(530) 677-8864
/
Contact Us
Cameron Park Computer Services Cameron Park Computer Services Cameron Park Computer Services Cameron Park Computer Services
Navigation
  • Home
  • Network Support
    • Certifications
    • Resume
    • Trouble Ticket
    • Network Support News
  • Cloud
  • Cybersecurity
    • Ransomware Recovery Test Lets You Stop Worrying
    • x360 Recover Gets You Back in Business after Ransomware or Disasters
    • Run a WIFI Secure Scan
    • Anatomy of a Cyber Attack
    • Cybersecurity News
  • Security Blog
  • More…
    • About Cameron Park Computer Services
    • Certifications
    • Privacy Policy
    • Business Associate Agreement
    • Why does your website need a privacy policy?

How to spot a phishing attempt

Yesterday’s phishing attempt.

Time for a quizYesterday morning, someone sent me a phishing attempt. According to Wikipedia, “phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.” My spidey sense triggered. I did not click any of the links.

Part 1 of this topic is a screen capture of that message. I will ask you if this is a phishing attempt.
Part 2 shows how I determined it truly was a phishing attempt.

Part 1.

Here is the screen capture. What would you check to determine if this was or was not a phishing attempt?

What does a phishing attempt look like (part 1)


Part 2.

How I knew this was a phishing attempt and what you should have caught.

  • The sender is in Poland. Since when is Amazon a Polish company?
  • This went to my professional account. I manage Amazon transactions through a Yahoo account.
  • The “Click the Link to Confirm Your Identity” link takes us to a shortened link. It is tough to tell where this ow.ly link would take you unless you clicked it. I opened it in a private browser window. This takes the user to a fake Amazon page. Anybody typing in their real Amazon username and password would be submitting it to the fraud who is running the scheme.

What does a phishing attempt look like (part 2)

The dead giveaway.

When looking at a link and your spidey sense starts tingling, pause for two seconds. Ask if the link is legitimate or not. Vet the link. Move the mouse pointer over the link (do NOT click the link) and see where the link would take you.

We are Rich Americans. Internet crackers launch phishing attacks as easy ways to capture our personal information. This includes usernames, passwords, social security numbers and credit card numbers. Beware, everybody.

 

 

 

Like this post!
  • Next Post
  • Previous Post

Search

Recent Posts

  • How to avoid Wannacry Ransomware
  • How WannaCry Ransomware works
  • How to protect your data from malware
  • How to spot a phishing attack
  • How to spot a phishing attempt

Categories

  • Cloud (1)
  • Cybersecurity (35)
  • Featured (10)
  • Support (31)
© 2025 Cameron Park Computer Services. 3450 Palmer Drive #4-286. Cameron Park, CA USA 95682. (530) 677-8864.
  • Network Support
  • /
  • Cloud
  • /
  • Cybersecurity
  • /
  • Security Blog
  • /
  • More…
  • /

Two Page Quiz

Take your phishing attack free two page quiz today!

Hackers want to steal your online identity. This includes credit card numbers, social security numbers and passwords. What you do for a living does not matter to them. Consequently, what does matter is you have some information they can steal and sell. Download this short two page quiz to see how savvy (or gullible) you are.

Your information is safe. We do not sell e-mail addresses.

    Your Name (required)

    Your Email (required)

    Your Phone Number (required)

    Your Message

    Yes, we will call to follow-up. No, we will not sell your name.