/>
X

Join or Sign In

Register for your free ZDNet membership or if you are already a member, sign in using your preferred method below.

Use your email Use Linkedin Use Facebook

How to spot a phishing scam: slideshow

The fallout from the data breach of US marketing firm Epsilon was massive. Some of the world's largest companies were forced to apologise, as customer details stored within Epsilon were stolen by hackers.

|
darren-pauli.jpg
|
Topic: Security
how-to-spot-a-phishing-scam-slidehow1.jpg
1 of 12 Darren Pauli/ZDNet

Disney has mass appeal. The broad list of victims could be attractive for scammers.

how-to-spot-a-phishing-scam-slidehow2.jpg
2 of 12 Darren Pauli/ZDNet

Inconsistencies can be human error, but they are present in most scams.

how-to-spot-a-phishing-scam-slidehow3.jpg
3 of 12 Darren Pauli/ZDNet

Telcos like Verizon have millions of customers.

how-to-spot-a-phishing-scam-slidehow4.jpg
4 of 12 Darren Pauli/ZDNet

A link could be inserted that points to a fake web page where customers are requested to enter billing information and promptly scammed.

how-to-spot-a-phishing-scam-slidehow5.jpg
5 of 12 Darren Pauli/ZDNet

People love a good deal, and these exist in abundance for hotel chains like the Marriott.

how-to-spot-a-phishing-scam-slidehow6.jpg
6 of 12 Darren Pauli/ZDNet

Phishing scams like this could direct users to fake booking sites in order to swipe financial details.

how-to-spot-a-phishing-scam-slidehow7.jpg
7 of 12 Darren Pauli/ZDNet

The Hilton is another popular and trusted name in accommodation.

how-to-spot-a-phishing-scam-slidehow8.jpg
8 of 12 Darren Pauli/ZDNet

Unfortunately, its popularity is what could make it a good target. Even legitimate-looking email addresses will not necessarily be kosher.

how-to-spot-a-phishing-scam-slidehow9.jpg
9 of 12 Darren Pauli/ZDNet

Recruitment and career agency Robert Half was another victim of the Epsilon breach.

how-to-spot-a-phishing-scam-slidehow10.jpg
10 of 12 Darren Pauli/ZDNet

Customers should be wary of scams that seek to harvest details for identity crime.

how-to-spot-a-phishing-scam-slidehow11.jpg
11 of 12 Darren Pauli/ZDNet

Borders sends out coupon offers to readers.

how-to-spot-a-phishing-scam-slidehow12.jpg
12 of 12 Darren Pauli/ZDNet

Scammers could hijack this marketing ploy, inserting links to point users to infected sites. Or they may ask users to download infected software to access the deals.

Related Galleries

First look at the YubiKey Bio
YubiKey Bio

Related Galleries

First look at the YubiKey Bio

iVerify (version 17)
iVerify for iOS and iPadOS

Related Galleries

iVerify (version 17)

OnlyKey hardware security key
OnlyKey

Related Galleries

OnlyKey hardware security key

SoloKeys Solo V2
Solo V2

Related Galleries

SoloKeys Solo V2

iVerify: Added security for iPhone and iPad users
iVerify

Related Galleries

iVerify: Added security for iPhone and iPad users

iStorage datAshur BT hardware encrypted flash drive
iStorage datAshur BT

Related Galleries

iStorage datAshur BT hardware encrypted flash drive

Netgear BR200 small-business router
Netgear BR200

Related Galleries

Netgear BR200 small-business router