Don't Step in the Trap: How to Recognize and Avoid Email Phishing Scams
By Brett Smith
()
About this ebook
More and more consumers and businesses are being victimized by increasingly sophisticated email scams, including "phishing" schemes. This handy, step-by-step guide, written in plain English, will show you how to recognize phishing emails. It will help you avoid being taken in by these scams, without having to decipher a lot of computer jargon. Includes quick reference guide and glossary.
Brett Smith
Brett W. Smith is a native of Jacksonville, Florida. He studied math and government at the University of Texas at Austin, and political science, accounting, and German at Brigham Young University. After graduating from law school at BYU, he became an attorney, working both in private practice and in corporate legal departments.He has also worked as computer network administrator and database administrator. He has been fascinated by computers and software since getting his first computer in college, an IBM PC-XT. Its 10 MB hard disk seemed to be immense.Although he is an attorney, he dislikes legalese and prefers plain English. He focuses on making complex topics more understandable.He now resides in Spokane, Washington.
Related to Don't Step in the Trap
Related ebooks
How To Recognize And Avoid Internet Scam Rating: 0 out of 5 stars0 ratingsFraud Smarts Rating: 5 out of 5 stars5/5Easy Private Browsing: How to Send Anonymous Email, Hide Your IP address, Delete Browsing History and Become Invisible on the Web Rating: 0 out of 5 stars0 ratingsHow Fraudsters Operate Rating: 4 out of 5 stars4/5I Was Scammed: Updated and Expanded Rating: 0 out of 5 stars0 ratingsIntroduction to Internet Scams and Fraud: Credit Card Theft, Work-At-Home Scams and Lottery Scams Rating: 4 out of 5 stars4/5The Art of Email Security: Putting Cybersecurity In Simple Terms Rating: 2 out of 5 stars2/5Don't Be Scammed by Identity Fraud: I Was Scammed Books Rating: 5 out of 5 stars5/5How to Buy Bitcoin for Complete Beginners Rating: 0 out of 5 stars0 ratingsHow to Survive Identity Theft: Regain Your Money, Credit, and Reputation Rating: 0 out of 5 stars0 ratingsStealing You Blind: Tricks of the Fraud Trade Rating: 3 out of 5 stars3/5Social Media Scams Rating: 0 out of 5 stars0 ratingsHow to Prevent Identity Theft: How Anyone Can Protect Themselves from Being a Victim of Identity Theft Rating: 0 out of 5 stars0 ratingsSpam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door Rating: 4 out of 5 stars4/521 Business Scams and How to Avoid Them: 21 Book Series Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Identity Theft Prevention what to do when your identity is stolen & how to repair your credit Rating: 0 out of 5 stars0 ratingsYour Personal Information Is At Risk: A Guide For Protecting Yourself Rating: 0 out of 5 stars0 ratingsDon't Be Scammed by the Latest Scams: I Was Scammed Books Rating: 0 out of 5 stars0 ratingsUltimate guide for being anonymous: Avoiding prison time for fun and profit Rating: 5 out of 5 stars5/5Personal Information & Identification Security Made Easy Rating: 0 out of 5 stars0 ratingsFraud Smarts - Fraud Prevention Handbook Rating: 0 out of 5 stars0 ratingsThe New Adults' Guide to Basic Finances Rating: 0 out of 5 stars0 ratingsYour Guide To Email Security Rating: 0 out of 5 stars0 ratingsThe Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsUnderstanding Identity Theft: Protect Your Identity From Theft Rating: 3 out of 5 stars3/5Guarding Against Online Identity Theft Rating: 0 out of 5 stars0 ratingsCybersecurity Implications of Election 2016 Rating: 0 out of 5 stars0 ratingsHacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5
Security For You
How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsMake Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5CompTIA CySA+ Study Guide: Exam CS0-003 Rating: 2 out of 5 stars2/5Codes and Ciphers Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsThe Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 0 out of 5 stars0 ratingsHacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5CEH v11 Certified Ethical Hacker Study Guide Rating: 0 out of 5 stars0 ratingsMike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5
Reviews for Don't Step in the Trap
0 ratings0 reviews
Book preview
Don't Step in the Trap - Brett Smith
Don’t Step in the Trap!
How to Recognize and Avoid Email Phishing Scams
. . . In Plain English
Brett W. Smith
Smashwords Edition
Copyright © 2016 Brett W. Smith. All rights reserved.
No part of this book may be reproduced or used in any manner without the express written permission of the publisher except for the use of brief quotations in a book review.
Cover image supplied by Pixabay.com under Creative Commons CC0 license.
Cover design by Antonia R. Hughes.
This ebook is licensed for your personal enjoyment only. This ebook may not be re-sold or given away to other people. Thank you for respecting the hard work of this author.
Table of Contents
Introduction
Chapter One – What is Phishing?
Chapter Two – Is Phishing a Serious Problem?
Chapter Three – How Do We Recognize a Phishing Scam?
Chapter Four – Who is Sending the Email?
Chapter Five – Who Was the Email Sent To?
Chapter Six – Is Something Attached to the Message?
Chapter Seven – What is the Subject Line of the Email?
Chapter Eight – What Does the Email Say?
Chapter Nine – Is There a Single Key to Recognizing Most Phishing Emails?
Chapter Ten – So What Do I Do with This Phishing Email?
Quick Reference Guide
Glossary
Sources
About the Author
Introduction
IT WAS LATE in the afternoon on Tuesday. The sun shone through the third-floor window, creating a glare on the computer screen. Kyle got up from his desk and adjusted the window blinds. As he sat down, he turned back to the monthly reports he was running for the management meeting in the morning. As an assistant in the accounting department, it was his job to get the reports ready. Some of the reports were done in Excel, and others were run from the new accounting system that the company had switched to eight weeks before. A few still had to be pulled from the legacy system, which was still in use for some accounts while the bugs were being worked out of the new program. It was very time-consuming. Kyle always ended up working late the afternoon before the management meetings. It would be worse than usual today, because he also had to find time to upload the monthly invoice into their biggest customer’s online system.
It didn’t help that his workstation hadn’t been upgraded yet. Running reports in the new accounting system seemed to take forever. At the year-end company meeting, the owner had announced that the older workstations were to be replaced once the revenue had been booked from the completion of the work on the new shopping mall. Kyle was very much looking forward to that happening in the next quarter. Judging by the reports he had prepared so far, it looked like it was going to be a good year.
As he waited for a report to come up, Kyle saw that an email had come in from the IT department with the subject of Admin Notice.
He opened it, and read that his Outlook mailbox had exceeded its storage limit. The email instructed him on what to do to increase the limit. Following the directions, he clicked on the link included in the email, put in his username and password, and hit submit. Once that was