{"id":2279,"date":"2022-03-11T07:57:01","date_gmt":"2022-03-11T07:57:01","guid":{"rendered":"https:\/\/www.attack-secure.com\/?p=2279"},"modified":"2023-01-09T11:16:48","modified_gmt":"2023-01-09T11:16:48","slug":"common-phishing-scams","status":"publish","type":"post","link":"https:\/\/www.attack-secure.com\/common-phishing-scams\/","title":{"rendered":"11 Common Phishing Scams and How to Protect Yourself Against Them"},"content":{"rendered":"\n

In this article, we will discuss the different types of trusts that are available to individuals and businesses. We will also provide a brief overview of the benefits that each type of trust can provide. Finally, we will offer some tips on how to choose the right trust for your needs. With that said, below are 11 common phishing scams, how to identify them and how to protect yourself against them. <\/p>\n\n\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\tTable Of Contents<\/strong>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/path><\/svg>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
  1. 1. Spear Phishing<\/a>
  2. 2. Email Phishing<\/a>
  3. 3. Whaling<\/a>
  4. 4. Smishing<\/a>
  5. 5. Vishing<\/a>
  6. 6. Business Email Compromise (CEO Fraud)<\/a>
  7. 7. Clone Phishing<\/a>
  8. 8. Evil Twin Phishing<\/a>
  9. 9. Social Media Phishing<\/a>
  10. 10. Search Engine Phishing<\/a>
  11. 11. Pharming<\/a>
  12. Tips to Spot and Prevent Phishing Attacks:<\/a>
  13. Conclusion<\/a><\/ol>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\n\n

    1. Spear Phishing<\/strong><\/h2>\n\n\n\n

    Spear phishing is a more targeted form of email phishing, where the scammer tries to obtain information about specific individuals or organizations. They may do this by researching their target online, by stealing information from their victim’s computer, or through the telephone\u2013which is why it always pays to be suspicious of unknown numbers<\/a>. <\/p>\n\n\n\n

    Example of Spear Phishing<\/strong><\/h3>\n\n\n\n

    An example of spear phishing could be an email that appears to be from your boss, asking you to provide confidential information about your company. The email may have a link that takes you to a website that looks very similar to your company’s website but is actually a fake. Be very careful about clicking links in emails, especially if they ask for confidential information.<\/p>\n\n\n\n

    \"phishing<\/figure>\n\n\n\n

    2. Email Phishing<\/strong><\/h2>\n\n\n\n

    Email phishing is a type of online scam where criminals<\/a> attempt to steal your personal information by sending you a message that looks like it’s from a legitimate source. The email may ask you to provide sensitive information like your password or account number, or it may try to install malware on your computer. It often looks very authentic, so be careful not to fall for it.<\/p>\n\n\n\n

    Example of Email Phishing <\/strong><\/h3>\n\n\n\n

    An example of email phishing could be an email that appears to be from your bank, asking you to verify your account information. The email may have a link that takes you to a website that looks very similar to your bank’s website, but is actually a fake. Be very careful about clicking links in emails, especially if they ask for personal information.<\/p>\n\n\n\n

    3. Whaling<\/strong><\/h2>\n\n\n\n

    Whaling is a type of spear phishing that targets high-level executives and other wealthy individuals. The scammer sends the victim an email containing a fake request for financial assistance or some other sensitive information.<\/p>\n\n\n\n

    Example of Whaling:<\/strong><\/h3>\n\n\n\n

    An example of whaling could be an email that appears to be from your boss, asking you to provide confidential information about a new business deal. The email may have a link that takes you to a website that looks very similar to your company’s website but is actually a fake. Be very careful about clicking links in emails, especially if they ask for confidential information.<\/p>\n\n\n\n

    \"hacking<\/figure>\n\n\n\n

    4. Smishing<\/strong><\/h2>\n\n\n\n

    Smishing is a type of phishing scam that uses text messages instead of emails. The scammer sends you a message with a link or an attachment, and if you click on the link or open the attachment, you will install malware on your phone or give away your personal information.<\/p>\n\n\n\n

    Example of Smishing:<\/strong><\/h3>\n\n\n\n

    An example of smishing could be a text message that appears to be from your bank, asking you to verify your account information. The text message may have a link that takes you to a website that looks very similar to your bank’s website, but is actually a fake. Be very careful about clicking links in text messages, especially if they ask for personal information.<\/p>\n\n\n\n

    5. Vishing<\/strong><\/h2>\n\n\n\n

    Vishing is a type of phishing scam that uses voice messages instead of emails or text messages. The scammer sends you a message on your phone, and if you call the number in the message, you will be connected to a criminal who will try to steal your personal information.<\/p>\n\n\n\n

    Example of Vishing<\/strong><\/h3>\n\n\n\n

    An example of vishing could be a voicemail that appears to be from your bank, asking you to verify your account information. The voicemail may have a number that you can call to connect to a criminal who will try to steal your personal information. Be very careful about calling numbers in voicemails, especially if they ask for personal information.<\/p>\n\n\n\n

    6. Business Email Compromise (CEO Fraud)<\/strong><\/h2>\n\n\n\n

    CEO fraud, or Business Email Compromise, involves criminals stealing the email credentials of a company’s CEO or other high-level executive. They then use these credentials to send fraudulent emails to employees, asking for sensitive information or money.<\/p>\n\n\n\n

    Example of CEO Fraud<\/strong><\/h3>\n\n\n\n

    An example of CEO fraud could be an email that appears to be from your boss, asking you to transfer money to a bank account in order to pay for a new business deal. The email may have a link that takes you to a website that looks very similar to your company’s website but is actually a fake. Be very careful about clicking links in emails, especially if they ask for financial information.<\/p>\n\n\n\n

    7. Clone Phishing<\/strong><\/h2>\n\n\n\n

    Clone phishing occurs when the scammer sends an email that is very similar to an email that the victim has previously received. The goal of clone phishing is to trick the victim into thinking that the email is real and clicking on the link or opening the attachment.<\/p>\n\n\n\n

    Example of Clone Phishing<\/strong><\/h3>\n\n\n\n

    An example of clone phishing could be an email that appears to be from your bank, asking you to verify your account information. The email may have a link that takes you to a website that looks very similar to your bank’s website, but is actually a fake. Be very careful about clicking links in emails, especially if they ask for personal information.<\/p>\n\n\n\n

    8. Evil Twin Phishing<\/strong><\/h2>\n\n\n\n

    Evil twin phishing is a type of phishing attack that uses a fake wireless network to steal your personal information. The scammer sets up a fake wireless network that is very similar to the network you are trying to connect to, and when you try to connect to the fake network, you will give away your personal information.<\/p>\n\n\n\n

    Example of Evil Twin Phishing<\/strong><\/h3>\n\n\n\n

    An example of evil twin phishing could be a coffee shop that has a free Wi-Fi network called “Coffee Shop Wi-Fi.” If you try to connect to the “Coffee Shop Wi-Fi” network, you will give away your personal information. Be very careful about connecting to Wi-Fi networks, especially if they have names that are similar to real networks.<\/p>\n\n\n\n

    9. Social Media Phishing<\/strong><\/h2>\n\n\n\n

    Social media phishing is a type of phishing scam that uses social media platforms, such as Facebook, Twitter, and LinkedIn, to steal your personal information. The scammer sends you a message on one of these platforms, and if you click on the link or open the attachment, you will be connected to a criminal who will try to steal your personal information.<\/p>\n\n\n\n

    Example of Social Media Phishing<\/strong><\/h3>\n\n\n\n

    An example of social media phishing could be a message on LinkedIn that appears to be from your boss, asking you to transfer money to a bank account in order to pay for a new business deal. The message may have a link that takes you to a website that looks very similar to your company’s website but is actually a fake. Be very careful about clicking links in messages, especially if they ask for financial information.<\/p>\n\n\n\n

    10. Search Engine Phishing<\/strong><\/h2>\n\n\n\n

    Search engine phishing is a type of phishing scam that uses search engines, such as Google and Yahoo, to steal your personal information. The scammer sends you a link in an email or on a social media platform, and if you click on the link, you will be connected to a criminal who will try to steal your personal information.<\/p>\n\n\n\n

    Example of Search Engine Phishing<\/strong><\/h3>\n\n\n\n

    An example of search engine phishing could be an email that appears to be from your bank asking you to verify your account information. The email may have a link that takes you to a website that looks very similar to your bank’s website, but is actually a fake. Be very careful about clicking links in emails, especially if they ask for personal information.<\/p>\n\n\n\n

    11. Pharming<\/strong><\/h2>\n\n\n\n

    Pharming is a type of attack that uses a fake website to steal your personal information. The scammer sets up a fake website that is very similar to the website you are trying to visit, and when you try to visit the website, you will be redirected to the fake website. The fake website will ask for your personal information, and once you provide it, the scammer will have access to your personal information.<\/p>\n\n\n\n

    Example of Pharming<\/strong><\/h3>\n\n\n\n

    An example of pharming could be an email that appears to be from your bank, asking you to verify your account information. The email may have a link that takes you to a website that looks very similar to your bank’s website, but is actually a fake. Be very careful about clicking links in emails.<\/p>\n\n\n\n

    Related:<\/strong> How to Build a Healthy Security Culture with a Password Manager?<\/a><\/p>\n\n\n\n

    Tips to Spot and Prevent Phishing Attacks:<\/strong><\/h2>\n\n\n\n

    An email asks you to confirm your personal information<\/strong><\/h3>\n\n\n\n

    If you receive an email that asks for personal information, such as your bank account number or social security number, it is probably a scam. Do not reply to the email or click on any links in the email. Instead, contact the company that the email claims to be from using a phone number or website that you know to be legitimate.<\/p>\n\n\n\n

    An email asks you to open an attachment<\/strong><\/h3>\n\n\n\n

    If you receive an email that asks you to open an attachment, it is probably a scam. Do not open the attachment. Instead, contact the company that the email claims to be from using a phone number or website that you know to be legitimate.<\/p>\n\n\n\n

    An email has a link that takes you to a website<\/strong><\/h3>\n\n\n\n

    If you receive an email with a link that takes you to a website, it is probably a scam. Do not click on the link. Instead, contact the company that the email claims to be from using a phone number or website that you know to be legitimate.<\/p>\n\n\n\n

    A social media message asks you to click on a link<\/strong><\/h3>\n\n\n\n

    If you receive a social media message that asks you to click on a link, it is probably a scam. Do not click on the link. Instead, contact the company that the message claims to be from using a phone number or website that you know to be legitimate.<\/p>\n\n\n\n

    Poor grammar<\/strong><\/h3>\n\n\n\n

    Bad grammar is often a sign of a phishing scam. Be suspicious of any email or social media message that has poor grammar, as the scammer may not be a native English speaker.<\/p>\n\n\n\n

    Messages about a high-pressure situation:<\/strong><\/h3>\n\n\n\n

    Be suspicious of any email or social media message that claims you need to take action immediately, as this is often a sign of a phishing scam. The scammer may try to create a sense of urgency in order to get you to act before you have time to think about it.<\/p>\n\n\n\n

    Conclusion<\/strong><\/h2>\n\n\n\n

    Be cautious of any unsolicited emails, social media messages, or attachments that request your personal information. If you are unsure about the legitimacy of an email or message, contact the company it claims to be from using a phone number or website that you know to be legitimate. By being aware of the different types of phishing attacks, you can protect yourself from becoming a victim.<\/p>\n","protected":false},"excerpt":{"rendered":"

    In this article, we will discuss the different types of trusts that are available to individuals and businesses. We will […]<\/p>\n","protected":false},"author":2,"featured_media":2285,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"yoast_head":"\n11 Common Phishing Scams and How to Protect Yourself Against Them<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.attack-secure.com\/common-phishing-scams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"11 Common Phishing Scams and How to Protect Yourself Against Them\" \/>\n<meta property=\"og:description\" content=\"In this article, we will discuss the different types of trusts that are available to individuals and businesses. We will […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.attack-secure.com\/common-phishing-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"Attack Secure\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-11T07:57:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-09T11:16:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.attack-secure.com\/wp-content\/uploads\/2022\/03\/Common-Phishing-Scams-and-How-to-Protect-Yourself-Against-Them-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anas Baig\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anas Baig\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.attack-secure.com\/common-phishing-scams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.attack-secure.com\/common-phishing-scams\/\"},\"author\":{\"name\":\"Anas Baig\",\"@id\":\"https:\/\/www.attack-secure.com\/#\/schema\/person\/8f598f5e63a3da44c89c731591033a45\"},\"headline\":\"11 Common Phishing Scams and How to Protect Yourself Against Them\",\"datePublished\":\"2022-03-11T07:57:01+00:00\",\"dateModified\":\"2023-01-09T11:16:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.attack-secure.com\/common-phishing-scams\/\"},\"wordCount\":1875,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.attack-secure.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.attack-secure.com\/common-phishing-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.attack-secure.com\/wp-content\/uploads\/2022\/03\/Common-Phishing-Scams-and-How-to-Protect-Yourself-Against-Them-2.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.attack-secure.com\/common-phishing-scams\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.attack-secure.com\/common-phishing-scams\/\",\"url\":\"https:\/\/www.attack-secure.com\/common-phishing-scams\/\",\"name\":\"11 Common Phishing Scams and How to Protect Yourself Against Them\",\"isPartOf\":{\"@id\":\"https:\/\/www.attack-secure.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.attack-secure.com\/common-phishing-scams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.attack-secure.com\/common-phishing-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.attack-secure.com\/wp-content\/uploads\/2022\/03\/Common-Phishing-Scams-and-How-to-Protect-Yourself-Against-Them-2.jpg\",\"datePublished\":\"2022-03-11T07:57:01+00:00\",\"dateModified\":\"2023-01-09T11:16:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.attack-secure.com\/common-phishing-scams\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.attack-secure.com\/common-phishing-scams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.attack-secure.com\/common-phishing-scams\/#primaryimage\",\"url\":\"https:\/\/www.attack-secure.com\/wp-content\/uploads\/2022\/03\/Common-Phishing-Scams-and-How-to-Protect-Yourself-Against-Them-2.jpg\",\"contentUrl\":\"https:\/\/www.attack-secure.com\/wp-content\/uploads\/2022\/03\/Common-Phishing-Scams-and-How-to-Protect-Yourself-Against-Them-2.jpg\",\"width\":720,\"height\":340,\"caption\":\"Common Phishing Scams and How to Protect Yourself Against Them 2\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.attack-secure.com\/common-phishing-scams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.attack-secure.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"11 Common Phishing Scams and How to Protect Yourself Against Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.attack-secure.com\/#website\",\"url\":\"https:\/\/www.attack-secure.com\/\",\"name\":\"Attack Secure\",\"description\":\"Protecting you against cyber attacks!\",\"publisher\":{\"@id\":\"https:\/\/www.attack-secure.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.attack-secure.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.attack-secure.com\/#organization\",\"name\":\"TECHNUX SMC PVT LIMITED\",\"url\":\"https:\/\/www.attack-secure.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.attack-secure.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.attack-secure.com\/wp-content\/uploads\/2021\/01\/AttackSecure-1.png\",\"contentUrl\":\"https:\/\/www.attack-secure.com\/wp-content\/uploads\/2021\/01\/AttackSecure-1.png\",\"width\":471,\"height\":166,\"caption\":\"TECHNUX SMC PVT LIMITED\"},\"image\":{\"@id\":\"https:\/\/www.attack-secure.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.attack-secure.com\/#\/schema\/person\/8f598f5e63a3da44c89c731591033a45\",\"name\":\"Anas Baig\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.attack-secure.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac123a0791d4f6baded7fdf67c81624e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac123a0791d4f6baded7fdf67c81624e?s=96&d=mm&r=g\",\"caption\":\"Anas Baig\"},\"url\":\"https:\/\/www.attack-secure.com\/author\/anas-baig\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"11 Common Phishing Scams and How to Protect Yourself Against Them","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.attack-secure.com\/common-phishing-scams\/","og_locale":"en_US","og_type":"article","og_title":"11 Common Phishing Scams and How to Protect Yourself Against Them","og_description":"In this article, we will discuss the different types of trusts that are available to individuals and businesses. We will […]","og_url":"https:\/\/www.attack-secure.com\/common-phishing-scams\/","og_site_name":"Attack Secure","article_published_time":"2022-03-11T07:57:01+00:00","article_modified_time":"2023-01-09T11:16:48+00:00","og_image":[{"width":720,"height":340,"url":"https:\/\/www.attack-secure.com\/wp-content\/uploads\/2022\/03\/Common-Phishing-Scams-and-How-to-Protect-Yourself-Against-Them-2.jpg","type":"image\/jpeg"}],"author":"Anas Baig","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Anas Baig","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.attack-secure.com\/common-phishing-scams\/#article","isPartOf":{"@id":"https:\/\/www.attack-secure.com\/common-phishing-scams\/"},"author":{"name":"Anas Baig","@id":"https:\/\/www.attack-secure.com\/#\/schema\/person\/8f598f5e63a3da44c89c731591033a45"},"headline":"11 Common Phishing Scams and How to Protect Yourself Against Them","datePublished":"2022-03-11T07:57:01+00:00","dateModified":"2023-01-09T11:16:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.attack-secure.com\/common-phishing-scams\/"},"wordCount":1875,"commentCount":0,"publisher":{"@id":"https:\/\/www.attack-secure.com\/#organization"},"image":{"@id":"https:\/\/www.attack-secure.com\/common-phishing-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.attack-secure.com\/wp-content\/uploads\/2022\/03\/Common-Phishing-Scams-and-How-to-Protect-Yourself-Against-Them-2.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.attack-secure.com\/common-phishing-scams\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.attack-secure.com\/common-phishing-scams\/","url":"https:\/\/www.attack-secure.com\/common-phishing-scams\/","name":"11 Common Phishing Scams and How to Protect Yourself Against Them","isPartOf":{"@id":"https:\/\/www.attack-secure.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.attack-secure.com\/common-phishing-scams\/#primaryimage"},"image":{"@id":"https:\/\/www.attack-secure.com\/common-phishing-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.attack-secure.com\/wp-content\/uploads\/2022\/03\/Common-Phishing-Scams-and-How-to-Protect-Yourself-Against-Them-2.jpg","datePublished":"2022-03-11T07:57:01+00:00","dateModified":"2023-01-09T11:16:48+00:00","breadcrumb":{"@id":"https:\/\/www.attack-secure.com\/common-phishing-scams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.attack-secure.com\/common-phishing-scams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.attack-secure.com\/common-phishing-scams\/#primaryimage","url":"https:\/\/www.attack-secure.com\/wp-content\/uploads\/2022\/03\/Common-Phishing-Scams-and-How-to-Protect-Yourself-Against-Them-2.jpg","contentUrl":"https:\/\/www.attack-secure.com\/wp-content\/uploads\/2022\/03\/Common-Phishing-Scams-and-How-to-Protect-Yourself-Against-Them-2.jpg","width":720,"height":340,"caption":"Common Phishing Scams and How to Protect Yourself Against Them 2"},{"@type":"BreadcrumbList","@id":"https:\/\/www.attack-secure.com\/common-phishing-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.attack-secure.com\/"},{"@type":"ListItem","position":2,"name":"11 Common Phishing Scams and How to Protect Yourself Against Them"}]},{"@type":"WebSite","@id":"https:\/\/www.attack-secure.com\/#website","url":"https:\/\/www.attack-secure.com\/","name":"Attack Secure","description":"Protecting you against cyber attacks!","publisher":{"@id":"https:\/\/www.attack-secure.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.attack-secure.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.attack-secure.com\/#organization","name":"TECHNUX SMC PVT LIMITED","url":"https:\/\/www.attack-secure.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.attack-secure.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.attack-secure.com\/wp-content\/uploads\/2021\/01\/AttackSecure-1.png","contentUrl":"https:\/\/www.attack-secure.com\/wp-content\/uploads\/2021\/01\/AttackSecure-1.png","width":471,"height":166,"caption":"TECHNUX SMC PVT LIMITED"},"image":{"@id":"https:\/\/www.attack-secure.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.attack-secure.com\/#\/schema\/person\/8f598f5e63a3da44c89c731591033a45","name":"Anas Baig","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.attack-secure.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac123a0791d4f6baded7fdf67c81624e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac123a0791d4f6baded7fdf67c81624e?s=96&d=mm&r=g","caption":"Anas Baig"},"url":"https:\/\/www.attack-secure.com\/author\/anas-baig\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/www.attack-secure.com\/wp-content\/uploads\/2022\/03\/Common-Phishing-Scams-and-How-to-Protect-Yourself-Against-Them-2.jpg",720,340,false],"thumbnail":["https:\/\/www.attack-secure.com\/wp-content\/uploads\/2022\/03\/Common-Phishing-Scams-and-How-to-Protect-Yourself-Against-Them-2-150x150.jpg",150,150,true],"medium":["https:\/\/www.attack-secure.com\/wp-content\/uploads\/2022\/03\/Common-Phishing-Scams-and-How-to-Protect-Yourself-Against-Them-2-300x142.jpg",300,142,true],"medium_large":["https:\/\/www.attack-secure.com\/wp-content\/uploads\/2022\/03\/Common-Phishing-Scams-and-How-to-Protect-Yourself-Against-Them-2.jpg",720,340,false],"large":["https:\/\/www.attack-secure.com\/wp-content\/uploads\/2022\/03\/Common-Phishing-Scams-and-How-to-Protect-Yourself-Against-Them-2.jpg",720,340,false],"1536x1536":["https:\/\/www.attack-secure.com\/wp-content\/uploads\/2022\/03\/Common-Phishing-Scams-and-How-to-Protect-Yourself-Against-Them-2.jpg",720,340,false],"2048x2048":["https:\/\/www.attack-secure.com\/wp-content\/uploads\/2022\/03\/Common-Phishing-Scams-and-How-to-Protect-Yourself-Against-Them-2.jpg",720,340,false]},"uagb_author_info":{"display_name":"Anas Baig","author_link":"https:\/\/www.attack-secure.com\/author\/anas-baig\/"},"uagb_comment_info":1,"uagb_excerpt":"In this article, we will discuss the different types of trusts that are available to individuals and businesses. We will […]","_links":{"self":[{"href":"https:\/\/www.attack-secure.com\/wp-json\/wp\/v2\/posts\/2279"}],"collection":[{"href":"https:\/\/www.attack-secure.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.attack-secure.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.attack-secure.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.attack-secure.com\/wp-json\/wp\/v2\/comments?post=2279"}],"version-history":[{"count":4,"href":"https:\/\/www.attack-secure.com\/wp-json\/wp\/v2\/posts\/2279\/revisions"}],"predecessor-version":[{"id":2365,"href":"https:\/\/www.attack-secure.com\/wp-json\/wp\/v2\/posts\/2279\/revisions\/2365"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.attack-secure.com\/wp-json\/wp\/v2\/media\/2285"}],"wp:attachment":[{"href":"https:\/\/www.attack-secure.com\/wp-json\/wp\/v2\/media?parent=2279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.attack-secure.com\/wp-json\/wp\/v2\/categories?post=2279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.attack-secure.com\/wp-json\/wp\/v2\/tags?post=2279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}