O'Reilly logo

Home Network Security Simplified by Nathan Clement, Neil Anderson, Jim Doherty

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Tip 7: Recognize and Avoid Phishing Scams

Tip 7: Recognize and Avoid Phishing Scams
<feature><title></title>

Threat Type: Victim enabled

Examples of Threats:

  • E-mails asking for account information that will then be used by identity thieves

  • E-mails “selling” security services

Our Tips:

  • Never click any of the links within the e-mail.

  • Never send account information via e-mail.

  • Never reply to any e-mail asking for personal or account information, even if a phone number is provided.

</feature>

Phishing is a relatively new social engineering scam that has become one of the most popular tactics used by identity thieves. Phishing scams play on people’s fear or sense of doing what is right ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required