This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionLast revisionBoth sides next revision | ||
faq:email:how_to_detect_phishing_attempts_from_fake_wetransfer_email [2021/02/22 10:21] – atikah | faq:email:how_to_detect_phishing_attempts_from_fake_wetransfer_email [2021/02/22 15:02] – atikah | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== How to detect phishing attempts from fake WeTransfer email ====== | ====== How to detect phishing attempts from fake WeTransfer email ====== | ||
- | ---- | ||
WeTransfer is one of the popular cloud-based online platform for file transferring. Due to its fame, there are irresponsible individuals known as ‘phisher’, | WeTransfer is one of the popular cloud-based online platform for file transferring. Due to its fame, there are irresponsible individuals known as ‘phisher’, | ||
Line 7: | Line 6: | ||
{{ : | {{ : | ||
- | Both figure above show the example of fake and genuine WeTransfer email. Here, you can see that the content for these two emails is extremely similar. So, if you are not be cautious enough, you may get trick by this and jeopardize your account’s security. | + | Both figure above show the example of fake and genuine WeTransfer email. Here, you can see that the content for these two emails is extremely similar. There are numerous version of fake WeTransfer email. So, if you are not be cautious enough, you may get trick by this and jeopardize your account’s security. |
+ | |||
+ | Here are some characteristics that can distinguish the fake WeTransfer email from the real one: | ||
- | Here are some precautious measures that you can use to determine the fake WeTransfer email: | ||
==== 1. Suspicious download link ==== | ==== 1. Suspicious download link ==== | ||
- | + | The most distinctive characteristic | |
- | The most distinctive characteristic | + | |
{{ : | {{ : | ||
- | In addition, you may also check and verify whether the email address of the files' sender is someone that you know. If no, then it is obviously a fake and spam mail. | + | On top of that, there is case where the download link is written as https:// |
+ | |||
+ | {{ : | ||
+ | |||
+ | ==== 2. Suspicious file's sender email address | ||
+ | |||
+ | In addition, you may also check and verify whether the email address of the files' sender is someone that you know. If no and you are not expecting any files, then it is obviously a fake and spam mail. Please ignore that email. | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | Above is an example of a suspicious file's sender email address. | ||
+ | |||
+ | ==== 3. Suspicious WeTransfer email address | ||
Sometimes, the email may appear like it is sent from WeTransfer when it is in fact sent from suspicious email address. How they configure the email address is by using " | Sometimes, the email may appear like it is sent from WeTransfer when it is in fact sent from suspicious email address. How they configure the email address is by using " | ||
Line 24: | Line 35: | ||
{{ : | {{ : | ||
- | Anyone | + | Last but not least, anyone |