{"id":168822,"date":"2025-03-27T04:43:34","date_gmt":"2025-03-27T11:43:34","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=168822"},"modified":"2025-03-27T09:22:59","modified_gmt":"2025-03-27T16:22:59","slug":"plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/","title":{"rendered":"How to Spot Phishing Emails and Scams"},"content":{"rendered":"<p><span data-contrast=\"auto\">There are plenty of phish in the sea.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Millions of bogus phishing emails land in millions of inboxes each day with one purpose in mind\u2014to rip off the recipient. Whether they\u2019re out to crack your bank account, steal personal information, or both, you can learn how to spot phishing emails and keep yourself safe.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">And some of today\u2019s phishing emails are indeed getting tougher to spot.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">They seem like they come from companies you know and trust, like your bank, your credit card company, or services like Netflix, PayPal, and Amazon. And some of them look convincing. The writing and the layout are crisp, and the overall presentation looks professional. Yet still, there\u2019s still something <\/span><i><span data-contrast=\"auto\">off <\/span><\/i><span data-contrast=\"auto\">about them.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">And there\u2019s certainly something wrong with that email. It was written by a scammer. Phishing emails employ a bait-and-hook tactic, where an urgent or enticing message is the bait and malware or a link to a phony login page is the hook.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Once the hook gets set, several things might happen. That phony login page may steal account and personal information. Or that malware might install keylogging software that steals information, viruses that open a back door through which data can get hijacked, or ransomware that holds a device and its data hostage until a fee is paid.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Again, you can sidestep these attacks if you know how to spot them. There are signs.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Let\u2019s look at how prolific these attacks are, pick apart a few examples, and then break down the things you should look for.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Phishing attack statistics\u2014the millions of attempts made each year.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">In the U.S. alone, <\/span><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.ic3.gov.mcas.ms%2FMedia%2FPDF%2FAnnualReport%2F2022_IC3Report.pdf%3FMcasTsid%3D20892&amp;McasCSRF=ba1878bf5b9fb23f947ed19bdeb213e5161fbe720799051ebb90e3461e198352\"><span data-contrast=\"none\">more than 300,000 victims reported a phishing attack to the FBI<\/span><\/a><span data-contrast=\"auto\"> in 2022. Phishing attacks topped the list of reported complaints, roughly six times greater than the second top offender, personal data breaches. The actual figure is undoubtedly higher, given that not all attacks get reported.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Looking at phishing attacks worldwide, <\/span><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.cnbc.com.mcas.ms%2F2023%2F01%2F07%2Fphishing-attacks-are-increasing-and-getting-more-sophisticated.html%3FMcasTsid%3D20892&amp;McasCSRF=ba1878bf5b9fb23f947ed19bdeb213e5161fbe720799051ebb90e3461e198352\"><span data-contrast=\"none\">one study<\/span><\/a><span data-contrast=\"auto\"> suggests that more than 255 million phishing attempts were made in the second half of 2022 alone. That marks a 61% increase over the previous year. <\/span><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.darkreading.com.mcas.ms%2Fcloud%2F25-of-phishing-emails-sneak-into-office-365-report%3FMcasTsid%3D20892&amp;McasCSRF=ba1878bf5b9fb23f947ed19bdeb213e5161fbe720799051ebb90e3461e198352\"><span data-contrast=\"none\">Another study<\/span><\/a><span data-contrast=\"auto\"> concluded that 1 in every 99 mails sent contained a phishing attack.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Yet scammers <\/span><span data-contrast=\"none\">won&#8217;t<\/span><span data-contrast=\"auto\"> always cast such a wide net. Statistics point to a rise in targeted spear phishing, where the attacker goes after a specific person. They will often target people at businesses who have the authority to transfer funds or make payments. Other targets include people who have access to sensitive information like passwords, proprietary data, and account information.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As such, the price of these attacks can get costly. In 2022, the FBI received 21,832 complaints from businesses that said they fell victim to a spear phishing attack. The adjusted losses were over $2.7 billion\u2014an average cost of $123,671 per attack.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">So while exacting phishing attack statistics remain somewhat elusive, there\u2019s no question that phishing attacks are prolific. And costly.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">What does a phishing attack look like?<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Nearly every phishing attack sends an urgent message. One designed to get you to act.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Some examples \u2026<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">\u201cYou\u2019ve won our cash prize drawing! Send us your banking information so we can deposit your winnings!\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">\u201cYou owe back taxes. Send payment immediately using this link or we will refer your case to law enforcement.\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">\u201cWe spotted what <\/span><span data-contrast=\"none\">might<\/span><span data-contrast=\"auto\"> be unusual activity on your credit card. Follow this link to confirm your account information.\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">\u201cThere was an unauthorized attempt to access your streaming account. Click here to verify your identity.\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">\u201cYour package was undeliverable. Click the attached document to provide delivery instructions.\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">When set within a nice design and paired some official-looking logos, it\u2019s easy to see why plenty of people click the link or attachment that comes <\/span><span data-contrast=\"none\">with<\/span><span data-contrast=\"auto\"> messages like these.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">And that\u2019s the tricky thing with phishing attacks. Scammers have leveled up their game in recent years. Their phishing emails can look convincing. Not long ago, you could point to misspellings, lousy grammar, poor design, and logos that looked stretched or that used the wrong colors. Poorly executed phishing attacks like that still make their way into the world. However, it\u2019s increasingly common to see far more sophisticated attacks today. Attacks that appear like a genuine message or notice.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Case in point:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168907\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ppal.png\" alt=\"\" width=\"338\" height=\"284\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ppal.png 338w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ppal-300x252.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ppal-154x129.png 154w\" sizes=\"auto, (max-width: 338px) 100vw, 338px\" \/><\/p>\n<p><span data-contrast=\"auto\">Say you got an email that said your PayPal account had an issue. Would you <\/span><span data-contrast=\"none\">type<\/span><span data-contrast=\"auto\"> your account information here if you found yourself on this page? If so, you would have handed over your information to a scammer.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">We took the screenshot above as part of following a phishing attack to its end\u2014without entering any legitimate info, of course. In fact, we entered a garbage email address and password, and it still let us in. That\u2019s because the scammers were after other information, as you\u2019ll soon see.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As we dug into the site more deeply, it looked pretty spot on. The design mirrored PayPal\u2019s style, and the footer links appeared official enough. Yet then we looked more closely.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168865\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ppal-2.png\" alt=\"\" width=\"636\" height=\"223\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ppal-2.png 636w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ppal-2-300x105.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ppal-2-205x72.png 205w\" sizes=\"auto, (max-width: 636px) 100vw, 636px\" \/><\/p>\n<p><span data-contrast=\"auto\">Note the subtle errors, like \u201ccard informations\u201d and \u201cConfiguration of my activity.\u201d While companies make grammatical errors on occasion, spotting them in an interface should hoist a big red flag. Plus, the site asks for credit card information very early in the process. All suspicious.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Here\u2019s where the attackers really got bold.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168879\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ppal-3.png\" alt=\"\" width=\"349\" height=\"237\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ppal-3.png 349w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ppal-3-300x204.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ppal-3-190x129.png 190w\" sizes=\"auto, (max-width: 349px) 100vw, 349px\" \/><\/p>\n<p><span data-contrast=\"auto\">They ask for bank \u201cinformations,\u201d which not only <\/span><span data-contrast=\"none\">includes<\/span><span data-contrast=\"auto\"> routing and account <\/span><span data-contrast=\"none\">numbers,<\/span><span data-contrast=\"auto\"> but they ask for the account password too. As said, bold. And entirely bogus.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Taken all together, the subtle errors and the bald-faced grab for exacting account information clearly mark this as a scam.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Let\u2019s take a few steps back, though. Who sent the phishing email that directed us to this malicious site? None other than \u201cpaypal at inc dot-com.\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168893\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ppal-4.png\" alt=\"\" width=\"193\" height=\"96\" \/><\/p>\n<p><span data-contrast=\"auto\">Clearly, that\u2019s a phony email. And typical of a phishing attack where an attacker shoehorns a familiar name into an unassociated email address, in this case \u201cinc dot-com.\u201d Attackers may also gin up phony addresses that mimic official addresses, like \u201cpaypalcustsv dot-com.\u201d Anything to trick you.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Likewise, the malicious site that the phishing email sent us to used a spoofed address as well. It had no official association with PayPal at all\u2014which is proof positive of a phishing attack.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Note that companies only send emails from their official domain names, just as their sites only use their official domain names. Several companies and organizations will list those official domains on their websites to help curb phishing attacks.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For example, <\/span><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.paypal.com.mcas.ms%2Ftc%2Fwebapps%2Fmpp%2Fsecurity%2Fcommon-scams%3FMcasTsid%3D20892&amp;McasCSRF=ba1878bf5b9fb23f947ed19bdeb213e5161fbe720799051ebb90e3461e198352\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">PayPal has a page that clearly states how it will and will not contact you<\/span><\/a><span data-contrast=\"auto\">. At McAfee, <\/span><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.mcafee.com.mcas.ms%2Fen-us%2Fcyber-scam%2Fcustomer-scam-awareness.html%3FMcasTsid%3D20892&amp;McasCSRF=ba1878bf5b9fb23f947ed19bdeb213e5161fbe720799051ebb90e3461e198352\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">we have an entire page dedicated to preventing phishing attacks<\/span><\/a><span data-contrast=\"auto\">, which also lists the official email addresses we use.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Other examples of phishing attacks<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Not every scammer is so sophisticated, at least in the way that they design their phishing emails. We can point to a few phishing emails that posed as legitimate communication from McAfee as examples.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">There\u2019s a lot going on in this first email example. The scammers try to mimic the McAfee brand, yet don\u2019t pull it off. Still, they do several things to try to act convincing.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168823\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ad-1.png\" alt=\"\" width=\"184\" height=\"280\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ad-1.png 184w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ad-1-85x129.png 85w\" sizes=\"auto, (max-width: 184px) 100vw, 184px\" \/><\/p>\n<p><span data-contrast=\"auto\">Note the use of photography and the box shot of our software, paired with a prominent \u201cact now\u201d headline. It\u2019s not the style of photography we use. Not that people would generally know this. However, some might have a passing thought like, \u201cHuh. That doesn\u2019t really look like what McAfee usually sends me.\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Beyond that, there are a few capitalization errors, some misplaced punctuation, and the \u201corder now\u201d and \u201c60% off\u201d icons look rather slapped on. Also note the little dash of fear it throws in with <\/span><span data-contrast=\"none\">a mention<\/span><span data-contrast=\"auto\"> of \u201cThere are (42) viruses on your computer \u2026\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Taken all together, someone can readily spot that this is a scam with a closer look.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This next ad falls into the less sophisticated category. It\u2019s practically all text and goes heavy on the red ink. Once again, it hosts plenty of capitalization errors, <\/span><span data-contrast=\"none\">with<\/span><span data-contrast=\"auto\"> a few gaffes in grammar as well. In all, it doesn\u2019t read smoothly. Nor is it easy on the eye, as a proper email about your account should<\/span><span data-contrast=\"none\"> be.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-168837 size-medium\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ad-2-268x300.png\" alt=\"\" width=\"268\" height=\"300\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ad-2-268x300.png 268w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ad-2-115x129.png 115w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ad-2.png 469w\" sizes=\"auto, (max-width: 268px) 100vw, 268px\" \/><\/p>\n<p><span data-contrast=\"auto\">What sets this example apart is the \u201cadvertisement\u201d disclaimer below, which <\/span><span data-contrast=\"none\">tries<\/span><span data-contrast=\"auto\"> to lend the attack some legitimacy. Also note the phony \u201cunsubscribe\u201d link, plus the (scratched out) mailing address and phone, which all try to do the same.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This last example doesn\u2019t get our font right, and the trademark symbol is awkwardly placed. The usual grammar and capitalization errors crop up again, yet this piece of phishing takes a slightly different approach.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168851\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ad-3.jpg\" alt=\"\" width=\"162\" height=\"169\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ad-3.jpg 162w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ad-3-124x129.jpg 124w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/ad-3-24x24.jpg 24w\" sizes=\"auto, (max-width: 162px) 100vw, 162px\" \/><\/p>\n<p><span data-contrast=\"auto\">The scammers placed a little timer at the bottom of the email. That adds a degree of scarcity. They want you to think that you have about half an hour before you are unable to register for protection. That\u2019s bogus<\/span><span data-contrast=\"none\">,<\/span><span data-contrast=\"auto\"> of course.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Seeing any recurring themes? There are a few for sure. With these examples in mind, get into the details\u2014how you can spot phishing attacks and how you can avoid them altogether.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">How to spot and prevent phishing attacks.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Just as we saw, some phishing attacks indeed appear fishy from the start. Yet sometimes it takes a bit of time and a particularly critical eye to spot.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">And that\u2019s what scammers count on. They hope that you\u2019re moving quickly or otherwise a little preoccupied when you\u2019re going through your email or messages. <\/span><span data-contrast=\"none\">Distracted enough<\/span><span data-contrast=\"auto\"> so that you <\/span><span data-contrast=\"none\">might<\/span><span data-contrast=\"auto\"> not pause to think, <\/span><span data-contrast=\"none\">is<\/span><span data-contrast=\"auto\"> this message really legit?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">One of the best ways to beat scammers is to take a moment to scrutinize that message while keeping the following in mind \u2026<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">They play on your emotions.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Fear. That\u2019s a big one. Maybe it\u2019s an angry-sounding email from a government agency saying that you owe back taxes. Or maybe it\u2019s another from a family member asking for money because there\u2019s an emergency. Either way, scammers will lean heavily on fear as a motivator.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">If you receive such a message, think twice. Consider if it\u2019s genuine. For instance, consider that tax email example. In the U.S., <\/span><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.irs.gov.mcas.ms%2Fnewsroom%2Fhow-to-know-its-really-the-irs-calling-or-knocking-on-your-door%3FMcasTsid%3D20892&amp;McasCSRF=ba1878bf5b9fb23f947ed19bdeb213e5161fbe720799051ebb90e3461e198352\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">the Internal Revenue Service (IRS) has specific guidelines as to how and when they will contact you<\/span><\/a><span data-contrast=\"auto\">. As a rule, they will <\/span><span data-contrast=\"none\">likely<\/span><span data-contrast=\"auto\"> contact you via physical mail delivered by the U.S. Postal Service. (They won\u2019t call or apply pressure tactics\u2014only scammers do that.) Likewise, other nations will have similar standards as well.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">They ask you to act\u2014NOW.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Scammers also love urgency. Phishing attacks begin by stirring up your emotions and getting you to act quickly. Scammers <\/span><span data-contrast=\"none\">might<\/span><span data-contrast=\"auto\"> use threats or overly excitable language to create that sense of urgency, both of which are clear signs of a potential scam.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Granted, legitimate businesses and organizations <\/span><span data-contrast=\"none\">might<\/span><span data-contrast=\"auto\"> reach out to notify you of a late payment or possible illicit activity on one of your accounts. Yet they\u2019ll take a far more professional and even-handed tone than a scammer would. For example, it\u2019s highly unlikely that your local electric utility will angrily shut off your service if you don\u2019t pay your past due bill immediately.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">They want you to pay a certain way.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Gift cards, cryptocurrency, money orders\u2014these forms of payment are another sign that you <\/span><span data-contrast=\"none\">might<\/span><span data-contrast=\"auto\"> be looking at a phishing attack. Scammers prefer these methods of payment because they\u2019re difficult to trace. Additionally, consumers have little or no way to recover lost funds <\/span><span data-contrast=\"none\">from these payment methods<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Legitimate businesses and organizations <\/span><span data-contrast=\"none\">won&#8217;t<\/span><span data-contrast=\"auto\"> ask for payments in those forms. If you get a message asking for payment in one of those forms, you can bet it\u2019s a scam.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">They use mismatched addresses.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Here\u2019s another way you can spot a phishing attack. Take a close look at the addresses the message is using. If it\u2019s an email, look at the email address. Maybe the address doesn\u2019t match the company or organization at all. Or maybe it does somewhat, yet it adds a few letters or words to the name. This marks yet another sign that you <\/span><span data-contrast=\"none\">might<\/span><span data-contrast=\"auto\"> have a phishing attack on your hands.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Likewise, if the message contains a web link, closely examine that as well. If the name looks at all unfamiliar or altered from the way you\u2019ve seen it before, that <\/span><span data-contrast=\"none\">might<\/span><span data-contrast=\"auto\"> also mean you\u2019re looking at a phishing attempt.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Protect yourself from phishing attacks<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Go directly to the source.<\/span><\/b><span data-contrast=\"auto\"> Some phishing attacks can look convincing. So much so that you\u2019ll want to follow up on them, like if your bank reports irregular activity on your account or a bill appears to be past due. In these cases, don\u2019t click on the link in the message. Go straight to the website of the business or organization in question and access your account from there. Likewise, if you have questions, you can always reach out to their customer service number or web page.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Follow up with the sender.<\/span><\/b><span data-contrast=\"auto\"> Keep an eye out for emails that might be a spear phishing attack. If an email that looks like it came from a family member, friend, or business associate, follow up with them to see if they sent it. Particularly if asks for money, contains a questionable attachment or link, or simply doesn\u2019t sound quite like them. Text, phone, or check in with them in person. Don\u2019t follow up by replying to the email, as it may have been compromised.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Don\u2019t download attachments.<\/span><\/b><span data-contrast=\"auto\"> Some phishing attacks send attachments packed with malware like the ransomware, viruses, and keyloggers we mentioned earlier. Scammers may pass them off as an invoice, a report, or even an offer for coupons. If you receive a message with such an attachment, delete it. And most certainly don\u2019t open it. Even if you receive an email with an attachment from someone you know, follow up with that person. Particularly if you weren\u2019t expecting an attachment from them. Scammers will often hijack or spoof email accounts of everyday people to spread malware.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Hover over links to verify the URL.<\/span><\/b><span data-contrast=\"auto\"> On computers and laptops, you can hover your cursor over links without clicking on them to see the web address. If the URL looks suspicious in any of the ways we mentioned just above, delete the message, and don\u2019t ever click.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<h2><b><span data-contrast=\"auto\">Protect yourself from email attacks even further<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Online protection software can protect you from phishing attacks in several ways.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For starters, it offers web protection that warns you when links lead to malicious websites, such as the ones used in phishing attacks. In the same way, online protection software can warn you about malicious downloads and email attachments so that you don\u2019t end up with malware on your device. And, if the unfortunate does happen, antivirus can block and remove malware.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Online protection software like ours can also address the root of the problem. Scammers must get your email address from somewhere. Often, they get it from online data brokers, sites that gather and sell personal information to any buyer\u2014scammers included.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Data brokers source this information from public records and third parties alike that they sell in bulk, providing scammers with massive mailing lists that can target thousands of potential victims. You can remove your personal info from some of the riskiest data broker sites with our <\/span><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.mcafee.com.mcas.ms%2Flearn%2Fpersonal-data-cleanup%2F%3FMcasTsid%3D20892&amp;McasCSRF=ba1878bf5b9fb23f947ed19bdeb213e5161fbe720799051ebb90e3461e198352\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Personal Data Cleanup<\/span><\/a><span data-contrast=\"auto\">, which can lower your exposure to scammers by keeping your email address out of their hands.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In all, phishing emails have telltale signs, some more difficult to see than others. Yet you can spot them when you know what to look for and take the time to look for them. With these attacks so prevalent and on the rise, looking at your email with a critical eye is a must today.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are plenty of phish in the sea.\u00a0 Millions of bogus phishing emails land in millions of inboxes each day&#8230;<\/p>\n","protected":false},"author":1408,"featured_media":183510,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,13],"tags":[6652,4185,5637],"coauthors":[15741],"class_list":["post-168822","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-privacy-identity-protection","tag-email-scams","tag-phishing","tag-phishing-attacks"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Spot Phishing Emails and Scams | McAfee Blog<\/title>\n<meta name=\"description\" content=\"There are plenty of phish in the sea.\u00a0 Millions of bogus phishing emails land in millions of inboxes each day with one purpose in mind\u2014to rip off the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Spot Phishing Emails and Scams | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"There are plenty of phish in the sea.\u00a0 Millions of bogus phishing emails land in millions of inboxes each day with one purpose in mind\u2014to rip off the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-27T11:43:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-27T16:22:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_051023.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Amy Bunn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amy Bunn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/\"},\"author\":{\"name\":\"Amy Bunn\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3\"},\"headline\":\"How to Spot Phishing Emails and Scams\",\"datePublished\":\"2025-03-27T11:43:34+00:00\",\"dateModified\":\"2025-03-27T16:22:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/\"},\"wordCount\":2644,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/1000x563_Blog_022124.png\",\"keywords\":[\"email scams\",\"Phishing\",\"phishing attacks\"],\"articleSection\":[\"How To Guides and Tutorials\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/\",\"name\":\"How to Spot Phishing Emails and Scams | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/1000x563_Blog_022124.png\",\"datePublished\":\"2025-03-27T11:43:34+00:00\",\"dateModified\":\"2025-03-27T16:22:59+00:00\",\"description\":\"There are plenty of phish in the sea.\u00a0 Millions of bogus phishing emails land in millions of inboxes each day with one purpose in mind\u2014to rip off the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/1000x563_Blog_022124.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/1000x563_Blog_022124.png\",\"width\":1000,\"height\":563},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy &amp; Identity Protection\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Plenty of Phish in the Sea\u2014Your Guide to Spotting Phishing Emails and Scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3\",\"name\":\"Amy Bunn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b58be83668cf2b1de7fb5b8a222bb835\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg\",\"caption\":\"Amy Bunn\"},\"description\":\"Amy Bunn is head of communications at McAfee and has worked in technology and cybersecurity for over 15 years. During this time, Amy has witnessed the changing technology landscape and the critical role that online protection plays today. Amy believes that families and individuals around the world should be free to enjoy all the benefits and advantages that the internet and technology afford and is passionate about making this a reality by discussing the very latest in cybersecurity tips and advice, which, when combined with robust online protection, can help empower people to live their life online with total confidence.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/amy-bunn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Spot Phishing Emails and Scams | McAfee Blog","description":"There are plenty of phish in the sea.\u00a0 Millions of bogus phishing emails land in millions of inboxes each day with one purpose in mind\u2014to rip off the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to Spot Phishing Emails and Scams | McAfee Blog","og_description":"There are plenty of phish in the sea.\u00a0 Millions of bogus phishing emails land in millions of inboxes each day with one purpose in mind\u2014to rip off the","og_url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2025-03-27T11:43:34+00:00","article_modified_time":"2025-03-27T16:22:59+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_051023.png","type":"image\/png"}],"author":"Amy Bunn","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Amy Bunn","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/"},"author":{"name":"Amy Bunn","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3"},"headline":"How to Spot Phishing Emails and Scams","datePublished":"2025-03-27T11:43:34+00:00","dateModified":"2025-03-27T16:22:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/"},"wordCount":2644,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/1000x563_Blog_022124.png","keywords":["email scams","Phishing","phishing attacks"],"articleSection":["How To Guides and Tutorials","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/","url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/","name":"How to Spot Phishing Emails and Scams | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/1000x563_Blog_022124.png","datePublished":"2025-03-27T11:43:34+00:00","dateModified":"2025-03-27T16:22:59+00:00","description":"There are plenty of phish in the sea.\u00a0 Millions of bogus phishing emails land in millions of inboxes each day with one purpose in mind\u2014to rip off the","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/1000x563_Blog_022124.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/1000x563_Blog_022124.png","width":1000,"height":563},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Privacy &amp; Identity Protection","item":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/"},{"@type":"ListItem","position":3,"name":"Plenty of Phish in the Sea\u2014Your Guide to Spotting Phishing Emails and Scams"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3","name":"Amy Bunn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b58be83668cf2b1de7fb5b8a222bb835","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg","caption":"Amy Bunn"},"description":"Amy Bunn is head of communications at McAfee and has worked in technology and cybersecurity for over 15 years. During this time, Amy has witnessed the changing technology landscape and the critical role that online protection plays today. Amy believes that families and individuals around the world should be free to enjoy all the benefits and advantages that the internet and technology afford and is passionate about making this a reality by discussing the very latest in cybersecurity tips and advice, which, when combined with robust online protection, can help empower people to live their life online with total confidence.","url":"https:\/\/www.mcafee.com\/blogs\/author\/amy-bunn\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/168822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1408"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=168822"}],"version-history":[{"count":9,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/168822\/revisions"}],"predecessor-version":[{"id":211602,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/168822\/revisions\/211602"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/183510"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=168822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=168822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=168822"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=168822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}