{"id":101226,"date":"2020-05-19T09:00:07","date_gmt":"2020-05-19T16:00:07","guid":{"rendered":"\/blogs\/?p=101226"},"modified":"2024-07-04T04:30:35","modified_gmt":"2024-07-04T11:30:35","slug":"protect-yourself-against-phishing-scams-with-these-security-tips","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/","title":{"rendered":"Protect Yourself Against Phishing Scams With These Security Tips"},"content":{"rendered":"<p><span data-contrast=\"none\">Phishing is one of the oldest cyberthreats in the book, and yet still one of the most effective.<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">As\u00a0<\/span><span data-contrast=\"none\">people<\/span><span data-contrast=\"none\">\u00a0across the globe find themselves taking to the in<\/span><span data-contrast=\"none\">ternet more than ever before, criminals see this as an opportunity to\u00a0<\/span><span data-contrast=\"none\">release phishing attacks on unsuspecting users<\/span><span data-contrast=\"none\">. In fact,\u00a0<\/span><span data-contrast=\"none\">Security Boulevar<\/span><span data-contrast=\"none\">d<\/span><span data-contrast=\"none\">\u00a0found a 600% rise in phishing campaigns in the last month.\u00a0<\/span><span data-contrast=\"none\">So, a<\/span><span data-contrast=\"none\">s users\u00a0<\/span><span data-contrast=\"none\">leverage<\/span><span data-contrast=\"none\">\u00a0the World Wide Web to stay connected with friends and loved ones, it\u2019s imperative that\u00a0<\/span><span data-contrast=\"none\">they remain wary of scammers looking to exploit our need to\u00a0<\/span><span data-contrast=\"none\">virtually communicate.\u00a0<\/span><span data-contrast=\"none\">With that, let\u2019s take a look at\u00a0<\/span><i><span data-contrast=\"none\">why<\/span><\/i><span data-contrast=\"none\">\u00a0phishing is so effective even in 2020 and explore what actions users can take to stay protected.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2>What is Phishing?<\/h2>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/consumer-threat-notices\/how-to-spot-phishing-lures\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Phishing<\/span><\/a><span data-contrast=\"none\">\u00a0attacks occur when scammers attempt to trick users out of money or personal information<\/span><span data-contrast=\"none\">, usually by email, phone, or\u00a0<\/span><span data-contrast=\"none\">text.\u00a0<\/span><span data-contrast=\"none\">With so many avenues for criminals to hook victims, phishing is one of the most prevalent threats we see today.\u00a0<\/span><span data-contrast=\"none\">As part of their phishing schemes<\/span><span data-contrast=\"none\">, scammers\u00a0<\/span><span data-contrast=\"none\">often\u00a0<\/span><span data-contrast=\"none\">use something called social engineering<\/span><span data-contrast=\"none\">\u00a0to manipulate users into trusting them for fraudulent purposes, often by pretending to be a legitimate person or business<\/span><span data-contrast=\"none\">. Through these phishing attacks<\/span><span data-contrast=\"none\">, criminals can spread malware and other malicious content.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2>The Evolution of\u00a0Phishing<\/h2>\n<p><span data-contrast=\"none\">As new technology and circumstances arise, scammers find new ways to evolve the age-old technique of phishing.\u00a0<\/span><span data-contrast=\"none\">What originated as\u00a0<\/span><a href=\"https:\/\/www.phishing.org\/history-of-phishing\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">email and\u00a0<\/span><span data-contrast=\"none\">instant<\/span><\/a><span data-contrast=\"none\">\u00a0messages<\/span><span data-contrast=\"none\">\u00a0attempting to steal users\u2019 credentials has since taken on new forms like\u00a0<\/span><span data-contrast=\"none\">SMiShing<\/span><span data-contrast=\"none\">\u00a0or adapted\u00a0<\/span><span data-contrast=\"none\">its content to hook the victim with a shocking subject line.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Why has this technique continued to plague\u00a0<\/span><span data-contrast=\"none\">users since its inception?\u00a0<\/span><a href=\"https:\/\/hackernoon.com\/the-evolution-of-phishing-attacks-why-are-they-still-effective-44bdb8f458c2\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Hackernoon<\/span><\/a><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">argues that it\u2019s<\/span><span data-contrast=\"none\">\u00a0because\u00a0<\/span><span data-contrast=\"none\">phishing<\/span><span data-contrast=\"none\">\u00a0doesn\u2019t require in-depth networking knowledge or even basic programming skills. It<\/span><span data-contrast=\"none\">\u00a0simply<\/span><span data-contrast=\"none\">\u00a0relies on human error and the lack of online security awareness, manipulating human psychology just as much as technological tools.<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2>Phishing Capitalizes on Emotion<\/h2>\n<p><span data-contrast=\"none\">Let\u2019s face it \u2013 we&#8217;re all human. Our inherent psychology\u00a0<\/span><span data-contrast=\"none\">makes us quick to act on emotion. However, this is much of the reason why phishing has forged on as a favorite among hackers.\u00a0<\/span><span data-contrast=\"none\">Unfortunately, criminals tend to capitalize on bad or shocking news to grasp the victim\u2019s attention, leading them to click on malicious links or\u00a0<\/span><span data-contrast=\"none\">give up personal data all too eagerly.\u00a0<\/span><span data-contrast=\"none\">Take today\u2019s environment, for example.\u00a0<\/span><span data-contrast=\"none\">As businesses are faced with budget cuts and organizational restructuring, many users\u00a0<\/span><span data-contrast=\"none\">might be uncertain about their job security<\/span><span data-contrast=\"none\">\u00a0\u2013 an opportunity that scammers are eager to exploit.\u00a0<\/span><span data-contrast=\"none\">In fact,\u00a0<\/span><span data-contrast=\"none\">some organizations have<\/span><span data-contrast=\"none\">\u00a0recently observed\u00a0<\/span><span data-contrast=\"none\">phishing emails with subject lines reading \u201cHR Termination List<\/span><span data-contrast=\"none\">.<\/span><span data-contrast=\"none\">\u201d\u00a0<\/span><span data-contrast=\"none\">T<\/span><span data-contrast=\"none\">hrough t<\/span><span data-contrast=\"none\">hese<\/span><span data-contrast=\"none\">\u00a0malicious\u00a0<\/span><span data-contrast=\"none\">attempts, fraudsters use fear tactics\u00a0<\/span><span data-contrast=\"none\">to tempt recipients into clicking on links in emails or downloading dangerous content.<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">With millions of users suddenly out of work, a lot of people have found themselves\u00a0<\/span><span data-contrast=\"none\">desperately looking for new job opportunities or seeking financial help. However, users should\u00a0<\/span><span data-contrast=\"none\">not let their guard down while job hunting, as this could prevent<\/span><span data-contrast=\"none\">\u00a0them from noticing the tell-tale signs of phishing.\u00a0<\/span><span data-contrast=\"none\">According to\u00a0<\/span><a href=\"https:\/\/www.fool.com\/personal-finance\/2020\/04\/21\/these-covid-19-scams-have-cost-americans-134-milli.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">The Motley Fool<\/span><\/a><span data-contrast=\"none\">, some phishing emails<\/span><span data-contrast=\"none\">\u00a0and text messages<\/span><span data-contrast=\"none\">\u00a0claim to offer work-from-home job opportunities, information about health insurance or Medicare, or loans or other forms of financial relief<\/span><span data-contrast=\"none\">.\u00a0<\/span><span data-contrast=\"none\">In fact, the Federal Communications Commission (FCC) reported that\u00a0<\/span><span data-contrast=\"none\">many Americans have received\u00a0<\/span><span data-contrast=\"none\">texts from the &#8220;FCC Financial Care Center&#8221; offering $30,000 in relief for those who have recently been laid off or furloughed. While this might appe<\/span><span data-contrast=\"none\">ar to be a saving grace<\/span><span data-contrast=\"none\">, it\u2019s\u00a0<\/span><span data-contrast=\"none\">a<\/span><span data-contrast=\"none\">\u00a0stealthy demise to\u00a0<\/span><span data-contrast=\"none\">trick<\/span><span data-contrast=\"none\">\u00a0users\u00a0<\/span><span data-contrast=\"none\">in<\/span><span data-contrast=\"none\">to\u00a0<\/span><span data-contrast=\"none\">giv<\/span><span data-contrast=\"none\">ing<\/span><span data-contrast=\"none\">\u00a0up their credentials.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2>Act Now to Stay Protected<\/h2>\n<p><span data-contrast=\"none\">So,<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">w<\/span><span data-contrast=\"none\">hether you\u2019re\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/consumer-threat-notices\/scams-in-the-wfh-landscape\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">working from home<\/span><\/a><span data-contrast=\"none\">,\u00a0<\/span><span data-contrast=\"none\">participating in\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/consumer-threat-notices\/stay-secure-while-distance-learning\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">distance learning<\/span><\/a><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">to complete college courses<\/span><span data-contrast=\"none\">, or\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/consumer-threat-notices\/how-secure-is-video-conferencing\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">video chatting<\/span><\/a><span data-contrast=\"none\">\u00a0with<\/span><span data-contrast=\"none\">\u00a0loved ones,\u00a0<\/span><span data-contrast=\"none\">there will always be fraudsters looking to exploit your online activity.\u00a0<\/span><span data-contrast=\"none\">However, there are proactive measures you can take to help ensure your security.\u00a0<\/span><span data-contrast=\"none\">First and foremost is using\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-total-protection.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">comprehensive security software<\/span><\/a><span data-contrast=\"none\">.\u00a0<\/span><span data-contrast=\"none\">If you\u2019ve never been targeted by a phishing scam, it might be difficult to envision the benefit of installing a security solution.\u00a0<\/span><span data-contrast=\"none\">You might even be convinced that if you haven\u2019t\u00a0<\/span><span data-contrast=\"none\">been targeted yet, then you won\u2019t be in the future. However,\u00a0<\/span><span data-contrast=\"none\">there\u2019s no off-season when it comes to security.\u00a0<\/span><span data-contrast=\"none\">A<\/span><span data-contrast=\"none\">s<\/span><span data-contrast=\"none\">\u00a0fraudsters continue to evolve their techniques, employ<\/span><span data-contrast=\"none\">ing the help of security software\u00a0<\/span><span data-contrast=\"none\">will act as an added safety net in the event that a phishing email\u00a0<\/span><span data-contrast=\"none\">appears in your inbox.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Aside from using comprehensive security software, here are some other tips to help protect your online security.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3>Go directly to the source<\/h3>\n<p><span data-contrast=\"auto\">Be skeptical of emails\u00a0<\/span><span data-contrast=\"auto\">or text messages\u00a0<\/span><span data-contrast=\"auto\">claiming to be from organizations with peculiar asks or<\/span><span data-contrast=\"auto\">\u00a0with information that seems too good to be true<\/span><span data-contrast=\"auto\">. Instead of clicking on a link within the email<\/span><span data-contrast=\"auto\">\u00a0or text<\/span><span data-contrast=\"auto\">, it\u2019s best to go straight to the organization\u2019s website or contact customer service.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3>Be cautious of emails asking you to\u00a0act<\/h3>\n<p><span data-contrast=\"auto\">If you receive an email\u00a0<\/span><span data-contrast=\"auto\">or text\u00a0<\/span><span data-contrast=\"auto\">asking you to take a certain action or download software, don\u2019t click on anything within the message. Instead, go straight to the organization\u2019s website. This will prevent you from downloading malicious content from phishing links.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3>Hover over links to see and verify the URL<\/h3>\n<p><span data-contrast=\"auto\">If someone sends you a<\/span><span data-contrast=\"auto\">\u00a0message\u00a0<\/span><span data-contrast=\"auto\">with a link, hover over the link without actually clicking on it. This will allow you to see a link preview. If the URL looks suspicious, don\u2019t interact with it and delete the\u00a0<\/span><span data-contrast=\"auto\">message<\/span><span data-contrast=\"auto\">\u00a0altogether.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2>Stay Updated<\/h2>\n<p><span data-contrast=\"auto\">To stay updated on all things\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">McAfee<\/span><\/a><span data-contrast=\"auto\">\u00a0and on top of the latest consumer and mobile security threats, follow\u00a0<\/span><a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">@<\/span><span data-contrast=\"none\">McAfee_Home<\/span><\/a><span data-contrast=\"auto\">\u00a0on Twitter, listen to our podcast\u00a0<\/span><a href=\"https:\/\/geo.itunes.apple.com\/podcast\/us\/id1257232208?mt=2&amp;at=1010lbVy&amp;ct=mcafeehackable_GaryBlog_EndBlurb\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Hackable?<\/span><\/a><span data-contrast=\"auto\">, and \u2018Like\u2019 us on\u00a0<\/span><a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Facebook<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing is one of the oldest cyberthreats in the book, and yet still one of the most effective.\u00a0As\u00a0people\u00a0across the globe&#8230;<\/p>\n","protected":false},"author":674,"featured_media":101227,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,10661],"tags":[3949,4452,3952,214,4185],"coauthors":[3973],"class_list":["post-101226","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-internet-security","tag-cybersafety","tag-cybersecurity","tag-internet-security","tag-mobile-security1","tag-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is Phishing and How to Protect Yourself | McAfee<\/title>\n<meta name=\"description\" content=\"Phishing is one of the oldest cyberthreats and yet still one of the most effective. As people find themselves taking to the internet more than ever before, criminals see this as an opportunity to release phishing attacks on unsuspecting users. Let\u2019s take a look at why phishing is so effective even in 2020.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Phishing and How to Protect Yourself | McAfee\" \/>\n<meta property=\"og:description\" content=\"Phishing is one of the oldest cyberthreats and yet still one of the most effective. As people find themselves taking to the internet more than ever before, criminals see this as an opportunity to release phishing attacks on unsuspecting users. Let\u2019s take a look at why phishing is so effective even in 2020.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-19T16:00:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-04T11:30:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter46.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Protect Yourself Against Phishing Scams With These Security Tips\",\"datePublished\":\"2020-05-19T16:00:07+00:00\",\"dateModified\":\"2024-07-04T11:30:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/\"},\"wordCount\":959,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter46.jpg\",\"keywords\":[\"cybersafety\",\"cybersecurity\",\"internet security\",\"mobile security\",\"Phishing\"],\"articleSection\":[\"How To Guides and Tutorials\",\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/\",\"name\":\"What Is Phishing and How to Protect Yourself | McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter46.jpg\",\"datePublished\":\"2020-05-19T16:00:07+00:00\",\"dateModified\":\"2024-07-04T11:30:35+00:00\",\"description\":\"Phishing is one of the oldest cyberthreats and yet still one of the most effective. As people find themselves taking to the internet more than ever before, criminals see this as an opportunity to release phishing attacks on unsuspecting users. Let\u2019s take a look at why phishing is so effective even in 2020.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter46.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter46.jpg\",\"width\":1024,\"height\":576,\"caption\":\"Making Media #FromHome\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protect Yourself Against Phishing Scams With These Security Tips\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is Phishing and How to Protect Yourself | McAfee","description":"Phishing is one of the oldest cyberthreats and yet still one of the most effective. As people find themselves taking to the internet more than ever before, criminals see this as an opportunity to release phishing attacks on unsuspecting users. Let\u2019s take a look at why phishing is so effective even in 2020.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What Is Phishing and How to Protect Yourself | McAfee","og_description":"Phishing is one of the oldest cyberthreats and yet still one of the most effective. As people find themselves taking to the internet more than ever before, criminals see this as an opportunity to release phishing attacks on unsuspecting users. Let\u2019s take a look at why phishing is so effective even in 2020.","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2020-05-19T16:00:07+00:00","article_modified_time":"2024-07-04T11:30:35+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter46.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Protect Yourself Against Phishing Scams With These Security Tips","datePublished":"2020-05-19T16:00:07+00:00","dateModified":"2024-07-04T11:30:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/"},"wordCount":959,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter46.jpg","keywords":["cybersafety","cybersecurity","internet security","mobile security","Phishing"],"articleSection":["How To Guides and Tutorials","Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/","name":"What Is Phishing and How to Protect Yourself | McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter46.jpg","datePublished":"2020-05-19T16:00:07+00:00","dateModified":"2024-07-04T11:30:35+00:00","description":"Phishing is one of the oldest cyberthreats and yet still one of the most effective. As people find themselves taking to the internet more than ever before, criminals see this as an opportunity to release phishing attacks on unsuspecting users. Let\u2019s take a look at why phishing is so effective even in 2020.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter46.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter46.jpg","width":1024,"height":576,"caption":"Making Media #FromHome"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/protect-yourself-against-phishing-scams-with-these-security-tips\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Protect Yourself Against Phishing Scams With These Security Tips"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/101226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=101226"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/101226\/revisions"}],"predecessor-version":[{"id":195931,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/101226\/revisions\/195931"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/101227"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=101226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=101226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=101226"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=101226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}