Search7 Results

This introductory article on phishing provides a description of phishing, examples of spoofed senders, purposes and types of phishing as well as associated risks.
This Article provides some proactive measures to minimize phishing impact, some ways to react to phishing, and actions to take if you think you were successfully phished.
This article describes signs of phishing, actions that criminals use to trick victim in thinking phishing message are real and phishing training that is offered with simulating message.
This article focuses on phishing attempts containing scam job offers and provides methods to determine email validity, including several sets of questions to ask if one suspects that a message is a phishing/scam email, an online tool for checking email or domain health, and FAQs concerning topics from throughout the document.
What to do if you receive a suspicious or phishing email