We’re sorry, your browser appears to be outdated.
To see the content of this webpage correctly, please update to the latest version or install a new browser for free, such as Avast Secure Browser or Google Chrome.

Not sure which solution is right for your business?

Phish Phinder

Tell-tale signs of a (potentially) successful email phishing scam

Hackers use phishing emails to obtain your:

Credit card

All it takes is for you to take the bait by:

Opening an attachment
Clicking a malicious link
Entering sensitive information

Anatomy of a phishing email

Look for any of the following suspicious elements when opening your next email.


  • 1. Does the name match the sender? Have you received an email from this address before?
  • 2. Is the email directed at undisclosed-recipients? Was it sent to several addresses?
  • 3. Is this a normal time/date for this sender to have emailed you?
  • 4. Is the subject something relevant to my relationship with the sender? Is the subject line requesting my immediate response or promising me a reward?


  • 5. Is this the senders usual greeting?
  • 6. Look out for typos.
  • 7. Hover over a link before clicking. Does the URL look right? Has a letter been omitted? Are they using .net when it should be .com?
  • 8. If the sender is asking for private information you should immediately flag it.

Red flags

  • Warning Is the content relevant to your relationship with the sender?
  • Warning Is the issue really as urgent as the sender is implying?


  • 9. Never offer your login information into a portal, especially if unsolicited.
  • 10. Do not open unexpected attachments, especially when the file type is a .pif, .scr or .exe
  • 11. Does the salutation match the sender? Is this how they usually sign off?

Don't take the bait

1 in 10 Phishing emails succeed


  • A little scrutiny goes a long way
  • Be aware of the warning signs and don’t ignore them
  • If it doesn’t look right, it probably isn’t
  • Take a closer look before taking action

Keep your anti-spam or anti-virus software up to date.

Secure your network traffic to mitigate phishing risk at your company!


Almost done!

Complete installation by clicking your downloaded file and following the instructions.

Initiating download...
Note: If your download did not start automatically, please click here.
Click this file to start installing Avast.