Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Software

Can you spot a scam? (screenshots)

By Sonja Thompson April 13, 2011, 11:52 PM PDT

Image
1
of 12

how-to-spot-a-phishing-scam-slidehow_1.jpg
how-to-spot-a-phishing-scam-slidehow_1.jpg
Can you spot a scam? (screenshots)

ntA theft of names and email addresses like the recent one from marketing firm Epsilon doesn’t sound that bad but  that information is valuable for scammers to use in further attacks, notably in phishing scams.

n

ntIf an attacker knows your name, the companies you deal with and your email, then it can craft some convincing emails that have a much better chance of fooling you.

n

ntZDNet Australia’s Darren Pauli presents some fabricated examples of phishing emails to illustrate what users need to watch out for in order to protect themselves.

n

ntThe first one from Disney has mass appeal. The broad list of victims could be attractive for scammers.

Can you spot a scam? (screenshots)

ntPeople love a good deal, and these exist in abundance for hotel chains like the Marriott.

Can you spot a scam? (screenshots)

ntTelcos like Verizon have millions of customers.

Can you spot a scam? (screenshots)

ntA link could be inserted that points to a fake web page where customers are requested to enter billing information and promptly scammed.

Can you spot a scam? (screenshots)

ntPeople love a good deal, and these exist in abundance for hotel chains like the Marriott.

Can you spot a scam? (screenshots)

ntPhishing scams like this could direct users to fake booking sites in order to swipe financial details.

Can you spot a scam? (screenshots)

ntThe Hilton is another popular and trusted name in accommodation.

Can you spot a scam? (screenshots)

ntUnfortunately, its popularity is what could make it a good target. Even legitimate-looking email addresses will not necessarily be kosher.

Can you spot a scam? (screenshots)

ntRecruitment and career agency Robert Half was another victim of the Epsilon breach.

Can you spot a scam? (screenshots)

ntCustomers should be wary of scams that seek to harvest details for identity crime.

Can you spot a scam? (screenshots)

ntBorders sends out coupon offers to readers.

Can you spot a scam? (screenshots)

ntA link could be inserted that points to a fake web page where customers are requested to enter billing information and promptly scammed.

  • Software
  • Account Information

    Share with Your Friends

    Can you spot a scam? (screenshots)

    Your email has been sent

Share: Can you spot a scam? (screenshots)
Image of Sonja Thompson
By Sonja Thompson
My name is Sonja Thompson. I've worked for TechRepublic since October of 1999, starting with the enewsletter team, then with the Premium Products group (creating books and CDs), as well as programming some of the elements on the site. After leading t
  • Account Information

    Contact Sonja Thompson

    Your message has been sent

  • |
  • See all of Sonja's content

TechRepublic Premium

  • TechRepublic Premium

    Shadow IT policy

    Shadow IT is a concept whereby an organization’s employees use technology, services or systems without the knowledge of or approval from the IT department. It has arisen due to several reasons: Advances in cloud computing, which involve the usage of applications or sharing of data in public environments previously owned by IT. The evolution of ...

    Published:  February 2, 2023, 11:00 AM EST Modified:  February 3, 2023, 2:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Auditing and logging policy

    Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks and devices that store or transport critical data. From the policy: Many computer systems, network devices and other technological hardware used in the enterprise can audit and log various ...

    Published:  February 2, 2023, 11:00 AM EST Modified:  February 3, 2023, 3:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Vendor contract renewal planner

    Determining how and when to renew support contracts can be tedious and time-consuming. Our vendor contract renewal planner will help you schedule support renewals and budget the related costs. From the planner: Some companies schedule their support contract renewals to take effect all at once, such as on January 1. This provides a convenient renewal ...

    Published:  February 1, 2023, 11:00 AM EST Modified:  February 2, 2023, 12:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Access management policy

    Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company. The purpose of this policy ...

    Downloads
    Published:  February 1, 2023, 11:00 AM EST Modified:  February 2, 2023, 4:00 PM EST Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice