Don't Step in the Trap: How to Recognize and Avoid Email Phishing Scams
By Brett Smith
()
About this ebook
More and more consumers and businesses are being victimized by increasingly sophisticated email scams, including "phishing" schemes. This handy, step-by-step guide, written in plain English, will show you how to recognize phishing emails. It will help you avoid being taken in by these scams, without having to decipher a lot of computer jargon. Includes quick reference guide and glossary.
Brett Smith
Brett W. Smith is a native of Jacksonville, Florida. He studied math and government at the University of Texas at Austin, and political science, accounting, and German at Brigham Young University. After graduating from law school at BYU, he became an attorney, working both in private practice and in corporate legal departments.He has also worked as computer network administrator and database administrator. He has been fascinated by computers and software since getting his first computer in college, an IBM PC-XT. Its 10 MB hard disk seemed to be immense.Although he is an attorney, he dislikes legalese and prefers plain English. He focuses on making complex topics more understandable.He now resides in Spokane, Washington.
Related to Don't Step in the Trap
Related ebooks
How Fraudsters Operate Rating: 4 out of 5 stars4/5Introduction to Internet Scams and Fraud: Credit Card Theft, Work-At-Home Scams and Lottery Scams Rating: 4 out of 5 stars4/5How To Recognize And Avoid Internet Scam Rating: 0 out of 5 stars0 ratingsFraud Smarts Rating: 5 out of 5 stars5/5The Art of Email Security: Putting Cybersecurity In Simple Terms Rating: 2 out of 5 stars2/5How to Prevent Identity Theft: How Anyone Can Protect Themselves from Being a Victim of Identity Theft Rating: 0 out of 5 stars0 ratingsHack Proof Yourself!: The essential guide for securing your digital world Rating: 0 out of 5 stars0 ratings21 Business Scams and How to Avoid Them: 21 Book Series Rating: 0 out of 5 stars0 ratingsHow to Buy Bitcoin for Complete Beginners Rating: 0 out of 5 stars0 ratingsFraud Smarts - Fraud Prevention Handbook Rating: 0 out of 5 stars0 ratingsEasy Private Browsing: How to Send Anonymous Email, Hide Your IP address, Delete Browsing History and Become Invisible on the Web Rating: 0 out of 5 stars0 ratingsCybersecurity Implications of Election 2016 Rating: 0 out of 5 stars0 ratingsDeep Web Secrecy and Security: an inter-active guide to the Deep Web and beyond Rating: 4 out of 5 stars4/5Tackling Fraud Rating: 4 out of 5 stars4/5Defending Yourself from Hackers and Spammers Rating: 0 out of 5 stars0 ratingsYour Personal Information Is At Risk: A Guide For Protecting Yourself Rating: 0 out of 5 stars0 ratingsHampering the Human Hacker and the Threat of Social Engineering Rating: 0 out of 5 stars0 ratingsYour Guide To Email Security Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Social Media Scams Rating: 0 out of 5 stars0 ratingsI Was Scammed: Updated and Expanded Rating: 0 out of 5 stars0 ratingsMore Spamming the Spammers (With Dieter P. Bieny) Rating: 0 out of 5 stars0 ratingsI Was Scammed Rating: 0 out of 5 stars0 ratingsJust Rewards: Credit Cards vs. Debit Cards: Financial Freedom, #44 Rating: 0 out of 5 stars0 ratingsDon't Be Scammed by the Latest Scams: I Was Scammed Books Rating: 0 out of 5 stars0 ratingsBitcoin: Beginner's Simplified Guide to Make Money with Bitcoin Rating: 0 out of 5 stars0 ratingsDon't Be Scammed by Email, Phone, and Social Media Scams: I Was Scammed Books Rating: 0 out of 5 stars0 ratingsThe Online Identity Theft Prevention Kit: Stop Scammers, Hackers, and Identity Thieves from Ruining Your Life Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsSecurity+ Boot Camp Study Guide Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5
Reviews for Don't Step in the Trap
0 ratings0 reviews
Book preview
Don't Step in the Trap - Brett Smith
Don’t Step in the Trap!
How to Recognize and Avoid Email Phishing Scams
. . . In Plain English
Brett W. Smith
Smashwords Edition
Copyright © 2016 Brett W. Smith. All rights reserved.
No part of this book may be reproduced or used in any manner without the express written permission of the publisher except for the use of brief quotations in a book review.
Cover image supplied by Pixabay.com under Creative Commons CC0 license.
Cover design by Antonia R. Hughes.
This ebook is licensed for your personal enjoyment only. This ebook may not be re-sold or given away to other people. Thank you for respecting the hard work of this author.
Table of Contents
Introduction
Chapter One – What is Phishing?
Chapter Two – Is Phishing a Serious Problem?
Chapter Three – How Do We Recognize a Phishing Scam?
Chapter Four – Who is Sending the Email?
Chapter Five – Who Was the Email Sent To?
Chapter Six – Is Something Attached to the Message?
Chapter Seven – What is the Subject Line of the Email?
Chapter Eight – What Does the Email Say?
Chapter Nine – Is There a Single Key to Recognizing Most Phishing Emails?
Chapter Ten – So What Do I Do with This Phishing Email?
Quick Reference Guide
Glossary
Sources
About the Author
Introduction
IT WAS LATE in the afternoon on Tuesday. The sun shone through the third-floor window, creating a glare on the computer screen. Kyle got up from his desk and adjusted the window blinds. As he sat down, he turned back to the monthly reports he was running for the management meeting in the morning. As an assistant in the accounting department, it was his job to get the reports ready. Some of the reports were done in Excel, and others were run from the new accounting system that the company had switched to eight weeks before. A few still had to be pulled from the legacy system, which was still in use for some accounts while the bugs were being worked out of the new program. It was very time-consuming. Kyle always ended up working late the afternoon before the management meetings. It would be worse than usual today, because he also had to find time to upload the monthly invoice into their biggest customer’s online system.
It didn’t help that his workstation hadn’t been upgraded yet. Running reports in the new accounting system seemed to take forever. At the year-end company meeting, the owner had announced that the older workstations were to be replaced once the revenue had been booked from the completion of the work on the new shopping mall. Kyle was very much looking forward to that happening in the next quarter. Judging by the reports he had prepared so far, it looked like it was going to be a good year.
As he waited for a report to come up, Kyle saw that an email had come in from the IT department with the subject of Admin Notice.
He opened it, and read that his Outlook mailbox had exceeded its storage limit. The email instructed him on what to do to increase the limit. Following the directions, he clicked on the link included in the email, put in his username and password, and hit submit. Once that was