(530) 677-8864
/
Contact Us
Cameron Park Computer Services Cameron Park Computer Services Cameron Park Computer Services Cameron Park Computer Services
Navigation
  • Home
  • Network Support
    • Certifications
    • Resume
    • Trouble Ticket
    • Network Support News
  • Cloud
  • Cybersecurity
    • Ransomware Recovery Test Lets You Stop Worrying
    • x360 Recover Gets You Back in Business after Ransomware or Disasters
    • Run a WIFI Secure Scan
    • Anatomy of a Cyber Attack
    • Cybersecurity News
  • Security Blog
  • More…
    • About Cameron Park Computer Services
    • Certifications
    • Privacy Policy
    • Business Associate Agreement
    • Why does your website need a privacy policy?

Protect yourself from phishing attempts.

Phishing…yes or no?

 

This morning, I received a rather suspicious e-mail allegedly from Amazon.com. This looked like an order confirmation for a TV someone purchased and shipped to Alabama. Upon inspection, I learned this was a phishing attempt. I deleted the fraudulent message. I want to show how to identify a phishing attempt on your own.

This message looked like a typical Amazon.com order confirmation. It had the Amazon logo and usual fonts. It even had hyperlinks in the usual places. It looked pretty good.

Don't fall for a phish

I was suspicious. I have not ordered a TV from Amazon.com and do not know anyone in Alabama. I checked the message and determined it was truly a phishing attempt. According to Wikipedia, Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.

How to tell.

Beware the phish

The answer is pretty straightforward: Hover. I moved my mouse pointer over the “Order Details” link but did not click it. This link, if I had clicked it, would have taken me to someone’s website at http://frontsighttacticalanddefense.com. Surely not Amazon.com. This is a simple trick you can use to make sure you do not fall for a phishing attempt. Be safe everybody!

Like this post!
  • Next Post
  • Previous Post

Search

Recent Posts

  • How to avoid Wannacry Ransomware
  • How WannaCry Ransomware works
  • How to protect your data from malware
  • How to spot a phishing attack
  • How to spot a phishing attempt

Categories

  • Cloud (1)
  • Cybersecurity (35)
  • Featured (10)
  • Support (31)
© 2025 Cameron Park Computer Services. 3450 Palmer Drive #4-286. Cameron Park, CA USA 95682. (530) 677-8864.
  • Network Support
  • /
  • Cloud
  • /
  • Cybersecurity
  • /
  • Security Blog
  • /
  • More…
  • /

Two Page Quiz

Take your phishing attack free two page quiz today!

Hackers want to steal your online identity. This includes credit card numbers, social security numbers and passwords. What you do for a living does not matter to them. Consequently, what does matter is you have some information they can steal and sell. Download this short two page quiz to see how savvy (or gullible) you are.

Your information is safe. We do not sell e-mail addresses.

    Your Name (required)

    Your Email (required)

    Your Phone Number (required)

    Your Message

    Yes, we will call to follow-up. No, we will not sell your name.