{"id":126926,"date":"2024-09-06T05:23:07","date_gmt":"2024-09-06T12:23:07","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=126926"},"modified":"2024-09-06T07:02:50","modified_gmt":"2024-09-06T14:02:50","slug":"how-to-spot-fake-login-pages","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/","title":{"rendered":"How to Spot Fake Login Pages\u202f"},"content":{"rendered":"<p><span data-contrast=\"auto\">Have you ever come across a website that just didn\u2019t look quite right? Perhaps the company logo looked slightly misshapen, or the font seemed off-brand. Odds are, you landed on a phony version of a legitimate corporation\u2019s website\u2014a tried and true tactic relied on by many cyber criminals.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Fake Login Pages Explained\u00a0<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">A fake login page is essentially a knock-off of a real login page used to trick people into entering their login credentials, which hackers can later use to break into online accounts. These websites mirror legitimate pages by using company logos, fonts, formatting, and overall templates. Depending on the attention to detail put in by the hackers behind the imposter website, it can be nearly impossible to distinguish from the real thing. Consequentially, fake login pages can be highly effective in their end goal: credential theft.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">How do these pages get in front of a consumer in the first place? Typically, scammers will target unsuspecting recipients with\u00a0<\/span><span data-contrast=\"auto\">phishing emails<\/span><span data-contrast=\"auto\"> spoofing a trusted brand. These emails may state that the user needs to reset their password or\u00a0entice them with a deal that sounds too good to be true. If the consumer clicks on the link in the email, they will be directed to the fake login page and asked to enter their username and password. Once they submit their information, cybercriminals can use\u00a0the consumer\u2019s data to conduct credential-stuffing attacks and hack their online profiles. This could lead to\u00a0credit card fraud, data extraction, wire transfers,\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">identity theft<\/span><\/a><span data-contrast=\"auto\">,\u00a0and more.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Why Fake Login Pages Are Effective <\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">If you Google \u201cfake login pages,\u201d you will quickly find countless guides on how to create fake websites in seconds. Ethical concerns aside, this demonstrates just how common vector-spoofed websites are for cyberattacks. While it has been easier to distinguish between real and fake login pages in the past, criminals are constantly updating their techniques to be more sophisticated, therefore making it more difficult for consumers to recognize their fraudulent schemes. <\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">One reason\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/onedrive-phishing-awareness\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">why fake login pages are so effective<\/span><\/a><span data-contrast=\"auto\">\u00a0is\u00a0due to\u00a0<\/span><a href=\"https:\/\/www.simplypsychology.org\/inattentional-blindness.html\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">inattentional blindness<\/span><\/a><span data-contrast=\"auto\">, or failure to notice something that is completely visible because of a lack of attention.\u202fOne of the most famous studies on inattentional blindness is the \u201cinvisible gorilla test.\u201d In this study, participants watched a video of people dressed in black and white shirts passing basketballs. Participants were asked to count the number of times the team in white passed the ball:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><iframe loading=\"lazy\" title=\"The Monkey Business Illusion\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/IGQmdoK_ZfY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p><span data-contrast=\"auto\">Because participants were intently focused on counting the number of times the players in white passed the ball, more than 50% failed to notice the person in the gorilla costume walking through the game. If this is the first time you\u2019ve seen this video, it\u2019s likely that you didn\u2019t notice the gorilla, the curtain changing color from red to gold, or the player in black leaving the game.\u00a0Similarly, if you come across a well-forged login page and aren\u2019t actively looking for signs of fraud, you could inherently miss a cybercriminal\u2019s \u201cinvisible gorilla.\u201d That\u2019s why it\u2019s crucial for even those with phishing training to practice caution when they come across a website asking them to take action or enter personal details.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">How to Steer Clear of Fake Login Pages\u00a0<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The most important defense against steering clear of fake login pages is knowing how to recognize them. Follow these tips to help you\u00a0decipher\u00a0between a legitimate and a fake website:\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">1. Don\u2019t\u202ffall for phishing <\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">Most fake login pages are circulated via <\/span><span data-contrast=\"auto\">phishing<\/span><span data-contrast=\"auto\">\u00a0messages.\u00a0If you receive a suspicious message that asks for personal details, there are a few ways to determine if it was sent by a phisher aiming to steal your identity.\u202fPhishers often\u202fsend messages with a tone of urgency,\u202fand they try to inspire extreme emotions such as excitement or fear. If an unsolicited email urges you to \u201cact fast!\u201d slow down and evaluate the situation.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">2. Look for misspellings or grammatical errors\u00a0<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">Oftentimes, hackers will use a URL for their spoofed website that is just one character off from the legitimate site, such as using \u201cwww.rbcr0yalbank.com\u201d versus \u201cwww.rbcroyalbank.com.\u201d Before clicking on any website from an email asking you to act, hover over the link with your cursor. This will allow you to preview the URL and identify any suspicious misspellings or grammatical errors before navigating to a potentially dangerous website.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">3. Ensure the website is secured with HTTPS<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">HTTPS, or\u00a0Hypertext Transfer Protocol Secure, is a protocol that encrypts your interaction with a website. Typically, websites that begin with\u00a0HTTPS\u00a0and feature a padlock in the top left corner are considered safer. However, cybercriminals have more recently developed malware toolkits that\u00a0leverage\u202f<\/span><b><span data-contrast=\"auto\">HTTPS<\/span><\/b><span data-contrast=\"auto\">\u202fto hide malware from detection by various\u00a0security\u00a0defenses. If the website is secured with HTTPS, ensure that this isn\u2019t the only way you\u2019re analyzing the page for online safety.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">4. Enable multi-factor authentication<\/span><\/b><span data-contrast=\"auto\">\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">Multi-factor authentication requires that users confirm\u202fa collection of things to verify their identity\u2014usually something they have, and a factor unique to their physical being\u2014such as a retina or fingerprint scan.\u202fThis can prevent a cybercriminal from using\u202fcredential-stuffing\u202ftactics (where\u202fthey\u202fwill use email and password combinations to hack into online profiles) to access your network or account if your login\u202fdetails\u202fwere\u202fever exposed during a data breach.\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">5. Sign up for an identity theft alert service<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">An identity theft alert service\u202fwarns\u202fyou about suspicious activity\u202fsurrounding your personal information, allowing you to jump to action before irreparable damage is done.\u202f<\/span><span data-contrast=\"auto\"><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\"><a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\">McAfee+<\/a> not<\/span>\u00a0only keeps your devices safe from viruses but gives you the added peace of mind\u202fthat your identity is secure, as well.\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever come across a website that just didn\u2019t look quite right? Perhaps the company logo looked slightly misshapen,&#8230;<\/p>\n","protected":false},"author":1407,"featured_media":200047,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,13],"tags":[10610,10613],"coauthors":[15735],"class_list":["post-126926","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-privacy-identity-protection","tag-fake-login","tag-fake-login-attack"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Spot Fake Login Pages\u202f | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Have you ever come across a website that just didn\u2019t look quite right? Perhaps the company logo looked slightly misshapen, or the font seemed off-brand. A fake login page is essentially a knock-off of a real login page used to trick people into entering their login credentials, with which hackers can later use to break into online accounts. These websites mirror legitimate pages by using company logos, fonts, formatting, and overall templates. Depending on the attention to detail put in by the hackers behind the imposter website, it can be nearly impossible to distinguish from the real thing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Spot Fake Login Pages\u202f | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Have you ever come across a website that just didn\u2019t look quite right? Perhaps the company logo looked slightly misshapen, or the font seemed off-brand. A fake login page is essentially a knock-off of a real login page used to trick people into entering their login credentials, with which hackers can later use to break into online accounts. These websites mirror legitimate pages by using company logos, fonts, formatting, and overall templates. Depending on the attention to detail put in by the hackers behind the imposter website, it can be nearly impossible to distinguish from the real thing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-06T12:23:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-06T14:02:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/how-to-spot-fake-300x200-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jasdev Dhaliwal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jasdev Dhaliwal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/\"},\"author\":{\"name\":\"Jasdev Dhaliwal\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\"},\"headline\":\"How to Spot Fake Login Pages\u202f\",\"datePublished\":\"2024-09-06T12:23:07+00:00\",\"dateModified\":\"2024-09-06T14:02:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/\"},\"wordCount\":966,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_090624.png\",\"keywords\":[\"fake login\",\"fake login attack\"],\"articleSection\":[\"How To Guides and Tutorials\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/\",\"name\":\"How to Spot Fake Login Pages\u202f | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_090624.png\",\"datePublished\":\"2024-09-06T12:23:07+00:00\",\"dateModified\":\"2024-09-06T14:02:50+00:00\",\"description\":\"Have you ever come across a website that just didn\u2019t look quite right? Perhaps the company logo looked slightly misshapen, or the font seemed off-brand. A fake login page is essentially a knock-off of a real login page used to trick people into entering their login credentials, with which hackers can later use to break into online accounts. These websites mirror legitimate pages by using company logos, fonts, formatting, and overall templates. Depending on the attention to detail put in by the hackers behind the imposter website, it can be nearly impossible to distinguish from the real thing.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_090624.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_090624.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy &amp; Identity Protection\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Spot Fake Login Pages\u202f\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\",\"name\":\"Jasdev Dhaliwal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"caption\":\"Jasdev Dhaliwal\"},\"description\":\"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/jasdhaliwal\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Spot Fake Login Pages\u202f | McAfee Blog","description":"Have you ever come across a website that just didn\u2019t look quite right? Perhaps the company logo looked slightly misshapen, or the font seemed off-brand. A fake login page is essentially a knock-off of a real login page used to trick people into entering their login credentials, with which hackers can later use to break into online accounts. These websites mirror legitimate pages by using company logos, fonts, formatting, and overall templates. Depending on the attention to detail put in by the hackers behind the imposter website, it can be nearly impossible to distinguish from the real thing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to Spot Fake Login Pages\u202f | McAfee Blog","og_description":"Have you ever come across a website that just didn\u2019t look quite right? Perhaps the company logo looked slightly misshapen, or the font seemed off-brand. A fake login page is essentially a knock-off of a real login page used to trick people into entering their login credentials, with which hackers can later use to break into online accounts. These websites mirror legitimate pages by using company logos, fonts, formatting, and overall templates. Depending on the attention to detail put in by the hackers behind the imposter website, it can be nearly impossible to distinguish from the real thing.","og_url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-09-06T12:23:07+00:00","article_modified_time":"2024-09-06T14:02:50+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/how-to-spot-fake-300x200-1.jpg","type":"image\/jpeg"}],"author":"Jasdev Dhaliwal","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Jasdev Dhaliwal","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/"},"author":{"name":"Jasdev Dhaliwal","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f"},"headline":"How to Spot Fake Login Pages\u202f","datePublished":"2024-09-06T12:23:07+00:00","dateModified":"2024-09-06T14:02:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/"},"wordCount":966,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_090624.png","keywords":["fake login","fake login attack"],"articleSection":["How To Guides and Tutorials","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/","url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/","name":"How to Spot Fake Login Pages\u202f | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_090624.png","datePublished":"2024-09-06T12:23:07+00:00","dateModified":"2024-09-06T14:02:50+00:00","description":"Have you ever come across a website that just didn\u2019t look quite right? Perhaps the company logo looked slightly misshapen, or the font seemed off-brand. A fake login page is essentially a knock-off of a real login page used to trick people into entering their login credentials, with which hackers can later use to break into online accounts. These websites mirror legitimate pages by using company logos, fonts, formatting, and overall templates. Depending on the attention to detail put in by the hackers behind the imposter website, it can be nearly impossible to distinguish from the real thing.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_090624.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_090624.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Privacy &amp; Identity Protection","item":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/"},{"@type":"ListItem","position":3,"name":"How to Spot Fake Login Pages\u202f"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f","name":"Jasdev Dhaliwal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","caption":"Jasdev Dhaliwal"},"description":"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.","sameAs":["https:\/\/www.linkedin.com\/in\/jasdhaliwal\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/126926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1407"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=126926"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/126926\/revisions"}],"predecessor-version":[{"id":200078,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/126926\/revisions\/200078"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/200047"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=126926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=126926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=126926"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=126926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}