🚩 Urgency
“Act now!” deadlines push you to skip verification. Real orgs rarely lock accounts instantly.
A fast, practical guide to understanding phishing and avoiding common traps.
Phishing is a social-engineering technique used by attackers to trick you into taking an action that benefits them: clicking a malicious link, entering credentials, paying an invoice, or downloading malware. Phishing messages often impersonate a trusted brand or colleague, borrowing logos and tone to look legitimate.
“Act now!” deadlines push you to skip verification. Real orgs rarely lock accounts instantly.
Display name ≠ real address, or .co vs .com. Always check the actual sender and reply-to.
Non-HTTPS links, misspelled brands, or unusual paths. Hover to preview—don’t click.
Especially ZIP, EXE, HTA, or macros. When in doubt, don’t open—verify first.
Legit services won’t ask for passwords or MFA codes over email.
“Dear user” instead of your name, poor grammar, or odd formatting can be clues.
brand.com vs brand.co).Ready to practice? Try the Phishing Challenge