This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionLast revisionBoth sides next revision | ||
faq:email:how_to_detect_phishing_attempts_from_fake_wetransfer_email [2021/02/18 14:54] – atikah | faq:email:how_to_detect_phishing_attempts_from_fake_wetransfer_email [2021/02/22 15:02] – atikah | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== How to detect phishing attempts from fake WeTransfer email ====== | ====== How to detect phishing attempts from fake WeTransfer email ====== | ||
- | ---- | ||
- | WeTransfer is one of the famous | + | WeTransfer is one of the popular |
{{ : | {{ : | ||
- | Both figure above show the example of fake and genuine WeTransfer email. Here, you can see that the content for these two emails is extremely similar. So, if you are not vigilant | + | Both figure above show the example of fake and genuine WeTransfer email. Here, you can see that the content for these two emails is extremely similar. There are numerous version of fake WeTransfer email. So, if you are not be cautious |
- | The most distinctive characteristic is the suspicious download link. You may hover over the download button and check the full URL of the button. The correct URL should begin with https:// | + | Here are some characteristics that can distinguish the fake WeTransfer email from the real one: |
+ | |||
+ | |||
+ | ==== 1. Suspicious download link ==== | ||
+ | |||
+ | The most distinctive characteristic | ||
{{ : | {{ : | ||
- | In addition, you may also check and verify | + | On top of that, there is case where the download link is written as https:// |
+ | |||
+ | {{ : | ||
+ | |||
+ | ==== 2. Suspicious file's sender email address | ||
+ | |||
+ | In addition, you may also check and verify | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | Above is an example of a suspicious file's sender email address. | ||
+ | |||
+ | ==== 3. Suspicious WeTransfer email address | ||
+ | |||
+ | Sometimes, the email may appear like it is sent from WeTransfer when it is in fact sent from suspicious email address. How they configure the email address is by using " | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | Last but not least, anyone can fall victim to this scam, whether he is an office clerk or even a technical expert. The most important thing is to always be extra careful and vigilant when you encounter any suspicious emails. With this, you may safe yourself from being a victim to these phishers. | ||
- | Sometimes, the email may appear like it is sent from WeTransfer when it is obviously sent from suspicious email address. How they configure the email address is by using " | ||
- | {{: |