Open Access
Table 6
Possible indicators of a phishing email [59].
| Suspicious senders | The sender of an email should be legitimate, have the correct spelling and domain name for the topic, and should not be a spoof email. A spoof email sender will have a different email address when the cursor is hovered over the sender’s name. |
| Unnecessary or unwarranted urgency | Emails that seem particularly urgent play on stress to avoid scrutiny. Urgent emails out of the blue should be viewed with suspicion, particularly if they ask for account access to anything. |
| Too good to be true messages | If a message seems too good to be true, there is a high likelihood that it is. Caution when clicking on any links or attachments in these emails is warranted. Verification of legitimacy from an outside source is recommended. |
| Embedded or spoofed hyperlinks | The website associated with a hyperlink can be verified by hovering the cursor over the link. Ensure that the website you expect is the actual hyperlinked website before clicking on the link. Unexpected or gibberish links should not be trusted. |
| Grammar or spelling mistakes | Emails with spelling, grammar, or layout mistakes are likely not from large corporations’ marketing departments, but instead are knockoffs with malicious intentions. |
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.
