Skip to main content

Phishing

What is Phishing?
How to recognize it?
How can I report it?

Phishing is a fraudulent cyber attack method employed by scammers and hackers to deceive users into disclosing sensitive information, such as passwords, credit card numbers, or personal data.

Gift Card Scams - BYU–Hawaii

Typically, phishing attacks are conducted via email, instant messaging, or other electronic communication channels, with perpetrators masquerading as legitimate entities, such as financial institutions or reputable organizations.

These fraudulent communications often contain urgent or enticing requests, prompting recipients to click on malicious links, download harmful attachments, or divulge confidential information.

Phishing exploits human psychology, leveraging emotions like curiosity, fear, or a sense of urgency to manipulate individuals into compromising their security. Being vigilant and aware is essential in identifying and preventing phishing attempts to safeguard personal and organizational integrity.

Recognizing phishing attempts involves paying attention to several key indicators:

1. Sender's email address: Check the sender's email address carefully. Phishers often use email addresses that look similar to legitimate ones but may contain slight misspellings or unusual domain names.

2. Urgency or fear tactics: Be cautious of emails or messages that create a sense of urgency or fear, such as threatening consequences if you don't act immediately. Legitimate organizations typically do not pressure you to take immediate action or threaten you.

3. Requests for personal information: Legitimate organizations rarely ask for sensitive information like passwords, credit card numbers, or Social Security numbers via email or messages. Be wary of any such requests, especially if they claim there's a problem with your account.

4. Suspicious links or attachments: Hover your mouse over links in emails to see the actual URL before clicking. Phishing emails often contain links that lead to fake websites designed to steal your information. Similarly, avoid opening attachments from unknown or unexpected sources, as they could contain malware.

5. Generic greetings: Phishing emails often use generic greetings like "Dear Customer" instead of addressing you by name. Legitimate organizations usually personalize their communications with your name or account information.

6. Poor spelling and grammar: Phishing emails often contain spelling and grammatical errors. While legitimate organizations may make occasional mistakes, a high frequency of errors can be a red flag.

7. Unsolicited requests: Be cautious of unsolicited emails or messages, especially if they promise unexpected rewards or prizes. If something seems too good to be true, it probably is.

To test your ability to identify phishing emails, take five minutes to try Google's helpful phishing quiz.

By staying vigilant and examining emails and messages carefully, you can better protect yourself from falling victim to phishing attacks. Additionally, if you're unsure about the legitimacy of an email, contact the organization directly through official channels to verify its authenticity.

If you think that an email or message you've received seems suspicious, please forward it as an attachment to phishing@byuh.edu or ulua@byuh.edu and we'll review it.