{"id":53314,"date":"2018-07-17T16:57:41","date_gmt":"2018-07-17T21:57:41","guid":{"rendered":"https:\/\/www.een.com\/?p=53314"},"modified":"2020-08-11T14:03:44","modified_gmt":"2020-08-11T19:03:44","slug":"beware-of-phishing-emails","status":"publish","type":"post","link":"https:\/\/www.een.com\/de\/blog\/beware-of-phishing-emails\/","title":{"rendered":"Beware of Phishing Emails"},"content":{"rendered":"<p>Phishing emails are on the rise and can have devastating results, including unauthorized purchases, the stealing of funds, or identify theft. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link, which can lead to the installation of malware, the freezing of the system as part of a ransomware attack or the revealing of sensitive information.<\/p>\n<p>One of the latest phishing attacks involves email invoices which appear to be from INTUIT &#8211; and they are are looking more and more legitimate.\u00a0These emails should be blocked by spam filter software, but they appear to be landing in inboxes.<\/p>\n<p>Here is a sample phishing email:<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft wp-image-53315 size-large\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2018\/07\/Screen-Shot-2018-07-17-at-12.21.27-PM-copy-1024x595.png\" alt=\"\" width=\"1024\" height=\"595\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2018\/07\/Screen-Shot-2018-07-17-at-12.21.27-PM-copy-1024x595.png 1024w, https:\/\/www.een.com\/wp-content\/uploads\/2018\/07\/Screen-Shot-2018-07-17-at-12.21.27-PM-copy-300x174.png 300w, https:\/\/www.een.com\/wp-content\/uploads\/2018\/07\/Screen-Shot-2018-07-17-at-12.21.27-PM-copy-100x58.png 100w, https:\/\/www.een.com\/wp-content\/uploads\/2018\/07\/Screen-Shot-2018-07-17-at-12.21.27-PM-copy-200x116.png 200w, https:\/\/www.een.com\/wp-content\/uploads\/2018\/07\/Screen-Shot-2018-07-17-at-12.21.27-PM-copy-400x233.png 400w, https:\/\/www.een.com\/wp-content\/uploads\/2018\/07\/Screen-Shot-2018-07-17-at-12.21.27-PM-copy-600x349.png 600w, https:\/\/www.een.com\/wp-content\/uploads\/2018\/07\/Screen-Shot-2018-07-17-at-12.21.27-PM-copy-800x465.png 800w, https:\/\/www.een.com\/wp-content\/uploads\/2018\/07\/Screen-Shot-2018-07-17-at-12.21.27-PM-copy-1200x698.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<ul>\n<li><\/li>\n<\/ul>\n<p>Protect yourself from phishing attacks &#8211; follow these tips:<\/p>\n<ul>\n<li>Make sure you subscribe to an anti-virus software and keep it up-to-date.<\/li>\n<li>Make sure you have updated your web browser to one that includes anti-phishing security features.<\/li>\n<li>Make sure that you keep up to date on the latest releases and patches for your operating systems and critical programs. These releases are frequently security related.<\/li>\n<li>Do not respond to e-mails asking for account, password, banking, or credit card information.<\/li>\n<li>Do not open up an attachment that claims to be a software update, an invoice, etc.<\/li>\n<\/ul>\n<p>Contact Sales<\/p>\n<p>More Cyber Security Blogs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing emails are on the rise and can have devastating results, including unauthorized purchases, the stealing of funds, or identify theft. It occurs when an attacker, masquerading as a trusted &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/de\/blog\/beware-of-phishing-emails\/\"> <span class=\"screen-reader-text\">Beware of Phishing Emails<\/span> Weiterlesen &raquo;<\/a><\/p>\n","protected":false},"author":3155,"featured_media":53323,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"101083,87896,71622,70532,46726,53484","_relevanssi_noindex_reason":"","footnotes":""},"categories":[230],"tags":[1273,1276,1272],"class_list":["post-53314","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cloud-video-surveillance","tag-cybersecurity","tag-video-management-software"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/posts\/53314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/users\/3155"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/comments?post=53314"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/posts\/53314\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/media\/53323"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/media?parent=53314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/categories?post=53314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/tags?post=53314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}