{"id":77546,"date":"2024-08-23T06:39:15","date_gmt":"2024-08-23T13:39:15","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=77546"},"modified":"2024-08-23T07:00:37","modified_gmt":"2024-08-23T14:00:37","slug":"spot-phishing-lures","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/","title":{"rendered":"How to Spot Phishing Lures"},"content":{"rendered":"<p>Phishing attacks have all kinds of lures. And many are so tried and true that it makes them easy to spot.<\/p>\n<p>The target of a phishing attack is you. More specifically, your personal info and your money. Whether a scammer reaches out by email, with a text, or through a direct message, that\u2019s what they\u2019re after. And with a link, they whisk you off to a sketchy site designed to take them from you.<\/p>\n<p>Just how much phishing is going on? To date, we\u2019ve identified more than half a billion malicious sites out there. A number that grows daily. Because these attacks often succeed. One big reason why \u2014 they play on people\u2019s emotions.<\/p>\n<p>Phishing attacks always involve a form of \u201csocial engineering,\u201d which is an academic way of saying that scammers use manipulation in their attacks. Commonly, scammers pretend to be a legitimate person or business.<\/p>\n<p>You can get a better idea of how this works by learning about some of the most popular scams circulating today:<\/p>\n<p><strong>The CEO Scam<\/strong><\/p>\n<p>This scam appears as an email from a leader in your organization, asking for highly sensitive info like company accounts, employee salaries, and Social Security numbers. The hackers \u201cspoof\u201d, or fake, the boss\u2019 email address so it looks like a legitimate internal company email. That\u2019s what makes this scam so convincing \u2014 the lure is that you want to do your job and please your boss. But keep this scam in mind if you receive an email asking for confidential or highly sensitive info. Ask the apparent sender directly whether the request is real before acting.<\/p>\n<p><strong>The Urgent Email Attachment<\/strong><\/p>\n<p>Phishing emails that try to trick you into downloading a dangerous attachment that can infect your computer and steal your private info have been around for a long time. This is because they work. You\u2019ve probably received emails asking you to download attachments confirming a package delivery, trip itinerary, or prize. They might urge you to \u201crespond immediately!\u201d The lure here is offering you something you want and invoking a sense of urgency to get you to click.<\/p>\n<p><strong>The \u201cLucky\u201d Text or Email<\/strong><\/p>\n<p>How fortunate! You\u2019ve won a free gift, an exclusive service, or a great deal on a trip to Las Vegas. Just remember, whatever \u201climited time offer\u201d you\u2019re being sold, it\u2019s probably a phishing scam designed to get you to give up your credit card number or identity info. The lure here is something free or exciting at what appears to be little or no cost to you.<\/p>\n<p><strong>The Romance Scam<\/strong><\/p>\n<p>This one can happen completely online, over the phone, or in person after contact is established. But the romance scam always starts with someone supposedly looking for love. The scammer often puts a phony ad online or poses as a friend-of-a-friend on social media and contacts you directly. But what starts as the promise of love or partnership, often leads to requests for money or pricey gifts. The scammer will sometimes spin a hardship story, saying they need to borrow money to come visit you or pay their phone bill so they can stay in touch. The lure here is simple \u2014 love and acceptance.<\/p>\n<h2><strong>How to avoid phishing attacks<\/strong><\/h2>\n<p>While you can\u2019t outright stop phishing attacks from making their way to your computer or phone, you can do several things to keep yourself from falling for them. Further, you can do other things that might make it more difficult for scammers to reach you.<\/p>\n<ul>\n<li><strong>Pause and think about the message for a minute.<\/strong><\/li>\n<\/ul>\n<p>The content and the tone of the message can tell you quite a lot. Threatening messages or ones that play on fear are often phishing attacks, such as angry messages from a so-called tax agent looking to collect back taxes. Other messages will lean heavily on urgency, like a phony overdue payment notice. And during the holidays, watch out for loud, overexcited messages about deep discounts on hard-to-find items. Instead of linking you to a proper e-commerce site, they might link you to a scam shopping site that does nothing but steal your money and the account info you used to pay them. In all, phishing attacks indeed smell fishy. Slow down and review that message with a critical eye. It might tip you off to a scam.<\/p>\n<ul>\n<li><strong>Deal directly with the company or organization in question.<\/strong><\/li>\n<\/ul>\n<p>Some phishing attacks can look rather convincing. So much so that you\u2019ll want to follow up on them, like if your bank reports irregular activity on your account or a bill appears to be past due. In these cases, don\u2019t click on the link in the message. Go straight to the website of the business or organization in question and access your account from there. Likewise, if you have questions, you can always reach out to their customer service number or web page.<\/p>\n<ul>\n<li><strong>Consider the source.<\/strong><\/li>\n<\/ul>\n<p>When scammers contact you via social media, that can be a tell-tale sign of a scam. Consider, would an income tax collector contact you over social media? The answer there is no. For example, <a href=\"https:\/\/www.irs.gov\/newsroom\/how-to-know-its-really-the-irs-calling-or-knocking-on-your-door\" target=\"_blank\" rel=\"noopener\">in the U.S. the Internal Revenue Service (IRS) makes it clear that they will never contact taxpayers via social media<\/a>. (Let alone send angry, threatening messages.) In all, legitimate businesses and organizations don\u2019t use social media as a channel for official communications. They&#8217;ve accepted ways they will, and will not, contact you. If you have any doubts about a communication you received, contact the business or organization in question directly. Follow up with one of their customer service representatives.<\/p>\n<ul>\n<li><strong>Don\u2019t download attachments. And most certainly don\u2019t open them.<\/strong><\/li>\n<\/ul>\n<p>Some phishing attacks involve attachments packed with malware, like ransomware, viruses, and keyloggers. If you receive a message with such an attachment, delete it. Even if you receive an email with an attachment from someone you know, follow up with that person. Particularly if you weren\u2019t expecting an attachment from them. Scammers often hijack or spoof email accounts of everyday people to spread malware.<\/p>\n<ul>\n<li><strong>Hover over links to verify the URL.<\/strong><\/li>\n<\/ul>\n<p>On computers and laptops, you can hover your cursor over links without clicking on them to see the web address. Take a close look at the addresses the message is using. If it\u2019s an email, look at the email address. Maybe the address doesn\u2019t match the company or organization at all. Or maybe it looks like it almost does, yet it adds a few letters or words to the name. This marks yet another sign that you might have a phishing attack on your hands. Scammers also use the common tactic of a link shortener, which creates links that almost look like strings of indecipherable text. These shortened links mask the true address, which might indeed be a link to a scam site. Delete the message. If possible, report it. Many social media platforms and messaging apps have built-in controls for reporting suspicious accounts and messages.<\/p>\n<ul>\n<li><strong>Go with who you know.<\/strong><\/li>\n<\/ul>\n<p>On social media and messaging platforms, stick to following, friending, and messaging people who you really know. As for those people who contact you out of the blue, be suspicious. Sad to say, they\u2019re often scammers canvassing these platforms for victims. Better yet, where you can, set your profile to private, which makes it more difficult for scammers to select and stalk you for an attack.<\/p>\n<ul>\n<li><strong>Remove your personal <\/strong><strong>info<\/strong><strong> from sketchy data broker sites.<\/strong><\/li>\n<\/ul>\n<p>How\u2019d that scammer get your phone number or email address anyway? Chances are, they pulled that info off a data broker site. Data brokers buy, collect, and sell detailed personal info, which they compile from several public and private sources, such as local, state, and federal records, plus third parties like supermarket shopper\u2019s cards and mobile apps that share and sell user data. Moreover, they\u2019ll sell it to anyone who pays for it, including people who\u2019ll use that info for scams. You can help reduce those scam texts and calls by removing your info from those sites. <a href=\"https:\/\/www.mcafee.com\/learn\/personal-data-cleanup\/?path=blogs\">Our Personal Data Cleanup<\/a> scans some of the riskiest data broker sites and shows you which ones are selling your personal info.<\/p>\n<ul>\n<li><strong>Use online protection software.<\/strong><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\">Online protection software can protect you in several ways<\/a>. First, it can offer web protection features that can identify malicious links and downloads, which can help prevent clicking them. Further, features like our <a href=\"https:\/\/www.mcafee.com\/learn\/web-protection?path=blogs\" target=\"_blank\" rel=\"noopener\">web protection<\/a> can steer you away from dangerous websites and block malware and phishing sites if you accidentally click on a malicious link. Additionally, our <a href=\"https:\/\/www.mcafee.com\/learn\/mcafee-scam-protection?path=blogs\" target=\"_blank\" rel=\"noopener\">Scam Protection<\/a> feature warns you of sketchy links in emails, texts, and messages. And overall, strong virus and malware protection can further block any attacks on your devices. Be sure to protect your smartphones in addition to your computers and laptops as well, particularly given all the sensitive things we do on them, like banking, shopping, and booking rides and travel.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing attacks have all kinds of lures. And many are so tried and true that it makes them easy to&#8230;<\/p>\n","protected":false},"author":1407,"featured_media":199221,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,10661,13],"tags":[4452,5163,4185],"coauthors":[15735],"class_list":["post-77546","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-internet-security","category-privacy-identity-protection","tag-cybersecurity","tag-online-scams","tag-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Spot Phishing Lures | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Phishing attacks have all kinds of lures. And many are so tried and true that it makes them easy to spot. The target of a phishing attack is you. More\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Spot Phishing Lures | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Phishing attacks have all kinds of lures. And many are so tried and true that it makes them easy to spot. The target of a phishing attack is you. More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-23T13:39:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-23T14:00:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary.jpg\" \/>\n<meta name=\"author\" content=\"Jasdev Dhaliwal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jasdev Dhaliwal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/\"},\"author\":{\"name\":\"Jasdev Dhaliwal\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\"},\"headline\":\"How to Spot Phishing Lures\",\"datePublished\":\"2024-08-23T13:39:15+00:00\",\"dateModified\":\"2024-08-23T14:00:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/\"},\"wordCount\":1499,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/09\/300x200_Blog_082324.png\",\"keywords\":[\"cybersecurity\",\"online scams\",\"Phishing\"],\"articleSection\":[\"How To Guides and Tutorials\",\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/\",\"name\":\"How to Spot Phishing Lures | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/09\/300x200_Blog_082324.png\",\"datePublished\":\"2024-08-23T13:39:15+00:00\",\"dateModified\":\"2024-08-23T14:00:37+00:00\",\"description\":\"Phishing attacks have all kinds of lures. And many are so tried and true that it makes them easy to spot. The target of a phishing attack is you. More\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/09\/300x200_Blog_082324.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/09\/300x200_Blog_082324.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy &amp; Identity Protection\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Spot Phishing Lures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\",\"name\":\"Jasdev Dhaliwal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"caption\":\"Jasdev Dhaliwal\"},\"description\":\"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/jasdhaliwal\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Spot Phishing Lures | McAfee Blog","description":"Phishing attacks have all kinds of lures. And many are so tried and true that it makes them easy to spot. The target of a phishing attack is you. More","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to Spot Phishing Lures | McAfee Blog","og_description":"Phishing attacks have all kinds of lures. And many are so tried and true that it makes them easy to spot. The target of a phishing attack is you. More","og_url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-08-23T13:39:15+00:00","article_modified_time":"2024-08-23T14:00:37+00:00","og_image":[{"url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary.jpg","type":"","width":"","height":""}],"author":"Jasdev Dhaliwal","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Jasdev Dhaliwal","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/"},"author":{"name":"Jasdev Dhaliwal","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f"},"headline":"How to Spot Phishing Lures","datePublished":"2024-08-23T13:39:15+00:00","dateModified":"2024-08-23T14:00:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/"},"wordCount":1499,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/09\/300x200_Blog_082324.png","keywords":["cybersecurity","online scams","Phishing"],"articleSection":["How To Guides and Tutorials","Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/","url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/","name":"How to Spot Phishing Lures | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/09\/300x200_Blog_082324.png","datePublished":"2024-08-23T13:39:15+00:00","dateModified":"2024-08-23T14:00:37+00:00","description":"Phishing attacks have all kinds of lures. And many are so tried and true that it makes them easy to spot. The target of a phishing attack is you. More","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/09\/300x200_Blog_082324.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/09\/300x200_Blog_082324.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/spot-phishing-lures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Privacy &amp; Identity Protection","item":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/"},{"@type":"ListItem","position":3,"name":"How to Spot Phishing Lures"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f","name":"Jasdev Dhaliwal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","caption":"Jasdev Dhaliwal"},"description":"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.","sameAs":["https:\/\/www.linkedin.com\/in\/jasdhaliwal\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/77546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1407"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=77546"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/77546\/revisions"}],"predecessor-version":[{"id":199251,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/77546\/revisions\/199251"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/199221"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=77546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=77546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=77546"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=77546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}