Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Everyone has come across a suspicious email attempting to get your confidential information.  Usually , a phishing email can be easily identified by the address it's sent from, typos or suspicious content. Nowadays phishing email can look credible, which makes it more difficult to identify. Some messages can use information that can be found online to make the message seem more real, such as first and last name. Phishing emails are very common, because it's easy and effective to implement.

Phishing is criminal activity done in an IT environment. It is a attempt to get a person's private information is criminal activity done in an IT environment. A . Often a phishing e-mail pretends to be coming from a legitimate party and requests information that should be kept private. Most phishing messages that Metropolia users receive asks to give their password because of a change in some system.

...

  1. Hover your mouse over the link. In this picture, the “Recover Delayed Messages” is the link. Usually, the link is the one where the email is instructing you to click.
  2. When your mouse is hovering over the link, you can see Outlook URL-address. It will appear on the bottom of your screen or similarly as in the picture. In some programs, you can display the URL-address by right-clicking the link.
  3. See the URL-address, which is highlighted by the red box in the picture above. It does not direct you to a trusted website like metropolia.fi or some other familiar website. So the URL-address directs you to an unknown page where it’s likely to ask for your username and password. This way the scammers get your login information.
  4. If you have clicked one of these unknown links, it usually takes you to a familiar login page. In the example picture below, you can see that the webpage looks pretty much the same as in Metropolias Outlook login page. Nevertheless, where you can detect scam is by looking at the webpages address bar. 

Image RemovedImage Added

2. Inspect the message as a whole

...

Often, the messages even come from an address that does not belong to the alleged sender. You will see the address above the message as shown in the image (the address is circled highlighted in red):

Image RemovedImage Added

In the example above, the sender is named "Metropolia University of Applied Sciences". When you take a closer look at the sender's address, you will notice that it does not end at @metropolia.fi. This is therefore not Metropolia's e-mail address.

...