How to Catch Phishing Emails Before They Catch You

Phishing attacks can lead to serious problems like money loss and identity theft. Learn how to spot a phishing email and keep your information safe.
We receive compensation from the products and services mentioned in this story, but the opinions are the author's own. Compensation may impact where offers appear. We have not included all available products or offers. Learn more about how we make money and our editorial policies.

The term “phishing” was first mentioned back in 1994 when hackers breached AOL and tricked users into revealing their account passwords. Phishing attacks use malicious emails and fake websites to lure people into handing over their personal information. They’re called “phishing” because the hackers "fish" information out of unsuspecting victims. 

Knowing what to look for can safeguard your personal or financial information from bad actors. Plus, antivirus software with real-time phishing protection can stop phishing attacks before you become a victim. 

No Fuss, Real-Time Online and Mobile Protection
4.7
Editorial Rating
Learn More
On TotalAV's website
Antivirus Software
TotalAV
First year discount on paid plans
  • Real-time protection from viruses, malware, and online threats
  • Blocks tracking cookies and ads, proactively monitors for data breaches, and option to schedule smart scans
  • 100% compatible with Windows, Mac, Android, and iOS operating systems on up to 3 devices
  • Lacks firewall protection

In this article
Phishing email warning signs
How does phishing work?
Types of phishing attacks
How to prevent phishing attacks
FAQs
Bottom line

Phishing email warning signs

If you get an email that seems suspicious, the best defense is to delete it. Many phishing messages have mismatched email domains, claiming to be from reputable companies. If you get a suspicious link, you can see its address by hovering over the link with your mouse. Don’t click on the link. Here are the top email phishing red flags to look for:

  • Bad grammar or misspelled words
  • Generic greetings
  • Mismatched email domains
  • Unfamiliar or suspicious links
  • Unrecognized senders
  • Urgent messages calling you to act immediately
  • Companies using the default @gmail.com 

Here are two examples of real phishing emails:

A phishing example where a scammer is pretending to be a CEO and is asking for the user's phone number.

You may spot a phishing scam by looking for bad grammar or misspellings in the message. Some emails have generic greetings, which wouldn’t normally come from friends or professional companies (let alone a CEO). 

A phishing example where a scammer is trying to trick a user into renewing their McAfee subscription.

The above example is one you may receive frequently. You get a receipt or confirmation about a product you know you haven’t ordered, in this case, what appears to be a McAfee product. It contains a link that entices you to click on it, which may take you to a site to enter your credit card information to remain protected or to opt-out.

How does phishing work?

Phishing is so effective because attackers send compelling emails that look legitimate at first glance. Phishing emails usually direct you to a webpage that either delivers malware or allows you to enter your personal or financial information. You also may receive an attachment or link redirecting you to a phishing website.

Scammers aim to steal as much of your personal data as possible. Once they have it, they can access your social media accounts, financial information, and other sensitive data.

This is known as social engineering. The scammer manipulates you into doing something dangerous online, like revealing private information. Phishing is a form of social engineering where the perpetrators are looking for personally identifiable information and financial information like:

  • Passwords
  • Phone numbers
  • Social security numbers
  • Login credentials
  • Credit card numbers
  • Bank account numbers

If a phishing attack is successful, it can compromise your financial and social media accounts. That can mean unauthorized purchases and even identity theft. You can also get hit with ransomware that holds your information hostage until you pay to get it back. If you use identity theft protection, you should be notified if someone uses your information.

Phishing attacks can also harm companies. They can cause data loss and distribute malware throughout the organization, leading to devastating financial loss, reputation issues, and consumer mistrust.

Types of phishing attacks

Phishing attacks threaten everyone, so you need to know how to recognize them when they come your way. Numerous types of threats use phishing to steal your information. We cover these so you can spot them, hopefully before they can do any damage.

Email phishing

Email phishing is used by criminals who send a fraudulent message hoping you’ll respond by clicking a link or opening an attachment. Once you do, you’ll be directed to a site asking you to enter personal information. This comes as a savvy email that looks like something genuine you might need to open.

Spear phishing

Spear phishing campaigns use previously collected data in the email attack. That may be information regarding you or your employer. You may receive an email that creates a sense of urgency by asking you to act immediately. If you get a spear phishing email at work, it is usually an attempt to obtain your login credentials. It may have some information about you in the email that looks like it comes from someone you can trust.

Malware phishing

Malware phishing attempts to install malicious software on your device or company network. It comes as email attachments that might look valid. Sometimes, malware phishing can be disguised as seemingly harmless eBooks, PDFs, GIFs, or funny videos to tempt you to open them.

Pharming

Pharming is a bit different from regular phishing. It uses malicious code executed on your device to redirect you to the criminal’s website. You won’t get a link to click or an attachment to open. Pharming relies solely on code being run on your computer to target you. It’s a good idea to check your privacy settings on your device to limit who has access to your data.

Whaling

Whaling (AKA executive phishing) is a technique used by hackers. In this technique, hackers pretend to be senior members of an organization and target other people in administrative positions. The aim is to steal money or data for criminal gain.

Whaling uses email and website spoofing to get the target to reveal data or even transfer money. Spoofing works by creating a website that looks legitimate, so you’ll click on it and reveal private information to the scammers. Whaling targets specific individuals who would have access to sensitive information.

Smishing

Smishing is a combination of phishing and short message service (SMS). People use text messaging more frequently than emails, so many hackers use this method to get your information. They may text you with an infected link so you can click and download malware. The criminal will get your information and commit fraud to make money. Smishing scams are so popular with criminals that they’ve drastically increased in recent years.

Vishing

Vishing is a combination of phishing and voice recordings. The caller will leave you an urgent voicemail that tells you to respond immediately and call a certain number back. An example would be a message that your bank account has been hacked or suspended.

Another example is the extended car warranty phone call that most of us have received repeatedly. The end goal is the same as email phishing: the bad actor wants to steal your information for financial gain.

How to prevent phishing attacks

You can prevent phishing attacks by staying vigilant. Cybercriminals will always be looking to make a fast buck, but you don’t have to succumb to their savvy phishing games. Some ways to stop phishing attacks include:

  • Education: Knowing how scammers use phishing attacks can help keep you from becoming a victim. Cybersecurity training will keep you updated on the latest phishing trends.
  • Reporting: If you receive a suspicious message, report it to your email client, such as Microsoft Outlook. You can also report phishing emails to the FTC and to local law enforcement.
  • Using spam filters: Spam filters can be your first line of defense to block a phony email before it gets to you.
  • Using a password manager: A password manager can generate strong passwords for websites to help keep your data more secure. Third-party password managers offer strong encryption protocols and can help you store and manage your passwords securely.
  • Installing antivirus software: Antivirus software helps guard against malware, including phishing attacks. The best antivirus coverage includes real-time malware protection, safe browsing features, ad blockers, and more. 

Top antivirus software with phishing protection

Antivirus
Star rating
4.7
4.8
4.8
Price $29.00–$49.00/yr (first year only) $29.99–$249.99/yr $29.99–$99.99/first yr
# of devices protected 4 - 8 Unlimited 1 - 10
Malware scans Manual and scheduled Manual and scheduled Manual and scheduled
Real-time protection
EICAR test results 2/3 3/3 3/3
Firewall
Phishing protection
Compatibility Windows, Mac, Android, iOS, Chrome, Edge, Opera, Safari Windows, Mac, Android, iOS, Chrome, Firefox, Safari, Edge Windows, Mac, Android, iOS
Extras Password manager, ad blocker, VPN Parental controls, performance optimization tools, VPN Password manager, VPN, dark web monitoring, parental controls, privacy monitor, identity theft protection, cloud backup
24/7 customer support
Learn more Get TotalAV Get McAfee Get Norton 360

FAQs


+

What is a common indicator of a phishing attempt?

A common indicator of a phishing attempt is noticing something unusual or suspicious about the email, such as grammar or spelling errors. You may also receive a generic greeting or an unrecognized link.


+

What is the difference between a scam and phishing?

The difference between a scam and phishing is a scam is a scheme or fraudulent business that tries to get money or goods from you, while phishing is a type of cyberattack that targets you by email.


+

How do I report a suspicious email?

You can report a suspicious email to your email clients, such as Gmail or Microsoft Outlook. You can also report to the FTC.

Bottom line

Cybercriminals are getting smarter at deceiving us and taking advantage of vulnerabilities. Fortunately, you can use the above anti-phishing tips to thwart fraudulent activity. Always look for red flags, like spelling and grammar mistakes, suspicious links, and urgent demands or requests.

If you receive suspicious emails, report them to your email client or the FTC. For 24/7 online security, install antivirus software with real-time protection across your devices. 

No Fuss, Real-Time Online and Mobile Protection
4.7
Editorial Rating
Learn More
On TotalAV's website
Antivirus Software
TotalAV
First year discount on paid plans
  • Real-time protection from viruses, malware, and online threats
  • Blocks tracking cookies and ads, proactively monitors for data breaches, and option to schedule smart scans
  • 100% compatible with Windows, Mac, Android, and iOS operating systems on up to 3 devices
  • Lacks firewall protection

Author Details
Patti Croft is a seasoned writer specializing in technology, with three years of experience. With a B.S. in Computer Science and a background as a technical analyst and security specialist, she covers a range of topics like data security and parental control software.
Kate is an Editor at All About Cookies. She has 8+ years of digital publishing experience as a content manager, developmental editor, and curriculum writer. She leverages specializations in EdTech and educational publishing to create impactful, well-researched content that aids learners of all ages.