3 steps to identify a potential phishing email

CSO was recently targeted by a phishing campaign. In this guide, Steve Ragan breaks down the elements of the email that were red flags

As explained in a previous story, the editorial team at CSO was targeted by a phishing campaign recently. If it had been successful, the person(s) behind it would have tricked us into installing the Zeus Trojan, a nasty bit of financial malware.

Lucky for us however, our user awareness training took hold, and we used some basic logic in order to spot the scam. So in addition to a visual breakdown, which you can see here, this article will address some basics when it comes to spotting and dealing with a phishing attack.

To continue reading, register here to become an Insider. You'll get free access to premium content from CIO, Computerworld, CSO, InfoWorld, and Network World. See more Insider content or sign in.

This story, "3 steps to identify a potential phishing email" was originally published by CSO.

To comment on this article and other Network World content, visit our Facebook page or our Twitter stream.
Must read: Hidden Cause of Slow Internet and how to fix it
Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.