The Top Four Subject Lines Used In Phishing Attempts

by

March 14, 2014

Cybercriminals commonly use phishing via email as a strategy to acquire usernames, credit card details, and passwords.  These emails include malicious links or attachments to corrupt  computers and mobile devices.

According to a recent study, cybercriminals use certain email subject lines more often than others. It’s critical to keep an eye out for all suspicious emails.  The following are the top four commonly used subject lines:

1.   Invitation to connect on LinkedIn
2.   Dear <Insert bank name> customer
3.   Undelivered mail returned to sender
4.   Mail delivery failed: returning message to sender

Cybercriminals conduct research to entice victims to open an email attachment. They use a variety of strategies to trick victims, including social networking invitations, “returned mail” messages, and bank notifications.

Phishing emails come in a variety of forms, but the majority are created to steal information about your identity and banking details.

Protect yourself from sophisticated phishing attacks by:

  • Not Sharing Personal Information

If an attachment takes you to a website that asks for your name, address, password, and/or banking information, don’t share this personal information. If you have any doubts, always call the company headquarters and verify the message came from them.

  • Not Opening Attachments From Unknown Senders

If you don’t know the sender, don’t download attachments or click on links. These attachments or links may install malware on your device once they’re opened. If you know the sender but you’re suspicious of an attachment, call to verify the email.

  • Using Caution When On Social Networks

Cybercriminals take advantage of our ability to trust our friends. Often, a cybercriminal will hack into someone’s social media account and post links or send emails to you and friends. If something looks suspicious, call your friend and ask if they sent you the message.

  • Installing Security Software

If you click a malicious link or download an attachment, a comprehensive security solution can protect you by detecting and removing the malware. Don’t depend on security software, but keep it updated just in case.

  • Watching Out For Pop-Up Screens

A legitimate company won’t ask you to submit personal information in a pop-up screen. If a pop-up appears, don’t click the link and don’t enter any personal information. Also, don’t copy web addresses into your browser from pop-ups.

Keep the above email subject lines in mind and be careful with suspicious looking emails. Take the necessary precautions to protect your sensitive information.

To learn more about phishing attacks and how to protect your personal information, give us a call at (888) 330-8808 or send us an email at [email protected]. Integris can help you stay protected from the latest malware attacks and phishing scams.

We're Integris. We're always working to empower people through technology.

Keep reading

Managed IT Services St. Paul: 5 Powerful Advantages for Businesses

Managed IT Services St. Paul: 5 Powerful Advantages for Businesses

As a business owner, it's important to make the most of your resources. This includes finding cost-effective solutions for managing and maintaining your company's technology. Keeping a competitive edge in your industry requires secure, modern tech that allows your...

IT Support Minneapolis: Where to Find Top IT Services in Minneapolis

IT Support Minneapolis: Where to Find Top IT Services in Minneapolis

If you’re wondering where to find top IT services in Minneapolis, it’s important to identify providers that offer a wide range of support, have great service and provide solid tech expertise. Comprehensive technology insight is especially important when it comes to IT...

Webinar: Email Security that Doesn’t Suck…

Webinar: Email Security that Doesn’t Suck…

Trustifi and Security 7 present Email Security That Doesn’t Suck.  In today’s age of over-complicated security tools, it is extremely difficult to manage the fine balance between security and productivity.   {% video_player "embed_player" overrideable=False,...