Chris Stanley 570-408-6172 (T)
Home | Phishing Examples | FAQ | Resources
What is a Phishing Email?
A phishing email is a message that attempts to steal personal information in regards to your identity.
How to Recoznize a Phishing Email
A phishing email appears in a variety of forms. Here are a few ways to help you recognize a phishing email. It's important to remember that Wilkes University’s Information Technology Services will never request passwords or personal information via email.
Things to know
- Phishing emails may appear to come from places you do business with (banks, social media websites). They may also appear to be from someone you know or an employeer. There are two forms of phishing in particular.
- Spear Phishing is a targeted form of phishing where the email appears to come from an employer or colleague (such as an IT email).
- Phone Phishing is a form of phishing in which the email directs you to make a phone call to a custumer service line. Generally, these phone numbers lead to a person or automated response which requests personal information.
- Phishing emails may also use official logos or banners taken directly from the actual website. Often links in the email will refer to a spoofed (or fake) website.
Phishing links are links that direct you to a spoofed website. Here are some things to look out for:
- Often phishing links will be very similiar to an official sites link. They could be off by one or two letters, but look familiar enough that someone will click on them. For example:
- Correct Link: http://www.wilkes.edu
- Phishing Link: http//www.wlkes.edu
- Phishing links also contain hidden forms or links. They often mask the link by having it appear one way, but link to completely different link.
- If you are uncomfortable or concerned about an email, the best response is to delete it. Never provide personal information via email. Do not click a link in an email if you are unsure of the contents, even if it's from a friend or co-worker.
Most importantly, please remember that Wilkes University’s Information Technology Services will never request passwords or personal information via email. For more information, please visit Microsoft's Phishing FAQ or visit our Resources page.