity in your accounts? Take a deep breath. A data breach, the unauthorized access or exposure of sensitive, protected, or confidential data, is a deeply unsettling event. It can plunge you into a world of worry, bringing risks from financial losses and identity theft to significant emotional distress and reputational damage. The numbers don't lie: according to a 2024 report, the number of data breach victim notices has grown by a staggering 211% year-over-year. This isn't just a distant threat; it's a stark reality many individuals face. This year alone, we've seen major organizations like Adidas and Qantas grapple with high-profile data breaches, affecting countless customers. This underscores a critical truth: nobody is untouchable. Subsequently, strategic action is the only way to minimize the risk and protect your future. This guide is your emergency action plan, designed to walk you through every crucial step—from confirming the breach to fortifying your digital life for the long term. Part 1: Confirming the Breach and Understanding the Damage The very first step is to answer the question definitively: Was my data compromised, and if so, how badly? Start with the basics: Check Official NotificationsReputable companies are legally obligated to inform you if your data was part of a breach. Look for official emails, letters, or public announcements. Check Verified Breach DatabasesPlatforms like HaveIBeenPwned help you see if