ICT Services Secure IT Protect myself from phishing

Protect myself from phishing

Phishing is a relatively new phenomenon that commonly uses websites and email to steal confidential information such as credit card numbers, passwords and other information that can be used for financial gain.

Typical phishing attempts involves receiving an email on a particular topic of importance or interest such as wining a prize, taxation department refund, topical news story on a disaster or threat or to confirm financial information.

The email will often ask for some action to be performed, such as clicking on a link or providing some information.

For example:

Here are some tips for identifying phishing emails

  • Phishers may impersonate the sender making the recipient think that the original email was from a legitimate source. This could even be a JCU logo.
  • The subject usually requests some action.
  • There is usually an attachment or a link.
  • The purpose of the email is to entice the reader to client on the web link and login or provider other personal information. If you are in doubt, report the email to your services provider.

Reporting Phishing: To report phishing emails, send all relevant details (including full message headers) to ithelpdesk@jcu.edu.au.

Third Party Tools

A variety of publicly available tools are available on the internet to help you check phishing emails:

WebsiteHow it helps
https://www.phishtank.com/  Check a potentially malicious URL
https://www.virustotal.com/Check a potentially malicious file or URL