Search
  • Videos
  • Enterprise Software
  • Windows 10
  • Cloud
  • AI
  • Security
  • TR Premium
  • more
    • 5G Guide
    • Build a Website
    • Hardware
    • Innovation
    • Best Smartphones
    • Executive Guides
    • Best VPN Services
    • Web Hosting
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Enterprise Software
    • Windows 10
    • Cloud
    • AI
    • Security
    • TR Premium
    • 5G Guide
    • Build a Website
    • Hardware
    • Innovation
    • Best Smartphones
    • Executive Guides
    • Best VPN Services
    • Web Hosting
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

How to spot a phishing scam: slideshow

1 of 12 NEXT PREV
  • how-to-spot-a-phishing-scam-slidehow1.jpg

    Disney has mass appeal. The broad list of victims could be attractive for scammers.

    Published: April 12, 2011 -- 03:48 GMT (20:48 PDT)

    Caption by: Darren Pauli

  • how-to-spot-a-phishing-scam-slidehow2.jpg

    Inconsistencies can be human error, but they are present in most scams.

    Published: April 12, 2011 -- 03:48 GMT (20:48 PDT)

    Caption by: Darren Pauli

  • how-to-spot-a-phishing-scam-slidehow3.jpg

    Telcos like Verizon have millions of customers.

    Published: April 12, 2011 -- 03:48 GMT (20:48 PDT)

    Caption by: Darren Pauli

  • how-to-spot-a-phishing-scam-slidehow4.jpg

    A link could be inserted that points to a fake web page where customers are requested to enter billing information and promptly scammed.

    Published: April 12, 2011 -- 03:48 GMT (20:48 PDT)

    Caption by: Darren Pauli

  • how-to-spot-a-phishing-scam-slidehow5.jpg

    People love a good deal, and these exist in abundance for hotel chains like the Marriott.

    Published: April 12, 2011 -- 03:48 GMT (20:48 PDT)

    Caption by: Darren Pauli

  • how-to-spot-a-phishing-scam-slidehow6.jpg

    Phishing scams like this could direct users to fake booking sites in order to swipe financial details.

    Published: April 12, 2011 -- 03:48 GMT (20:48 PDT)

    Caption by: Darren Pauli

  • how-to-spot-a-phishing-scam-slidehow7.jpg

    The Hilton is another popular and trusted name in accommodation.

    Published: April 12, 2011 -- 03:48 GMT (20:48 PDT)

    Caption by: Darren Pauli

  • how-to-spot-a-phishing-scam-slidehow8.jpg

    Unfortunately, its popularity is what could make it a good target. Even legitimate-looking email addresses will not necessarily be kosher.

    Published: April 12, 2011 -- 03:48 GMT (20:48 PDT)

    Caption by: Darren Pauli

  • how-to-spot-a-phishing-scam-slidehow9.jpg

    Recruitment and career agency Robert Half was another victim of the Epsilon breach.

    Published: April 12, 2011 -- 03:48 GMT (20:48 PDT)

    Caption by: Darren Pauli

  • how-to-spot-a-phishing-scam-slidehow10.jpg

    Customers should be wary of scams that seek to harvest details for identity crime.

    Published: April 12, 2011 -- 03:48 GMT (20:48 PDT)

    Caption by: Darren Pauli

  • how-to-spot-a-phishing-scam-slidehow11.jpg

    Borders sends out coupon offers to readers.

    Published: April 12, 2011 -- 03:48 GMT (20:48 PDT)

    Caption by: Darren Pauli

  • how-to-spot-a-phishing-scam-slidehow12.jpg

    Scammers could hijack this marketing ploy, inserting links to point users to infected sites. Or they may ask users to download infected software to access the deals.

    Published: April 12, 2011 -- 03:48 GMT (20:48 PDT)

    Caption by: Darren Pauli

1 of 12 NEXT PREV
Darren Pauli

By Darren Pauli | April 12, 2011 -- 03:48 GMT (20:48 PDT) | Topic: Security

  • how-to-spot-a-phishing-scam-slidehow1.jpg
  • how-to-spot-a-phishing-scam-slidehow2.jpg
  • how-to-spot-a-phishing-scam-slidehow3.jpg
  • how-to-spot-a-phishing-scam-slidehow4.jpg
  • how-to-spot-a-phishing-scam-slidehow5.jpg
  • how-to-spot-a-phishing-scam-slidehow6.jpg
  • how-to-spot-a-phishing-scam-slidehow7.jpg
  • how-to-spot-a-phishing-scam-slidehow8.jpg
  • how-to-spot-a-phishing-scam-slidehow9.jpg
  • how-to-spot-a-phishing-scam-slidehow10.jpg
  • how-to-spot-a-phishing-scam-slidehow11.jpg
  • how-to-spot-a-phishing-scam-slidehow12.jpg

The fallout from the data breach of US marketing firm Epsilon was massive. Some of the world's largest companies were forced to apologise, as customer details stored within Epsilon were stolen by hackers.

Read More Read Less

Disney has mass appeal. The broad list of victims could be attractive for scammers.

Published: April 12, 2011 -- 03:48 GMT (20:48 PDT)

Caption by: Darren Pauli

1 of 12 NEXT PREV

Related Topics:

Security Security TV Data Management CXO Data Centers
Darren Pauli

By Darren Pauli | April 12, 2011 -- 03:48 GMT (20:48 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • The Nightmare in Silicon Valley: 8 horror technologies that should scare you to death

    Every night is fright night with what can happen once these scary technologies take hold in ways that you may not have imagined.

  • Julia programming language, cloud computing, cybersecurity worries: Research round-up

    All the facts and figures that matter to you and your business from the past month in technology news.

  • YubiKey 5Ci: USB-C and Lightning Security Key

    The world’s first Lightning-compatible security key

  • 10 Linux distros: From different to dangerous

    One of the great benefits of Linux is the ability to roll your own. Throughout the years, individuals, organizations, and even nation states have done just that. In this gallery, we're ...

  • 2019's tech, security, and authentication trends

    We take a look at the top tech, cybersecurity, and authentication trends as revealed today by the Duo Security's 2019 Trusted Access Report, which includes data from 24 million devices, ...

  • The world's most famous and dangerous APT (state-developed) malware

    A list of the most dangerous, effective, and most well-known malware strains that have been developed by the cyber-security units of various countries' intelligence and military ...

  • Best-paid tech jobs, malware warnings and shadow IT: Research round-up

    All the facts and figures that matter to you and your business from the past month in technology news.

ZDNet
Connect with us

© 2019 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In | Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums