Phishing is a serious problem on today's Internet even with phishing protections in email clients, web browsers and security software in place.
The main reason for that is that the majority of security applications protect against known phishing threats only. Sites of phishing campaigns do get blocked after they have been discovered and that happens fairly quickly nowadays.
The problem is that phishing protection does not necessarily protect against phishing sites that are not in the databases yet. You may not be warned when you open the site and may fall pray to the attack unless you are careful.
There is a window of opportunity for attackers to take advantage of that fact.
Internet users therefore need to know about phishing and how to identify phishing emails so that they don't become a victim of an attack.
While that may sound like an easy thing to do if you are an Internet veteran or simply interested in security, it is not as trivial as it sounds for less tech-savvy users who have little to no experience when it comes to computer systems and security specifically.
The phishing flow chart outlines the process of analyzing an email to determine if it is a phishing email or not.
The flow chart addresses the three biggest email dangers: Attachments, links and social engineering. The chart has been color coded for easier recognition of safe and dangerous elements in emails. All red elements in the flow chart are considered dangerous while blue elements are considered safe.
The chart furthermore provides basic suggestions on how to react when possible dangerous elements are encountered, for attachments it is to save them locally and check them with a service like Virus total online. That is better than opening them right away and hoping that the resident antivirus solution, if one is installed, catches any attack that gets carried out in the process.
Following the chart leads either to a safe or dangerous rating for the email that you analyze using it.
Here are the core questions that you need to answer when you analyze an email:
You can print out the chart if you want, or just memorize it. It is really not that complicated to go through. Just follow it from the very top to find out if an email is safe or a possibly malicious.Advertisement
Advertising revenue is falling fast across the Internet, and independently-run sites like Ghacks are hit hardest by it. The advertising model in its current form is coming to an end, and we have to find other ways to continue operating this site.
We are committed to keeping our content free and independent, which means no paywalls, no sponsored posts, no annoying ad formats or subscription fees.
If you like our content, and would like to help, please consider making a contribution:
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.