The Phishing Flow Chart - gHacks Tech News

The Phishing Flow Chart

Phishing is a serious problem on today's Internet even with phishing protections in email clients, web browsers and security software in place.

The main reason for that, even if you run programs with phishing protection, is that these usually only protect you from known phishing threats

So, unless a phishing site has been identified by the maintainers of said databases, you are not warned when you open such a site in your browser of choice.

There is a window of opportunity for attackers to take advantage of that fact.

The Phishing Flow Chart

Internet users therefore need to know about phishing and how to identify phishing emails so that they don't become a victim of an attack.

While that may sound like an easy thing to do if you are an Internet veteran or simply interested in security, it is not as trivial as it sounds for less tech-savvy users who have little to no experience when it comes to computer systems and security specifically.

The Login Helper blog has created a phishing flow chart that outlines the process of analyzing an email to determine if it is a phishing email or not.

The flow chart addresses the three biggest email dangers: Attachments, links and social engineering. The chart has been color coded for easier recognition of safe and dangerous elements in emails. All red elements in the flow chart are considered dangerous while blue elements are considered safe.

The chart furthermore provides basic suggestions on how to react when possible dangerous elements are encountered, for attachments it is to save them locally and check them with a service like Virus total online. That is better than opening them right away and hoping that the resident antivirus solution, if one is installed, catches any attack that gets carried out in the process.

Following the chart leads either to a safe or dangerous rating for the email that you analyze using it.

You can print out the chart if you want, or just memorize it. It is really not that complicated to go through. Just follow it from the very top to find out if an email is safe or a possibly malicious.

The Phishing Flow Chart
Article Name
The Phishing Flow Chart
The Phishing Flow Chart is an easy to understand flow chart to analyze emails to find out if they are so-called phishing emails or safe.
Ghacks Technology News

We need your help

Advertising revenue is falling fast across the Internet, and independently-run sites like Ghacks are hit hardest by it. The advertising model in its current form is coming to an end, and we have to find other ways to continue operating this site.

We are committed to keeping our content free and independent, which means no paywalls, no sponsored posts, no annoying ad formats or subscription fees.

If you like our content, and would like to help, please consider making a contribution:

Previous Post: «
Next Post: »


  1. peter metro said on February 14, 2010 at 5:05 am

    this is a good chart, but it needs a “no” connector from the “is the attachment executable” decision box draw to the “are links in the email?” decision box.

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

Please note that your comment may not appear immediately after you post it.

Be polite: we do not allow comments that threaten or harass, or are personal attacks. Please leave politics and religion out of discussions!