Catching a Phish

Contributor: Jay Gregorio. Lesson ID: 13227

In order to understand phishing, we need you to complete this lesson as soon as possible. Whoa! Learn the danger behind urgent requests like this and unknown hyperlinks or attachments!

1To2Hour
categories

Communications, Practical Life Skills

subject
Technology
learning style
Auditory, Visual
personality style
Beaver
Grade Level
High School (9-12)
Lesson Type
Dig Deeper

Lesson Plan - Get It!

Audio: Image - Button Play
Image - Lession Started Image - Button Start

You work for the federal government. (Congrats on the new job!)

Due to confidentiality issues, you can only use your government-issued laptop in the office. While working, you receive this email.

scam email

Seems legitimate, and you are on a secure laptop in a secure building, so the email must also be secure. Better click on that link before time runs out.

  • Do you agree?
  • Would you click on this link?
  • How can you determine if it is safe or not? What are the signs?

Keep reading to learn the hidden dangers in emails like this one and what you can do to protect your identity!

stealing online information

What Is Phishing?

Phishing is a spin on the word fishing, where someone throws a baited hook into a body of water, hoping a fish will bite it.

Phishing is any sophisticated online scam that lures victims into giving personal and private information.

It is a form of cybercrime in which emails, text messages, and phone calls that appear to be from a legitimate source are sent to obtain passwords, credit card information, and other information that could result in financial loss and identity theft.

If you read this lesson, you are active enough online to have an email address. Email is an essential part of communicating in today's world, but it also brings a lot of unwanted notifications, promotions, and the like.

Most of these messages immediately go to your spam folder, but some reach your inbox. Many of these appear to come from a legitimate source, and the messages often contain an urgent request for an immediate response or action from you.

Cybercriminals or scammers use many phishing techniques, but they generally fall into two categories based on their purpose.

Transfer Sensitive Information

Messages sent to gain personal information often result in financial loss.

A typical scam email looks legitimate from your institution. It will include a link that leads to a malicious site that resembles your bank's real site. When you enter your username and password, the criminal can see that information.

This allows the scammer to access your account and steal money.

Spreading Malware

Malware is software that causes intentional damage to a computer or network.

Malware, often referred to as a virus, is attached to a link or document. When you click on or open it, you release the malware into your computer or network.

Malware can be programmed to do many different things, from erasing your files to destroying your hard drive or recording your keystrokes. Software can be created to do anything you can imagine.

To learn more, watch the following video.

Image - Video

What Can You Do?

  • How do you know if an email is valid or if it is a phishing scam?

You can look at specific things carefully to determine whether something is a scam. (Remember, phishing can also occur via text message or call.)

Unidentified Sender

If the message does not include a sender's full name or other legitimate information, it may be a sign of phishing.

Some scams do not ask for anything other than a reply at first. However, once the scammer gains your trust, you will likely be asked to complete a task revealing your private information.

Too Good to Be True

Scammers try to hook you by grabbing your attention right away.

  • Did you win a raffle you never entered?

Yeah, that's a scam. Besides winning prizes or the lottery, lucrative offers for free phones or other expensive items are too good to be true. Don't fall into the trap.

Hyperlinks and Attachments

Think of hyperlinks and attachments like dogs you have never met. You may want to pet them, but you must ensure they are safe first.

It is best to assume any hyperlink or attachment sent to you could harm your computer. Some carry viruses, and others redirect you to a fraudulent website.

If you were not expecting the hyperlink or attachment, do not click or open it. If it is important, the sender can always resend it.

Tone of Urgency

Getting you to act before you think is the key to a good scam.

You are less likely to notice the details if a message appears time-sensitive. You may need to act immediately to secure your winnings or prevent your account from being suspended.

Be leery of urgent-sounding messages like these.

Okay, you believe you just received a phishing email.

  • What can you do?

Don't click on any links. Don't open any attachments. Don't reply. Just delete it. SimpIe as that.

If you want to do so, you may forward the email to [email protected] or [email protected] or report it to the Federal Trade Commission.

For more tips and information, feel free to check out these resources.

These resources include several ways to help protect yourself, like redirecting spam emails and enabling security features; however, the best and easiest strategy is always to stop and think twice before clicking or opening anything.

Review all you have learned in the Got It? section when ready!

Image - Button Next