Search
  • Videos
  • 5G
  • Windows 10
  • Cloud
  • Innovation
  • Security
  • Tech Pro
  • more
    • ZDNet Academy
    • Microsoft
    • Mobility
    • IoT
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Log In to ZDNET
    • Join ZDNet
    • About ZDNet
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • 5G
    • Windows 10
    • Cloud
    • Innovation
    • Security
    • Tech Pro
    • ZDNet Academy
    • Microsoft
    • Mobility
    • IoT
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Log In to ZDNET
      • Join ZDNet
      • About ZDNet
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

How to avoid being phished during holiday shopping season

1 of 9 NEXT PREV
  • Check the sender’s address

    Check the sender’s address

    Always check both the display name and the email address of the sender. If the two do not match, or the sender's domain looks suspicious, then do not open the email.

    Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

    Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

    Photo by: Eileen Brown

    Caption by: Eileen Brown

  • Unrecognised sender

    Unrecognised sender

    If you do not have an online account with a specific brand, then you have no reason to open any email from them. 

    It could be a worm, virus, or a phishing attempt by someone who wants to get your details.

    Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

    Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

    Photo by: Eileen Brown

    Caption by: Eileen Brown

  • Valid account but unusual message

    Valid account but unusual message

    If you do have an account with the bank or brand, but the message seems to relate to something you do not remember doing, do not click on any links or open any attachments. 

    Banks will never send you impersonal messages like this. They will personalise the mail to your name and usually will include three digits of your account number or other personal details.

    Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

    Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

    Photo by: Eileen Brown

    Caption by: Eileen Brown

  • Spelling and grammar

    Spelling and grammar

    Spelling mistakes do occasionally occur, but badly written emails should be junked straight away.

    Enable two-factor authentication to avoid others taking control of your account and potentially locking you out of your own mailbox.

    Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

    Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

    Photo by: Eileen Brown

    Caption by: Eileen Brown

  • Greeting

    Greeting

    Vague greetings, such as "Hi Dear," would never come from a legitimate source. 

    Banks and other valid organisations would always use your full name when addressing you in an email.

    Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

    Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

    Photo by: Eileen Brown

    Caption by: Eileen Brown

  • Promises of money

    Promises of money

    The adage "if something seems too good to be true, it usually is" holds true for emails offering you rebates, refunds, and unasked-for cash.

    Always be suspicious. Check the link and the address. Real cash refunds are usually in response to a request for a refund.

    Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

    Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

    Photo by: Eileen Brown

    Caption by: Eileen Brown

  • Hover – do not click

    Hover – do not click

    If you see a link in your email, do not click on it. Instead hover your mouse over the visible link to see the real destination. You can then see if the link looks authentic and has no .php or other types of scripts in it. 

    Another check is to see if the link starts with https, which indicates a secure connection.

    Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

    Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

    Photo by: Eileen Brown

    Caption by: Eileen Brown

  • When in doubt

    When in doubt

    If all else fails, and you are really tempted to open the links, but you have a hunch something is wrong, check with the brand that apparently sent you the email. 

    Do not use the reply to link on the email, but contact them through their valid website, or phone number if you have any doubts.

    Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

    Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

    Photo by: Eileen Brown

    Caption by: Eileen Brown

  • Use VPNs for security

    Use VPNs for security

    VPNs provide an encrypted tunnel to prevent your credentials being stolen when you are online. a VPN could minimize future attempts to extract your information.

    Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

    Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

    Photo by: NordVPN

    Caption by: Eileen Brown

1 of 9 NEXT PREV
  • 0
  • Check the sender’s address
  • Unrecognised sender
  • Valid account but unusual message
  • Spelling and grammar
  • Greeting
  • Promises of money
  • Hover – do not click
  • When in doubt
  • Use VPNs for security

Although hackers are getting more and more sophisticated, you can still recognize that something is not right online. NordVPN shares tips on spotting a phishing message -- and keep your online activities safe.

Read More Read Less

Check the sender’s address

Always check both the display name and the email address of the sender. If the two do not match, or the sender's domain looks suspicious, then do not open the email.

Also: VPN services 2018: The ultimate guide to protecting your data | The best VPN services: Our 10 favorite vendors | These are the worst hacks, cyberattacks, and data breaches of 2018

Published: December 21, 2018 -- 19:12 GMT (11:12 PST)

Caption by: Eileen Brown

1 of 9 NEXT PREV

Related Topics:

Security Consumerization Security TV Data Management CXO Data Centers
  • 0
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 2
  • Many of 2018's most dangerous Android and iOS security flaws still threaten your mobile security

    Bypassing passcodes, malware-laden apps, and inherent design flaws exposing almost all known mobile devices made up part of the security problems found in iOS and Android. ...

  • Cybercrime and malware, 2019 predictions

    Experts weigh in on what they believe will happen to the world of cybercrime, malware, and botnets in the coming year.

  • The best VPN services: Our 10 favorite vendors for protecting your privacy

    Whether you're in the office or on the road, a VPN is still one of the best ways to protect yourself on the big, bad internet. One of these could be your best bet. ...

  • Apricorn Aegis Fortress L3 portable storage drive

    If you're looking for a fast, ultra-rugged, secure encrypted portable storage drive that's available in both HDD and SSD flavors, look no further than Apricorn's new Aegis Fortress ...

  • How to secure your iPhone from hackers, snoopers, and thieves (iOS 12.1)

    Your iPhone and iPad is likely packed with important, valuable, and even sensitive information that you might not want others to be able to access. Here are the steps you should take ...

  • Top tips to keep safe around your voice assistant

    Voice assistants like Google Home, Amazon Alexa, and Samsung smart TVs are always listening, yet consumers are unaware that their recordings are held online. Here are some ways to ...

ZDNet
Connect with us

© 2018 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In | Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums