scorecardNobel laureate Paul Krugman said he likely fell for a phishing scam. Here's how phishing scams work and how to avoid them.
  1. Home
  2. slideshows
  3. miscellaneous
  4. Nobel laureate Paul Krugman said he likely fell for a phishing scam. Here's how phishing scams work and how to avoid them.

Nobel laureate Paul Krugman said he likely fell for a phishing scam. Here's how phishing scams work and how to avoid them.

The majority of hacks and breaches are the result of phishing.

Nobel laureate Paul Krugman said he likely fell for a phishing scam. Here's how phishing scams work and how to avoid them.

Phishing is a rising threat, according to cybersecurity experts.

Phishing is a rising threat, according to cybersecurity experts.

According to the Verizon report, email-based phishing scams are on the rise, and are the most prominent form of cyberattack.

Phishing usually starts with a call, email, or pop-up that looks legitimate but is actually coming from a scammer.

Phishing usually starts with a call, email, or pop-up that looks legitimate but is actually coming from a scammer.

Beware of anyone who asks for personal information via email or phone, especially when you weren't expecting them to get in contact.

Beware of anyone who asks for personal information via email or phone, especially when you weren

According to a guide compiled by Google, phishing attempts usually seek out usernames, passwords, Social Security numbers, bank account numbers, or personal information. Most legitimate organizations will never ask you to send sensitive information via email.

If you receive an email or phone call that you weren't expecting that's asking for personal information, try to verify where it's coming from.

If you receive an email or phone call that you weren

If it's an email, double check the sender's email address to make sure it's coming from the domain they claim to be affiliated with — scammers will regularly use slightly modified email domains meant to resemble the real deal. You can also use online tools to check whether the email is authenticated.

When in doubt, cease communication and try to contact the organization directly.

When in doubt, cease communication and try to contact the organization directly.

If you're communicating with someone who you suspect isn't with the organization they say they are, try to verify with that organization directly. For example, if someone says they're with your phone provider and is asking for personal information, hang up and call your phone provider directly.

If you spot phishing, report it.

If you spot phishing, report it.

Most email and phone providers have internal channels to report suspected phishing attempts. The Department of Homeland Security also encourages people to report phishing through their website.

Advertisement