You and Your CourseOpportunities
Research and Teaching
Our ResearchResearch Degrees
Partners and Community
Partner with JCU
- Careers and Employability
- Open Day
- Australian Institute of Tropical Health & Medicine
Help and Support
- Choosing a strong Password
- Data Protection
- Device Security
- Email Safety
- Online Security at Home
- Web Safety
- Malware and Virus Protection
- Keep a clean device
- Protect myself from phishing
- Recover a hacked or compromised account
- Protect your digital reputation
- Report a cybersecurity incident
- Password Manager
- ICT Service Catalog
Protect myself from phishing
Phishing is a relatively new phenomenon that commonly uses websites and email to steal confidential information such as credit card numbers, passwords and other information that can be used for financial gain.
Typical phishing attempts involves receiving an email on a particular topic of importance or interest such as wining a prize, taxation department refund, topical news story on a disaster or threat or to confirm financial information.
The email will often ask for some action to be performed, such as clicking on a link or providing some information.
Here are some tips for identifying phishing emails
- Phishers may impersonate the sender making the recipient think that the original email was from a legitimate source. This could even be a JCU logo.
- The subject usually requests some action.
- There is usually an attachment or a link.
- The purpose of the email is to entice the reader to client on the web link and login or provider other personal information. If you are in doubt, report the email to your services provider.
Third Party Tools
A variety of publicly available tools are available on the internet to help you check phishing emails:
|Website||How it helps|
|https://www.phishtank.com/||Check a potentially malicious URL|
|https://www.virustotal.com/||Check a potentially malicious file or URL|