{"id":11421,"date":"2021-10-05T10:56:23","date_gmt":"2021-10-05T08:56:23","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=11421"},"modified":"2021-10-05T12:47:21","modified_gmt":"2021-10-05T10:47:21","slug":"how-to-recognise-a-phishing-e-mail","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2021\/10\/how-to-recognise-a-phishing-e-mail\/","title":{"rendered":"[:en]How to recognise a phishing e-mail [:af]Hoe om `n phishing e-pos uit te ken[:]"},"content":{"rendered":"<p>[:en]<\/p>\n<p>We can&#8217;t warn you against every <a href=\"https:\/\/en.wikipedia.org\/wiki\/Phishing\">phishing<\/a> e-mail\u2013 there&#8217;s a new variation every day. You are the only person who can protect yourself from phishing scams and identity theft. The only way to do this\u00a0is to learn to recognise a harmful e-mail by paying attention and keeping an eye out for a few tell-tale signs.<\/p>\n<p><span style=\"font-size: 14pt;\"><strong><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2016\/10\/phishme_how_to_spot_a_phish.png\" rel=\"attachment wp-att-11427\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2016\/10\/phishme_how_to_spot_a_phish-343x500.png\" alt=\"phishme_how_to_spot_a_phish\" width=\"343\" height=\"500\" align=\"right\" \/><\/a>Typical characteristics<\/strong><\/span><\/p>\n<p>1. <strong>Well-known companies used as bait<br \/>\n<\/strong>These e-mails are sent out to thousands of different e-mail addresses and often the person sending them has no idea who you are.\u00a0If you have no affiliation with the company the e-mail address is supposedly coming from, it&#8217;s fake. <em>For example, if the e-mail is sent by ABSA, but you are a Standard Bank client. <\/em>Also, see a list of types of companies generally used in phishing e-mails below.<\/p>\n<p>2. <strong>Spelling and grammar<br \/>\n<\/strong>Improper spelling and grammar is a dead giveaway. Look for obvious errors.\u00a0<\/p>\n<p>3.<strong> Lack of client information<br \/>\n<\/strong>Phishers use a generic greeting. <em>For example, the e-mail greets you as &#8220;ABSA customer&#8221; or &#8220;Dear user&#8221;, etc<\/em>. If the company was sending you information regarding your faulty account, they would mention your account details or name in the e-mail. \u00a0A company would go through the trouble to address a client by name and won&#8217;t ask you for your information. Banks have your information on their system.<\/p>\n<p>4.<strong> Deadlines\/Sense of urgency<br \/>\n<\/strong>Phishing e-mails demand\u00a0an immediate response or stipulate a specific deadline, creating a sense of urgency and prompting you to respond before you&#8217;ve looked at the e-mail properly. <em>For example, \u00a0demanding that you log in and change your\u00a0account information within 24 hours or your account will be closed.<\/em><\/p>\n<p>5. <strong>Malicious links<br \/>\n<\/strong>Although many phishing e-mails are getting better at hiding the true URL you are visiting, often these e-mails will show a URL that is unrelated to the company. Move your mouse over the link and look at the display address. Is this the website address of the company who seems to be sending the e-mail? If not, it&#8217;s clearly a phishing e-mail.<\/p>\n<p>6. <strong>Attachments<br \/>\n<\/strong>Phishing e-mails occasionally include an attachment which contains malware. When opened, it will run and install a small programme on your PC, which hackers use to gain access to your PC and information.\u00a0<\/p>\n<p><span style=\"font-size: 14pt;\"><strong>Typical phishing topics<\/strong><\/span><\/p>\n<p>\u2022 Account issues, such as accounts or passwords expiring, accounts being hacked, out-of-date accounts, or account information has to be changed.<br \/>\n\u2022 Credit cards expiring or being stolen, a duplicate\u00a0credit card, credit card transactions, etc.\u00a0<br \/>\n\u2022 Confirming orders, requesting that you log in to confirm recent orders or transactions before a delivery can be made.<br \/>\n\u2022 Winning a prize or getting something for free. Both Woolworths and Pick &#8216;n Pay&#8217;s have been used in fake campaigns to lure people into providing personal details.<\/p>\n<p><span style=\"font-size: 14pt;\"><strong>Company names phishers generally use<\/strong><\/span><\/p>\n<p>\u2022 Any major bank. <a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/?s=phishing+ABSA\">ABSA <\/a>and Standard Bank are both popular choices in South Africa.<br \/>\n\u2022 Insurance companies, for example, <a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/2016\/05\/phishing-scam-disguised-as-an-outsurance-r400-premium-claim\/\">Outsurance<\/a>.<br \/>\n\u2022 Internet service providers<br \/>\n\u2022<a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/2014\/11\/phishing-scam-warning-your-apple-profile-suspension\/\"> Apple<\/a> or Microsoft claiming your account has been suspended.<br \/>\n\u2022 E-mail providers, e.g. <a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/2016\/04\/gmail-account-phishing\/\">Gmail<\/a> or Yahoo<br \/>\n\u2022 SARS. Especially at this time of year. <a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/?s=sars\">(We&#8217;ve had a few of these.)<br \/>\n<\/a>\u2022 <a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/2015\/05\/phishing-scam-disguised-as-dhl-shipping-document\/\">DHL<\/a> or any delivery company claiming they have a package for you.<br \/>\n\u2022\u00a0Your company&#8217;s medical aid, for example, <a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/2016\/04\/discovery-phishing-scam\/\">Discovery<\/a><br \/>\n\u2022\u00a0Your company&#8217;s <a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/2016\/08\/phishing-scam-disguised-as-a-mail-about-a-web-mail-update\/\">IT department<\/a><br \/>\n\u2022 Casinos and lotteries<br \/>\n\u2022 Online dating websites<br \/>\n\u2022 Popular websites such as Amazon, Facebook, MySpace, PayPal, eBay, Microsoft, Apple, Hotmail, YouTube, etc.<\/p>\n<p><span style=\"font-size: 14pt;\"><strong>A few tips to keep you safe<\/strong><\/span><\/p>\n<p>\u2022 <strong>Never follow links in an e-mail you&#8217;re uncertain of.<\/strong>\u00a0Rather visit the page by typing the address of the\u00a0company in your browser. <em>For example, \u00a0instead of clicking on the &#8220;ABSA URL&#8221; in the e-mail, type http:\/\/www.absa.co.za in your web browser and log\u00a0in <\/em>at<em> their official website.<\/em><br \/>\n\u2022 <strong>Never send personal information by e-mail.<\/strong> If a company is asking for your personal account information or claiming your\u00a0account is invalid, visit the website and log in to the account as you normally would. If everything seems in order and there aren&#8217;t any urgent notifications from your bank, you should be fine.<br \/>\n\u2022 If you are still not sure about the status of your account or are concerned about your personal information, <strong>contact the company directly<\/strong>, either through\u00a0an e-mail address provided on their website, over the phone or visit your local branch.<br \/>\n\u2022\u00a0<strong>Delete the e-mail<\/strong> and don\u2019t click on links or fill in any information. <br \/>\n\u2022 If you\u2019ve already divulged your information, immediately <strong>change your password or PIN<\/strong> and contact the institution to inform them of the breach. <br \/>\n\u2022 To <strong>report spam or phishing e-mails<\/strong> send an e-mail to\u00a0<a href=\"mailto:sysadm@sun.ac.za\">sysadm@sun.ac.za<\/a>\u00a0with the subject SPAM with the suspect e-mail attached. IT system administrators will then be able to block the e-mail to protect other users.<\/p>\n<p style=\"text-align: right;\">[SOURCE:\u00a0<a href=\"http:\/\/www.computerhope.com\/\">www.computerhope.com<\/a>]<\/p>\n<p>&nbsp;<\/p>\n<p>[:af]<\/p>\n<p>Ons kan jou nie teen elke<a href=\"https:\/\/en.wikipedia.org\/wiki\/Phishing\"><em> phishing<\/em><\/a> e-pos waarsku nie \u2013 daar is bykans elke dag \u0149 nuwe\u00a0variasie. Die enigste persoon wat jou kan beskerm teen <em>phishing<\/em>-pogings en identiteitsdiefstal, is jyself. Maar, \u0149 goeie begin is om te leer om \u0149 gevaarlike e-pos\u00a0uit te ken\u00a0deur meer oplettend te wees. Kyk uit vir tipiese kenmerke en jou kans\u00a0om \u0149 slagoffer te wees,\u00a0sal verminder.<\/p>\n<p><span style=\"font-size: 14pt;\"><strong><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2016\/10\/phishme_how_to_spot_a_phish.png\" rel=\"attachment wp-att-11427\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2016\/10\/phishme_how_to_spot_a_phish-343x500.png\" alt=\"phishme_how_to_spot_a_phish\" width=\"343\" height=\"500\" align=\"right\" \/><\/a>Tipiese kenmerke<\/strong><\/span><\/p>\n<p>1. <strong>Bekende maatskappye as lokaas<\/strong><strong><br \/> <\/strong><em>Phishing<\/em> e-posse word gelyktydig uitgestuur na duisende e-posse en dikwels\u00a0weet die persoon wat dit stuur nie eers wie jy is nie. \u00a0Indien jy geen verbintenis het met die maatskappy\u00a0waarvandaan die e-pos kom nie, is dit waarskynlik\u00a0vervals. \u00a0<em>Byvoorbeeld, as die e-pos deur ABSA gestuur is en jy is \u0149 Standard Bank kli\u00ebnt. <\/em>Sien ook ons lys van maatskappye wat tipies gebruik word vir phishing onder.<\/p>\n<p>2. <strong>Spelling en taalgebruik<br \/><\/strong>Onvanpaste spelling en taalgebruik is gewoonlik \u0149 duidelike aanduiding. Kyk uit vir voor-die-hand-liggende spelfoute.\u00a0<\/p>\n<p>3.<strong>\u00a0Gebrek aan\u00a0kli\u00ebnte-inligting<br \/> <\/strong><em>Phishing<\/em> e-posse se aanhef is altyd generies. <em>Byvoorbeeld, die e-pos spreek jou aan as\u00a0&#8220;ABSA customer&#8221; of &#8220;Dear user&#8221;, ens.<\/em> Indien die maatskappy jou\u00a0werklik\u00a0wou inlig oor jou\u00a0foutiewe rekening, sou hulle\u00a0na\u00a0jou rekening-inligting of naam\u00a0in die e-pos verwys het. \u0149 Maatskappy sou\u00a0die moeite doen om hulle kli\u00ebnt aan te spreek op sy naam en sou hom ook nie vra vir sy inligting nie. Hulle het reeds al jou data.\u00a0<\/p>\n<p>4.<strong>\u00a0Spertye\/Dringendheid<br \/> <\/strong><em>Phishing<\/em> e-posse dring daarop aan dat jy dadelik reageer of gee vir jou \u0149\u00a0kort\u00a0spertyd. As gevolg van hierdie dringendheid, word jy onder druk geplaas om te reageer voordat jy behoorlik kans gehad het om die e-pos te bestudeer. <em>By voorbeeld, dit dring aan dat jy binne 24 uur aanteken om jou bankdetails te bevestig of jou rekening word gesluit.\u00a0<\/em><\/p>\n<p>5. <strong>Vyandig-gesinde skakels<br \/> <\/strong>Deesdae is kuberkriminele al slimmer en steek hulle die werklike URL waarheen skakels gaan beter weg. Maar soms sal jy sien dat die URL wys na \u0149 adres wat glad nie verwant is of lyk soos die maatskappy s&#8217;n nie. Beweeg jou muis oor die skakel en kyk na die adres wat gewys word. Is dit die maatskappy se regte webwerfadres? Indien nie, is dit \u0149 <em>phishing<\/em> e-pos.<\/p>\n<p>6. <strong>Aanhegsels<br \/> <\/strong><em>Phishing<\/em> e-posse het soms ook aanhegsels wat <em>malware<\/em> bevat. Indien jy dit oopmaak, installeer dit \u0149 klein programmetjie op jou rekenaar waarmee kuberkrakers toegang tot jou\u00a0rekenaar en\u00a0inligting verkry.\u00a0<\/p>\n<p><span style=\"font-size: 14pt;\"><strong>Tipiese <em>phishing<\/em> onderwerpe<\/strong><\/span><\/p>\n<p>\u2022 Probleme met rekeninge, byvoorbeeld \u0149 rekening of wagwoord wat verval, gekraak is of inligting wat skielik verander het.\u00a0<br \/>\u2022 Kredietkaarte wat verval, gesteel word, \u0149 duplikaat kredietkaart of kredietkaarttranssaksies.\u00a0<br \/>\u2022 Bevestiging van bestellings. Byvoorbeeld \u0149 versoek om aan te teken en onlangse bestellings of transaksies te bevestig voordat dit afgelewer kan word.\u00a0<br \/>\u2022 Kompetisies waar jy \u0149 prys gewen het of iets gratis kry. Beide Woolworths en Pick &#8216;n Pay is al gebruik in phishing e-posse om hul kli\u00ebnte te lok om persoonlike inligting te gee.\u00a0<\/p>\n<p><span style=\"font-size: 14pt;\"><strong>Maatskappye wat gebruik word vir <em>phishing<\/em><\/strong><\/span><\/p>\n<p>\u2022 Enige bekende bank. <a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/?s=phishing+ABSA\">ABSA <\/a>en Standard Bank is beide popul\u00eare keuses in Suid-Afrika<br \/>\u2022 Versekeringsmaatskappye, byvoorbeeld <a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/2016\/05\/phishing-scam-disguised-as-an-outsurance-r400-premium-claim\/\">Outsurance<\/a>.<br \/>\u2022 Internet diensverskaffers<br \/>\u2022<a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/2014\/11\/phishing-scam-warning-your-apple-profile-suspension\/\"> Apple<\/a> of Microsoft (wat beweer dat jou rekening opgeskort is)<br \/>\u2022 E-pos verskaffers, byvoorbeeld\u00a0<a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/2016\/04\/gmail-account-phishing\/\">Gmail<\/a> of Yahoo<br \/>\u2022 SARS. (<a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/?s=sars\">Veral di\u00e9 tyd van die jaar<\/a>)\u00a0<a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/?s=sars\"><br \/> <\/a>\u2022 <a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/2015\/05\/phishing-scam-disguised-as-dhl-shipping-document\/\">DHL<\/a> of enige afleweringsmaatskappy wat beweer hulle het \u0149 pakkie vir jou.<br \/>\u2022 Mediese fondse, byvoorbeeld, <a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/2016\/04\/discovery-phishing-scam\/\">Discovery.<\/a><br \/>\u2022 Jou maatskappy se <a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/2016\/08\/phishing-scam-disguised-as-a-mail-about-a-web-mail-update\/\">IT-afdeling<\/a><br \/>\u2022 Casino&#8217;s en loterye<br \/>\u2022 Aanlyn-afspraak webwerwe<br \/>\u2022 Gewilde webwerwe soos Facebook, MySpace, PayPal, eBay, Microsoft, Apple, Hotmail, YouTube, ens.<\/p>\n<p><span style=\"font-size: 14pt;\"><strong>\u0149 Paar wenke om jou veilig te hou<\/strong><\/span><\/p>\n<p>\u2022 <strong>Moenie \u00a0op \u0149 skakel kliek as jy onseker is nie.<\/strong>\u00a0Gaan eerder na die webwerf deur die maatskappy se webadres\u00a0in te tik. <em>Byvoorbeeld,\u00a0tik http:\/\/www.absa.co.za in jou webblaaier\u00a0en teken aan op die amptelike webwerf, in plaas van om te kliek op\u00a0&#8220;ABSA URL&#8221; in die e-pos.<\/em><br \/>\u2022<strong> Moet nooit persoonlike inligting per e-pos stuur nie.<\/strong>\u00a0Indien \u0149 maatskappy jou persoonlike inligting vra, gaan direk na hul webwerf en teken aan op jou rekening soos altyd. As daar \u0149 probleem is, behoort daar \u0149 kennisgewing van jou bank te wees.\u00a0<br \/>\u2022 As jy nogsteeds onseker is oor die status van jou rekening of bekommerd is oor jou persoonlike inligting, <strong>kontak die maatskappy direk<\/strong> d.m.v. die e-posadres op hul webwerf, telefonies of besoek jou plaaslike tak.\u00a0<br \/><strong>\u2022 Vee die e-pos uit, moenie op die skakels kliek nie en moenie inligting invul nie.<br \/>\u2022<\/strong>Indien jy reeds jou inligting ingevul het,<strong> verander dadelik jou wagwoord of PIN <\/strong>en kontak die instelling om hulle in kennis te stel.<strong><br \/>\u2022 \u00a0Om gemorspos of <em>phishing<\/em> e-pos aan te meld,\u00a0<\/strong>stuur \u0149 e-pos aan\u00a0<a href=\"mailto:sysadm@sun.ac.za\">sysadm@sun.ac.za<\/a>\u00a0met SPAM as onderwerp met die e-pos aangeheg. IT stelseladministrateurs kan dan die e-pos blok en sodoende ook ander personeel daarteen beskerm.<\/p>\n<p style=\"text-align: right;\">[BRON:\u00a0<a href=\"http:\/\/www.computerhope.com\/\">www.computerhope.com<\/a>]<\/p>\n<p>[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:en] We can&#8217;t warn you against every phishing e-mail\u2013 there&#8217;s a new variation every day. You are the only person who can protect yourself from phishing scams and identity theft. The only way to do this\u00a0is to learn to recognise a harmful e-mail by paying attention and keeping an eye out for a few tell-tale [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20382,29187,48737],"tags":[48729,20381,20360],"class_list":["post-11421","post","type-post","status-publish","format-standard","hentry","category-email","category-security-2","category-tips-2","tag-hacking","tag-phishing","tag-spam"],"publishpress_future_action":{"enabled":false,"date":"2026-05-09 16:43:02","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/11421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=11421"}],"version-history":[{"count":20,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/11421\/revisions"}],"predecessor-version":[{"id":15520,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/11421\/revisions\/15520"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=11421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=11421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=11421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}