In this article:
In this article:
Phishing attacks are one of the most common ways that scammers target you (and steal your identity). Here’s how you can prevent phishing.
In this article:
In this article:
When David Barnett’s caller ID showed that Bank of America was calling, he quickly answered. The caller informed him that his bank account had been compromised and someone was attempting to withdraw almost half of his life’s savings [*].
The only way to safeguard his money, Barnett was told, would be to move it temporarily to another account using the payment transfer app Zelle. Confused and scared, he followed the caller’s instructions.
But the minute he confirmed the transfer, Barnett realized what was really going on: he was the victim of a phishing attack.
Phishing attacks occur when fraudsters pretend to be people they’re not in order to steal your money, sensitive information, or passwords.
Deceptive links emerged as the top phishing tactic, accounting for nearly 36% of threats [*].
It's important to know how to spot phishing scams, especially since scammers often pretend to be from big companies like Microsoft, Google, Salesforce, and Amazon.
But is it possible to prevent phishing attacks from happening in the first place?
{{show-toc}}
While you’ll never be able to block or prevent all phishing attacks, these tips will help reduce your risk of being targeted.
Phishing is a type of imposter scam in which fraudsters pretend to be someone they’re not — usually a representative from a trusted company or government organization — in order to get you to give up sensitive information and money or click on links to malicious websites.
While email is the primary delivery method for phishing attacks, scammers also use phone calls (known as “vishing”), fraudulent text messages (“smishing”), social media messages, and even fake websites.
Phishing attacks target everyone — young or old, rich or poor. And scammers are constantly updating their phishing schemes. To prevent falling victim to these attacks, it’s essential that you learn to recognize their red flags.
Warning signs of a phishing attack include:
📚 Related: How To Quickly Identify Phishing Emails (13 Warning Signs) →
According to the FBI, victims of phishing and similar online scams lost a staggering $6.9 billion in 2021 alone [*].
The majority of phishing attacks happen via email. And unfortunately, scammers have learned how to bypass basic email security in order to get their scam messages into your inbox. To avoid receiving spam and scam emails, update your spam filters to block out more potential phishing attacks.
Here’s how to customize your spam filters in:
Antivirus software scans your computer, phone, and inbox for signs of malware. Many antivirus solutions also include a firewall to prevent you from visiting phishing sites or accidentally downloading malware contained in email links.
While antivirus software won’t stop phishing attacks, it can help you avoid some of the worst consequences of getting scammed.
Phishing scams often try to get you to enter information on fake websites. If you receive a text message, email, or message that claims to be from a company that you know and trust and asks you to click on a link, don’t. Instead, visit the site directly to make sure you’re not getting scammed.
For example, a recent UPS text message scam claims that you missed a package delivery and need to click on a link to reschedule. But the website you’re taken to steals your credit card and personal information.
Instead, always visit the site in question directly. In this case, go to the official UPS.com site and check the tracking number for your package.
The same goes for attachments in unsolicited messages. Cybercriminals use email attachments to install malware that damages your device or steals your data.
📚 Related: How To Know If a Website Is Safe →
There are numerous apps and tools that you can use to limit the amount of phishing text messages you receive. Most mobile carriers include anti-spam tools including: Verizon Call Filter, AT&T Call Protect, U.S Cellular Call Guardian, and T-Mobile Scam Shield.
Or, you can try a third-party spam blocking app such as TrueCaller (for Android) or TextKiller (for iPhones).
When you do receive phishing text messages, make sure you report them by forwarding the message to 7726. Then, block the phone number so that you will stop receiving these unsolicited messages.
Alternatively, Aura's spam call and text protection can block known spam (or scam) callers and filter unwanted messages.
You can even set up intent-based filtering to allow our AI Call Assistant to forward legitimate calls. All spam call protection features are available for iOS users on Aura's family plans or as add-ons for $5 a month.
Phishing attackers need your personal information to target you (email address, phone number, etc.). There are many ways for scammers to get your information — such as finding it online or through data breaches.
But one of the easiest methods for scammers is to buy massive lists of contact information from data brokers.
Data brokers collect and sell your contact information to telemarketers, advertisers, and scammers. You can request that data brokers remove your information from their lists. Or better yet, let Aura do it for you.
Call filters create a separate inbox for text messages that come from people not on your contacts list. This is a great initial screen to help you avoid phishing attacks. Here’s how to set up call filters on your phone:
It can be tempting to reply to scam emails, calls, or texts — even just to tell off the scammer. But any interaction with a phishing attacker can open you up to unnecessary risks.
Replying to a phishing email (or even sending “STOP” to a text message) confirms that your contact information is active. You might also accidentally be giving scammers more information about you, such as whatever is in your email signature (name, phone number, job title, etc.).
Whatever you do, never give away passwords, PINs, or 2FA codes via email, text, or phone calls. Companies will never ask for this kind of sensitive information.
📚 Related: How To Avoid Chase Bank Phishing Email Scams →
The less information about you that scammers can access, the fewer phishing attacks and security threats you’ll receive. Whenever you sign up for a new online service, provide only the essential information they require.
Scammers use your leaked personal information to fool you into believing they’re legitimate. For example, a phishing email or text might include your bank account number. Or a scammer on the phone might know your SSN and address — making you believe you should follow their instructions.
You can check if you’re at risk by using Aura’s free Dark Web scanner. This tool will show you what accounts and passwords have been leaked to the Dark Web in recent data breaches or hacks.
Then, consider signing up for a Dark Web monitoring tool that will constantly scan for new personal data leaked to the Dark Web. Aura includes Dark Web monitoring with every plan, meaning you’ll know in near real-time if your information has been leaked.
📚 Related: Was Your Walmart Account Hacked? Do This →
Limiting who can see your personal information and posts on social media can greatly protect you against spear phishing campaigns.
Here’s how you can update your privacy settings on most major social media sites:
Public Wi-Fi and unsecured networks are notoriously easy to hack. When scammers gain access to a Wi-Fi network you’re using, they can intercept your messages and steal critical information, such as saved passwords, financial account information, and login details. They can also target your devices with malicious pop-ups and phishing messages.
Whenever you have to use your computer or device in public, use either a mobile hotspot or a virtual private network (VPN). A VPN encrypts your data so that hackers can’t intercept your sensitive information and use it in a phishing attack.
Cybercriminals use pop-ups to distribute spyware, adware, and other destructive malware. Often, they’ll include messages that claim your device has been infected with malware — and that you need to call tech support to resolve the issue. But this is all part of an elaborate phishing scam.
Ignore these pop-ups and instead close your browser. If you think you may have been hacked, here’s what to look for and what to do.
📚 Related: Is Avast Antivirus Safe To Use? What To Know Before You Buy →
Scammers are masters at human psychology. They use threatening language or the promise of an incredible deal to bypass your alarm instincts. But reputable companies will never threaten you if you don’t disclose personal information.
Whenever you feel a sense of urgency from a message or phone call, slow down. This is a major warning sign of a phishing attack.
Instead, contact the company directly (if you’re on the phone, ask for a reference number and then hang up). This way, you know for sure that you’re talking to the real company.
📚 Related: What Is "Whaling?" How To Avoid Executive Fraud →
Software updates often include security patches for known vulnerabilities that hackers can otherwise exploit to hack into your computer and mobile phone. Always update your software and operating system immediately. Even better, enable auto-updates to make sure that your device automatically stays as secure as possible.
Outside of software updates, it’s important to safeguard your accounts. At a minimum, you should follow these cyber hygiene guidelines:
📚 Related: What Is Cyber Hygiene? 10 Easy Habits That Keep You Safe Online →
Most modern phishing scams involve links to fake websites. These sites are designed to look like legitimate ones (such as your bank’s log-in page or a package delivery notification). However, any information you submit goes straight to scammers.
Always double-check the URL before submitting data on a website. Make sure that you’re on the official site — and not a lookalike website (for example “Walmrat.com” instead of “Walmart.com”).
Aura's Safe Browsing feature prevents you from navigating to dangerous website, using a popup alert.
Phishing attacks are only getting more sophisticated, which means it’s often a question of when you fall for one — not if.
For peace of mind, consider signing up for an all-in-one digital security solution that will protect your devices from hackers, warn you of phishing websites, and monitor your financial and personal accounts for signs of fraud.
With Aura, you get:
As scammers get more advanced in their attacks, a major part of phishing prevention is to learn how scammers target you with suspicious emails or fraudulent phone calls.
Here’s how a phishing attack typically works:
However, there are numerous phishing variations that you could be targeted by. Here are the most common types of phishing attacks to be aware of:
Spear phishing occurs when scammers research information about you or your company in order to tailor their phishing attack just for you. Spear phishing often targets business emails in an attempt to gain access to your company’s network and data. Most organizations received at least five spear-phishing emails in a day [*].
Here’s how spear phishing works:
Email spoofing is a type of cyberattack in which hackers use forged or faked email addresses to trick you into thinking they’re someone they’re not. More than 95% of all cyberattacks began with a phishing email [*].
Here’s how email spoofing works:
Vishing is a type of phone scam in which fraudsters call you and pretend to be a representative from a well-known organization.
Once on the phone, they’ll try and trick you into “confirming” sensitive information or sending them money.
Here’s how vishing works:
📚 Related: How To Identify Medicare Scam Calls: Don’t Fall For These 7 Scams →
Smishing is a form of phishing in which scammers use fake text messages to trick you into sharing personal identifiable information (PII). Based on Proofpoint's 2023 State of the Phish report, 76% of organizations were victims to smishing attacks last year [*].
Here’s how smishing works:
📚 Related: How To Know if Your Phone Is Hacked (and What To Do) →
Scammers can also send phishing attacks over social media sites like Instagram, Facebook, or LinkedIn.
The goal with social media phishing is often to get you to give up your account login and password — so that scammers can use your profile to scam your friends.
Approximately 12% of clicks to phishing sites originate from social media messages [*].
Here's how social media phishing happens:
A phishing website is a malicious website that scammers use to trick you into sharing confidential information. For example, they might create a website that looks like your online banking login page to induce you to enter your account numbers and password.
Here’s how phishing websites work:
Online safety and security awareness can go a long way in helping you avoid phishing attacks. But with the rise of phishing, there’s no way to totally protect yourself.
Here’s what to do if you accidentally gave a phishing scammer money or sensitive data:
Scammers continuously enhance their phishing attacks to prey on human weakness and exploit vulnerabilities in your devices.
Instead of worrying about how to defend against phishing, a proactive approach — like signing up for Aura’s all-in-one digital security solution — ensures that you have protection against the latest phishing techniques.
Editorial note: Our articles provide educational information for you to increase awareness about digital safety. Aura’s services may not provide the exact features we write about, nor may cover or protect against every type of crime, fraud, or threat discussed in our articles. Please review our Terms during enrollment or setup for more information. Remember that no one can prevent all identity theft or cybercrime.