Phishing Tutorial: Spot the Red Flags

A fast, practical guide to understanding phishing and avoiding common traps.

~6 min read

What is Phishing?

Phishing is a social-engineering technique used by attackers to trick you into taking an action that benefits them: clicking a malicious link, entering credentials, paying an invoice, or downloading malware. Phishing messages often impersonate a trusted brand or colleague, borrowing logos and tone to look legitimate.

Common Red Flags

🚩 Urgency

“Act now!” deadlines push you to skip verification. Real orgs rarely lock accounts instantly.

🚩 Domain Mismatch

Display name ≠ real address, or .co vs .com. Always check the actual sender and reply-to.

🚩 Suspicious Links

Non-HTTPS links, misspelled brands, or unusual paths. Hover to preview—don’t click.

🚩 Unexpected Attachments

Especially ZIP, EXE, HTA, or macros. When in doubt, don’t open—verify first.

🚩 Requests for Secrets

Legit services won’t ask for passwords or MFA codes over email.

🚩 Generic Greeting

“Dear user” instead of your name, poor grammar, or odd formatting can be clues.

Verify Safely

  1. Hover over links to see the real destination; never click to “test”.
  2. Check sender and reply-to domains carefully (example: brand.com vs brand.co).
  3. Open a new tab and sign in via the official site/app—never through the email link.
  4. Enable MFA on important accounts; it reduces damage even if credentials leak.
  5. Report suspicious messages using your mail client’s “Report phishing” button.

Example: Quick Triage

Quick Checklist

Ready to practice? Try the Phishing Challenge