Hacker, Researcher and Author.

How to identify phishing scams

What is Phishing?

In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

What does a phishing scam look like?

Phishing e-mail messages take a number of forms. They might appear to come from your bank or financial institution, a company you regularly do business with, such as Microsoft, or from your social networking site.

 The following is an example of what a phishing scam in an e-mail message might look like.
Phishing spam
Example of a phishing e-mail message, which includes a deceptive Web address that links to a scam Web site.

Here are a few phrases to look for if you think an e-mail message is a phishing scam.

1.Verify or update your account:

Businesses should not ask you to send passwords, login names, Social Security numbers, or other personal information through e-mail.
2.you have won a prize or lottery:
The lottery scam is a common phishing scam known as advanced fee fraud. One of the most common forms of advanced fee fraud is a message that claims that you have won a large sum of money, or that a person will pay you a large sum of money for little or no work on your part
"3.If you don't respond within 48 hours, your account will be closed."
These messages convey a sense of urgency so that you'll respond immediately without thinking.

Tips to protect yourselves from phishing:

1. Don’t reply to, or click links within, emails that ask for personal, financial, or account information.

2. Check the message headers. The ‘From:’ address and the ‘Return-path’ should reference the same source. If necessary, look at the expanded header as some phishing use vulnerable email servers to rout their messages.

3. Instead of clicking the links in emails, go to the websites directly by typing the web address into your browser, cut and paste, or use bookmarks.

4. If on a secure page, look for “https” at the beginning of the URL and the padlock icon in the browser.

5. Use a browser that has a phishing filter (Firefox, Internet Explorer, or Opera).

6. If you ever need to change your account information, such as your billing details or your password, you should always sign in to your account from the main login page of your trusted network (i.e. your bank’s main website) and make the changes directly within your account.


  1. This post is good it surely helpful to me and i will surely keep these points in mind.

  2. Thanx for the feedback,I hope you will visit again

  3. Recently computer is very important in our life. it is very useful for us.

  4. @Online poker
    YOur r rite about that

  5. But now you can use different of Phishing Filter, all the browsers providing this......

  6. Can any one tell there is any special softwares available other than browers provides.....

  7. @Poker
    BUt still some fake pages are so organized that they are not caught by phishing filter,SO for this you need to keep these steps in mind to prevent the damage

  8. @poker
    Download winodows defender for maximum protection
    OR phishing filter is another choice

  9. Reading your article enlightens me. I learned something valuable. Great insight.

    Learn eBay Secrets

  10. @Netbizsavvy

    Thanx for your valuable opinion

  11. Thanks for the info. When running an e-commerce business, it is imperative to be wary of phishing. Knowing how to protect customer information is extremely important.

  12. nice illustration..... :)
    Thnks for sharing...

  13. thanx for the lovely advices.....I'll keep these points in mind..


© 2016 All Rights Reserved by RHA Info Sec. Top

Contact Form


Email *

Message *

Powered by Blogger.