News Blog & Press

How To Spot A Fake Email

Clicking on one bad link can cause a cyber attack.
Antivirus Software Is Dead

News | Back to all news | Source | Photo Credit: Pixabay.com

How To Spot A Fake Email

Clicking on one bad link can cause a cyber attack.

Without thinking, you or your employee clicks on a link and your network is attacked. Turning off your PC won’t help,the damage is already done. Here are some tips to help you spot a phishing email.

1. Typos or bad grammar: Bad grammar and spelling are telltale signs of phishing. Big companies hire professional copywriters (and editors) for email communication.

2. Warning or Alert: Phishing emails try to freak you out with warnings of stolen information or worse, and then offer an easy fix if you just “click here.” (Or the opposite: “You’ve won a prize! Click here to claim it!”).

3. Incorrect URL. Hackers use fake sites to steal your information. Watch to make sure the URL is actually the one you want to be going to— if you notice the URL is different, that’s a good indication that the site is fake and you should NOT enter your information. There’s a number of ways you can protect yourself from this:

If you’re on a computer, hover your mouse over the link to see a preview of the link URL in the status bar. Then check to see if the link site matches the site that it should be from. So for example if your email comes from Bank America or you type in Bank America into the Google search bar and the link is not going to www.bankamerica.com but something like www.banking-america.com you should not click.

4. Sender’s Email Address. You can also check who sent the email by looking at the send address. It may say it’s from Bank America, but the email may be something strange like [email protected]. The sender’s email should not be using a public Internet account like Hotmail, Gmail, Yahoo!, etc.

5. Your Name. A legitimate email from your bank or business will address you by name rather than as “Valued Customer” (or something similar).

6. Low Resolution Images. A tip-off to a false site is poor image quality of the company’s logo or other graphics.

Here is how you protect yourself from all links in phishing emails.

1. Use the TraceFree Browser to open all suspicious links. Each link is opened by a server in the cloud and the user “sees” the website. No malicious code ever reaches the user’s device. A virus free browser is always safer than the best antivirus program.

2. Use the “Send To TraceFree” Chrome Extension. While using the Chrome browser, if you see a link that you think looks questionable, simply right click on the link and open it using the TraceFree browser.

You can’t stop phishing emails, or your employees from clicking on the links in them, but you can stop the link from doing damage to your network. Open any link safely with TraceFree the virus free browser.

Edward Snowden Says Big Tech Abuses Personal Data

Edward Snowden says Big Tech is collecting personal data and sharing it with governments.

Apple’s New Privacy Policy Takes On Google And Facebook

A VPN does not keep you private and secure. Only TraceFree a remote browser gives complete privacy and security.

How To Be Completely Anonymous On The Internet

A (VPN), or a private browser does not keep you anonymous on the Web.

How To Tell If A Link Is Safe To Open

Test a link to see if it safe before opening.

Judge Rules Google Incognito Is Not Private

Google’s Incognito Mode is not private.

How To Spot A Phishing Link

How To Spot A Phishing Link. Hovering over a link can no longer a reliable indicator. Looking at every phishing email article…

10 Things You Didn’t Know About Google

News Blog & Press10 Things You Didn't Know About Google Here are some facts how Google gathers their data.News | Back to all news | 10 Things You Didn't Know About Google Google gathers data in many ways. Here are 10 ways Google gathers data that many don't know...

Malware That Records People Enjoying Porn Discovered

Using TraceFree a remote browser prevents malware from getting on your device.

Want A Browser That Leaves No Browsing History?

A new browser leaves no browsing history.

15 Reasons To Use The First Virtual Private Browser

TraceFree is the first virtual private browser which gives a Web user complete privacy and security.

Popular Uses For A Secure VPN

Popular uses for a secure VPN.

EARN IT Act A Privacy Nightmare For Private Browsers And VPNs

Want to know if Google can track you when you use Tor?

Introducing Trace Free

The Safest Way To Browse The Web

“Always Safe Always Private Browsing”